CN111915773A - Unlocking method and system for transmission device - Google Patents

Unlocking method and system for transmission device Download PDF

Info

Publication number
CN111915773A
CN111915773A CN202010801027.6A CN202010801027A CN111915773A CN 111915773 A CN111915773 A CN 111915773A CN 202010801027 A CN202010801027 A CN 202010801027A CN 111915773 A CN111915773 A CN 111915773A
Authority
CN
China
Prior art keywords
information
transmission device
auxiliary
unlocking
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010801027.6A
Other languages
Chinese (zh)
Inventor
付峡平
苏永前
陈继敏
邱粤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202010801027.6A priority Critical patent/CN111915773A/en
Publication of CN111915773A publication Critical patent/CN111915773A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B49/00Electric permutation locks; Circuits therefor ; Mechanical aspects of electronic locks; Mechanical keys therefor
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Abstract

The application provides an unlocking method and system for a transmission device, which are used in the technical field of Internet of things and information security, and overcome the problems that in the prior art, in the transmission process of important articles, the articles are worried about being opened and stolen or falling off a package by a transmission person privately, the articles are dared not to be transmitted randomly and only can be sent and taken personally, even if the articles are transmitted by a person, the worry of the diligence is also raised in the transmission process, after the article is transmitted, disputes occur between a transmitting side and a receiving side and the transmission person due to package damage or number and quality difference, the important articles are put into a special device personally by a shipper and can be monitored in the whole transmission process, only the consignee can clamp the articles to take out the articles through the certification rear side, in addition, the verification process is rigorous, the mobile phone, personal operation, the device legality and the server legality are confirmed, the authentication process is completed through the mobile phone of the client without inputting any information on the device, so that the information safety is guaranteed.

Description

Unlocking method and system for transmission device
Technical Field
The present application relates to the field of article conveying technologies, and in particular, to an unlocking method and system for a conveying device.
Background
This section is intended to provide a background or context to the embodiments of the application that are recited in the claims. The description herein is not admitted to be prior art by inclusion in this section.
With the development of modern communication technology, various industries provide more convenient and richer electronic channel services by using the modern communication technology, and the application of online banking, electronic commerce and electronic government affairs is continuously emerging, so that great values are created for service providers and users. In the process of these online transactions, many physical connections are involved, general physical connections are mostly realized by express delivery or special employee door-to-door connections, but for some important items, such as bank valuable documents, cash (for example, bank cash is submitted and received, cash delivery is provided for customers to door-to-door), valuable jewelry, ancient calligraphy and painting, data files needing to be kept secret, and the like, the risk that a person is lost during the transit (or partially lost) or stolen exists in the transfer process, and the risk that a dispute is caused after the person signs the money after the transfer arrives exists, so that the transfer of the important items is often completed by the person concerned who is in person at the door-to-door, and many inconveniences exist. The invention aims at the situation, adopts a device and a method, a non-consignee can not open the device in the important article transfer process, the risks of package falling and signature replacing in the process of being taken by a person are avoided, simultaneously the article conveying track and state information can be tracked, an alarm is automatically given when the device is illegally opened, the consignee needs to carry out multiple authentications before the goods are taken out by the opening device, the multiple authentications comprise mobile phone legality authentication, identity authentication and three-party authentication, wherein the identity authentication process is carried out between a server and a client binding mobile phone without inputting any information on the transfer device, the information safety is protected while the risks of package falling or partial package falling and stealing of the person in the important article transfer process are greatly reduced, after the operation of the client is confirmed by an identity authentication card, a round of three-party authentication of identity verification by the transfer device, the server and a terminal device is carried out, illegal behaviors such as fake servers, simulated mobile phones and fake device fishing are prevented, and unlocking is started after the illegal behaviors pass.
Disclosure of Invention
In order to solve at least one of the above problems, an embodiment of the present application provides an unlocking method for a transmission device, which is applied to a terminal device, and includes:
scanning the unique identification information on the transport device;
acquiring authentication information of a user, and comparing the authentication information with locally stored authentication information;
and if the unique identification information and the user identity information are consistent, sending the unique identification information and the user identity information to a server so that the server verifies whether the user establishes a binding relationship with the transmission device or not according to the unique identification information and the identity authentication result, and if so, sending auxiliary unlocking encryption information to the transmission device so that the transmission device determines to open the transmission device according to the auxiliary unlocking encryption information.
In a preferred embodiment, further comprising:
and receiving auxiliary verification information sent by the server so that a user inputs the auxiliary verification information on an input interface of the transmission device to further assist the transmission device in starting.
In a preferred embodiment, further comprising:
inputting auxiliary verification information, wherein the auxiliary verification information is randomly generated by the transmission device;
and sending the auxiliary verification information to a server to assist the server in generating the auxiliary unlocking encryption information.
The embodiment of the present application further provides an unlocking method for a transmission device, which is applied to a server, and includes:
receiving unique identification information and user identity information sent by terminal equipment; the unique identification information is obtained by scanning the transmission device by the terminal equipment, and the user identity information is sent by the terminal equipment after local authentication;
verifying whether the user establishes a binding relationship with the transmission device according to the unique identification information and the user identity information;
if so, generating auxiliary unlocking encryption information, sending the auxiliary unlocking encryption information to the transmission device, so that the transmission device decrypts the auxiliary unlocking encryption information by using a secret key, and determining whether to open the transmission device according to the auxiliary unlocking encryption information.
In a preferred embodiment, after receiving the unique identification information and the user identity information sent by the terminal device, the method further includes:
and randomly generating auxiliary verification information and sending the auxiliary verification information to the terminal equipment and the transmission device so that the user inputs the auxiliary verification information into the transmission device, and the transmission device can compare the input auxiliary verification information with the received auxiliary verification information.
In a preferred embodiment, said verifying whether the user establishes a binding relationship with the transmitting device according to the unique identification information and the user identity information includes:
determining the serial number of the transmission device according to the unique identification information, and searching reserved user identity information which has a binding relationship with the transmission device through the serial number of the transmission device;
and comparing the user identity information with the reserved user identity information, and if the user identity information is consistent with the reserved user identity information, the verification is passed.
In a preferred embodiment, further comprising:
receiving auxiliary verification information and timestamp information sent by terminal equipment; the auxiliary verification information is randomly generated by the transmission device and is input to the terminal equipment; the time stamp information is generated by the transmission device and is used for recording the generation time of the auxiliary verification information;
generating encrypted verification data according to the auxiliary verification information and the timestamp information and by combining an encryption key of the transmission device;
and sending the encrypted verification data to a transmission device so that the transmission device decrypts the encrypted verification data by using a locally stored encryption key, further compares the auxiliary verification information obtained by decryption with the transmission device to generate auxiliary verification information, compares the timestamp information obtained by decryption with the timestamp information generated by the transmission device, and if the comparison is consistent and the auxiliary unlocking encryption information is checked to pass, the transmission device is started.
The embodiment of the present application further provides an unlocking method for a transmission device, which is applied to the transmission device, and includes:
receiving auxiliary unlocking encryption information; the auxiliary unlocking encryption information is generated by adopting the unique secret key encryption of the transmission device after the server verifies that the user establishes the binding relationship with the transmission device according to the unique identification information of the transmission device and the identity authentication result of the terminal equipment; the unique identification information is obtained by the terminal equipment from the transmission device;
and decrypting by using the unique key and determining whether to open according to the auxiliary unlocking encryption information.
In a preferred embodiment, the determining whether to unlock according to the auxiliary unlocking encryption information includes:
decrypting the auxiliary unlocking encrypted information by using the stored secret key to obtain unlocking instruction information;
and verifying the unlocking instruction information, and confirming the unlocking after the verification is passed.
In a preferred embodiment, further comprising:
randomly generating auxiliary verification information, and generating verification data according to the auxiliary verification information and a preset generation rule;
displaying the auxiliary verification information to enable a user to transmit the auxiliary verification information to a server through terminal equipment, and further enabling the server to generate verification data according to the auxiliary verification information and the preset generation rule;
and receiving the encrypted verification data sent by the server, comparing the locally generated verification data with the received verification data, and starting the transmission device after the verification of the auxiliary unlocking encryption information is passed if the comparison is consistent.
In a preferred embodiment, the auxiliary verification information includes a random number with a set number of bits and a timestamp, and the generating verification data according to the auxiliary verification information and a preset generation rule includes:
inputting the random number according to a preset generation rule to generate verification data; wherein the encrypted verification data sent by the server comprises the verification data and a timestamp at which the server generated the verification data.
In a preferred embodiment, further comprising:
receiving auxiliary verification information sent by a server and auxiliary verification information input by a user, wherein the auxiliary verification information input by the user is obtained by the server informing the terminal equipment;
and comparing the two pieces of auxiliary verification information, and if the two pieces of auxiliary verification information are identical, and starting the transmission device after the auxiliary unlocking encryption information passes verification.
The embodiment of the application also provides an unlocking method for the transmission device, which comprises the following steps:
the terminal equipment acquires the unique identification information of the transmission device from the transmission device; acquiring authentication information of a user, comparing the authentication information with locally stored authentication information, and if the authentication information is consistent with the locally stored authentication information, sending the unique identification information and the user identity information to a server;
the server verifies whether the user establishes a binding relationship with the transmission device or not according to the unique identification information and the identity authentication result, and if so, auxiliary unlocking encryption information is sent to the transmission device;
and the transmitting device utilizes the unique secret key decryption to determine whether to open according to the auxiliary unlocking encryption information.
An embodiment of the present application further provides a terminal device, including:
the scanning module acquires the unique identification information of the conveying device from the conveying device;
the comparison module is used for acquiring the authentication information of the user and comparing the authentication information with the authentication information stored locally;
and if the unique identification information and the user identity information are consistent, the sending module sends the unique identification information and the user identity information to a server so that the server verifies whether the user establishes a binding relationship with the transmission device or not according to the unique identification information and the identity authentication result, and if so, sends auxiliary unlocking encryption information to the transmission device so that the transmission device determines to open the transmission device according to the auxiliary unlocking encryption information.
An embodiment of the present application further provides a server, including:
the receiving module is used for receiving the unique identification information and the user identity information sent by the terminal equipment; the unique identification information is obtained by the terminal equipment from the transmitting device, and the user identity information is the authentication information of the terminal equipment collected user and is determined after being compared with the authentication information stored locally;
the binding relation determining module is used for verifying whether the user establishes the binding relation with the transmission device or not according to the unique identification information and the user identity information;
and if so, generating auxiliary unlocking encryption information, sending the auxiliary unlocking encryption information to the transmission device, so that the transmission device decrypts the auxiliary unlocking encryption information by using a secret key, and determining whether to open the transmission device according to the auxiliary unlocking encryption information.
An embodiment of the present application further provides a transmission device, including: a box body; the communication module and the opening module are arranged on the box body; wherein the content of the first and second substances,
the communication module receives the auxiliary unlocking encryption information; the auxiliary unlocking encryption information is generated by adopting the unique secret key encryption of the transmission device after the server verifies that the user establishes the binding relationship with the transmission device according to the unique identification information of the transmission device and the identity authentication result of the terminal equipment; the unique identification information is obtained by the terminal equipment from the transmission device;
and the opening module utilizes the unique key decryption to determine whether to open according to the auxiliary unlocking encryption information.
An embodiment of the present application further provides an article conveying system, including: a transmission device, a terminal device, and a server; wherein the content of the first and second substances,
the terminal equipment acquires the unique identification information of the transmission device from the transmission device; acquiring authentication information of a user, comparing the authentication information with locally stored authentication information, and if the authentication information is consistent with the locally stored authentication information, sending the unique identification information and the user identity information to a server;
the server verifies whether the user establishes a binding relationship with the transmission device or not according to the unique identification information and the identity authentication result, and if so, auxiliary unlocking encryption information is sent to the transmission device;
and the transmitting device utilizes the unique secret key decryption to determine whether to open according to the auxiliary unlocking encryption information.
An embodiment of the present application provides a computer device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor executes the computer program to implement the method according to any one of the first aspect.
An embodiment of the present application provides a computer-readable storage medium, which stores a computer program for executing any one of the methods in the first aspect.
In summary, the present application provides an unlocking method and system for a transmission device, which uses a camera on a terminal device to scan a unique identifier on the transmission device, establishes a connection relationship, then uses a local identity authentication system of the terminal device to authenticate the identity of a user, verifies the identity of the user at a server, determines whether the user is the user who previously bound the transmission device, and if so, opens the transmission device, thereby overcoming the previous problems that the article is stolen or dropped by the transmission personnel privately in the transmission process of the important article, the transmission personnel is not dared to transmit the article freely and only can send the article to the door personally, even if the transmission personnel transmits the article, the problem is worried about in the transmission process, the problem that the receiving and transmitting parties and the transmission personnel are in dispute due to the package damage or the number and the quality difference after the article transmission is completed is solved, the important article is put into a special device by the shipper himself, the whole transfer process can be monitored, only the consignee himself can punch the card device to take out the goods after passing the authentication, the verification process is rigorous, the mobile phone is legal, the personal operation, the device is legal and the server is legal, the safety and the reliability of the transfer of important goods are greatly improved, the authentication process is finished through the mobile phone of the client without inputting any information on the device, and the information safety is guaranteed.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts. In the drawings:
fig. 1 is a schematic diagram of a network architecture of a transmission system according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of an unlocking method for a transmission device executed by a terminal device in an embodiment of the present application;
fig. 3 is a schematic flowchart of an unlocking method for a transmitting device executed by a server in an embodiment of the present application;
fig. 4 is a schematic flow chart of an unlocking method for a transmission device, which is executed by the transmission device in the embodiment of the present application;
fig. 5 is a schematic structural diagram of a terminal device provided in an embodiment of the present application;
fig. 6 is a schematic structural diagram of a server provided in an embodiment of the present application;
fig. 7 is a schematic structural diagram of a conveying device provided in an embodiment of the present application;
fig. 8 is a schematic structural diagram of a computer device suitable for implementing the unlocking method for the transmission device according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and the described embodiments are only a part of the embodiments of the present application, but not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The principles and spirit of the present application are explained in detail below with reference to several representative embodiments of the present application.
Although the present application provides method operational steps or apparatus configurations as illustrated in the following examples or figures, more or fewer operational steps or modular units may be included in the methods or apparatus based on conventional or non-inventive efforts. In the case of steps or structures which do not logically have the necessary cause and effect relationship, the execution sequence of the steps or the module structure of the apparatus is not limited to the execution sequence or the module structure shown in the embodiment or the drawings of the present application. The described methods or modular structures, when applied in an actual device or end product, may be executed sequentially or in parallel according to embodiments or the methods or modular structures shown in the figures.
It should be noted that the unlocking method and device for the transmission device in the present application can be used in the technical field of information security, can also be used in the technical field of internet of things, and certainly can also be used in other technical fields.
Fig. 1 shows a schematic diagram of a network architecture in an embodiment of the present invention. As shown in fig. 1, the transfer system of the present invention includes: terminal equipment 1, server 3 and transmission device 2. Further, the system also comprises a management terminal 4 for data management or operation management and control of the server 3, and the server 3, the terminal device 1, the management terminal 4 and the transmission device 2 are all connected with the server through a network (wired or wireless). The server is provided with a whole system platform which comprises a background service program, a relevant database, an encryption and decryption device and the like. Terminal equipment has installed special APP (also can be as a module of certain APP according to actual conditions), and customer's accessible APP registers, fills in delivery information, locks, unblanks, looks over the state position of corresponding device, receives alarm information, receives and carries out authentication, maintenance modification registration information etc. according to the verification procedure of reserving, and the managers also can accomplish relevant administrative work (authority setting, special page) through APP. The management terminal is used by system management personnel and can be used for writing a secret key and an appointed algorithm into the device security chip SE, registering device information, checking device information, alarming information, upgrading or maintaining a server program and the like.
The terminal device may be a terminal such as a mobile phone, a mobile computer, a handheld smart device, etc. having a camera and having an authentication function such as fingerprint recognition or face recognition, taking the mobile phone as an example, on which a dedicated APP needs to be installed, or an embedded applet is used to borrow a public APP platform, which is not limited in the present invention.
It should be noted that the terminal device may scan the unique identification information on the transmitting device by calling the camera, or may receive the unique identification information of the transmitting device by using an assembly having a wireless transceiving function, such as NFC, without limitation.
The last chamber, tool to lock and communication module of holding of need including holding, the tool to lock opens or closes the chamber that holds that corresponds after receiving a settlement signal, also can realize opening and closing of conveyer through remote control, the user places article in this conveyer during the use, then closes the tool to lock and conveys the transportation, the delivery side utilizes the cell-phone to sweep the sign indicating number and connects, then the server assigns the instruction after the authentication and opens conveyer.
The server is used for receiving the authenticated identity information of the terminal equipment, then comparing the identity information with the 'consignee' bound in the database, if the identity information is consistent with the 'consignee', indicating that the user has the authority of opening the transmission device, and sending an opening instruction to the transmission device to indicate that the transmission device is opened.
The respective apparatuses of the present invention will be described in detail below.
Fig. 2 shows an unlocking method for a transmission device in an embodiment of the present invention, which is applied to a terminal device, and includes:
s11: acquiring unique identification information of a transmission device from the transmission device;
s12: acquiring authentication information of a user, and comparing the authentication information with locally stored authentication information;
s13: and if the unique identification information and the user identity information are consistent, sending the unique identification information and the user identity information to a server so that the server verifies whether the user establishes a binding relationship with the transmission device or not according to the unique identification information and the identity authentication result, and if so, sending auxiliary unlocking encryption information to the transmission device so that the transmission device determines to open the transmission device according to the auxiliary unlocking encryption information.
The application provides an unlocking method for a transmission device, which comprises the steps of scanning a unique identifier on the transmission device by using a camera on a terminal device, establishing a connection relation, then carrying out identity authentication by using a local identity authentication system of the terminal device, verifying the identity of a user at a server terminal, judging whether the user is the user binding the transmission device in advance, and if so, opening the transmission device, thereby overcoming the problems that the goods are illegally opened or stolen or dropped by a transmission person in the transmission process of the important goods, the transmission is not dared to be freely transmitted, only the user can be personally sent to the door, even if the user transmits the goods, the user is wary of worrying about the problems in the transmission process, the package is damaged or the number and the quality difference cause disputes between a transmitter and a receiver and the transmission person after the goods are transmitted, and the important goods are personally put into a special device by a shipper, the system can be monitored in the whole transfer process, the device can be opened to take out the articles only after the consignee passes the authentication, the verification process is rigorous, the mobile phone is legal, the personal operation, the device is legal and the server is legal, the safety and the reliability of the transfer of important articles are greatly improved, the authentication process is finished through the mobile phone of a client without inputting any information on the device, and the information safety is guaranteed.
In a preferred embodiment, further comprising:
and receiving auxiliary authentication information sent by the server so that a user inputs the auxiliary authentication information on an input interface of the transmission device, and further assisting the transmission device to open the accommodating cavity by using the key.
In this embodiment, the secondary authentication may be further performed in cooperation with secondary authentication information, and the secondary authentication information may be randomly generated by the server, and may be, for example, a four-digit random number, such as "5273".
In this embodiment, the specific auxiliary manner may be: the transmitting device randomly generates four random numbers (in this embodiment, the random numbers are pseudo random numbers and can be generated according to a certain rule) in the same manner, and then the transmitting device compares whether the two random numbers are consistent, so that the transmitting device can be started in cooperation with assistance.
Of course, the auxiliary verification information may be sent to the transmission device by the server, and then the transmission device compares whether the auxiliary verification information input by the user is consistent with the auxiliary verification information sent by the server, that is, the transmission device may be started in cooperation with the assistance.
In other embodiments, the auxiliary authentication information may be randomly generated by the transmitting device, and the process of auxiliary authentication may be performed at the server, as shown below, further including:
inputting auxiliary verification information, wherein the auxiliary verification information is randomly generated by the transmission device;
and sending the auxiliary verification information to a server to assist the server in generating the auxiliary unlocking encryption information.
Fig. 3 shows an unlocking method for a transmission device, which is applied to a server and includes:
s21: receiving unique identification information and user identity information sent by terminal equipment; the unique identification information is obtained by scanning the transmission device by the terminal equipment, and the user identity information is sent by the terminal equipment after local authentication;
s22: verifying whether the user establishes a binding relationship with the transmission device according to the unique identification information and the user identity information;
s23: if so, generating auxiliary unlocking encryption information, sending the auxiliary unlocking encryption information to the transmission device, so that the transmission device decrypts the auxiliary unlocking encryption information by using a secret key, and determining whether to open the transmission device according to the auxiliary unlocking encryption information.
The application provides an unlocking method for a transmission device, which comprises the steps of scanning a unique identifier on the transmission device by using a camera on a terminal device, establishing a connection relation, then carrying out identity authentication by using a local identity authentication system of the terminal device, verifying the identity of a user at a server terminal, judging whether the user is the user binding the transmission device in advance, and if so, opening the transmission device, thereby overcoming the problems that the goods are illegally opened or stolen or dropped by a transmission person in the transmission process of the important goods, the transmission is not dared to be freely transmitted, only the user can be personally sent to the door, even if the user transmits the goods, the user is wary of worrying about the problems in the transmission process, the package is damaged or the number and the quality difference cause disputes between a transmitter and a receiver and the transmission person after the goods are transmitted, and the important goods are personally put into a special device by a shipper, the whole transfer process can be monitored, only the consignee himself can punch the card device to take out the goods after passing the authentication, the verification process is rigorous, the mobile phone is legal, the personal operation, the device is legal and the server is legal, the safety and the reliability of the transfer of important goods are greatly improved, the authentication process is finished through the mobile phone of the client without inputting any information on the device, and the information safety is guaranteed.
In a preferred embodiment, the generating of the auxiliary verification information in the above embodiment may further include, after receiving the unique identification information and the user identity information sent by the terminal device:
and randomly generating auxiliary verification information and sending the auxiliary verification information to the terminal equipment and the transmission device so that the user inputs the auxiliary verification information into the transmission device, and the transmission device can compare the input auxiliary verification information with the received auxiliary verification information.
In a preferred embodiment, step S22 specifically includes:
s221: determining the serial number of the transmission device according to the unique identification information, and searching reserved user identity information which has a binding relationship with the transmission device through the serial number of the transmission device;
s222: and comparing the user identity information with the reserved user identity information, and if the user identity information is consistent with the reserved user identity information, the verification is passed.
In a preferred embodiment, further comprising:
receiving auxiliary verification information and timestamp information sent by terminal equipment; the auxiliary verification information is randomly generated by the transmission device and is input to the terminal equipment; the time stamp information is generated by the transmission device and is used for recording the generation time of the auxiliary verification information;
generating encrypted verification data according to the auxiliary verification information and the timestamp information and by combining an encryption key of the transmission device;
and sending the encrypted verification data to a transmission device so that the transmission device decrypts the encrypted verification data by using a locally stored encryption key, further compares the auxiliary verification information obtained by decryption with the transmission device to generate auxiliary verification information, compares the timestamp information obtained by decryption with the timestamp information generated by the transmission device, and if the comparison is consistent and the auxiliary unlocking encryption information is checked to pass, the transmission device is started.
In this embodiment, the encryption information is formed based on the time stamp, and further, the encryption can be performed based on the time stamp, thereby improving the security of the transmission device.
Fig. 4 shows an unlocking method for a conveying device, which is applied to the conveying device and includes the following steps:
s31: receiving auxiliary unlocking encryption information; the auxiliary unlocking encryption information is generated by adopting the unique secret key encryption of the transmission device after the server verifies that the user establishes the binding relationship with the transmission device according to the unique identification information of the transmission device and the identity authentication result of the terminal equipment; the unique identification information is obtained by the terminal equipment from the transmission device;
s32: and decrypting by using the unique key and determining whether to open according to the auxiliary unlocking encryption information.
The application provides an unlocking method for a transmission device, which comprises the steps of scanning a unique identifier on the transmission device by using a camera on a terminal device, establishing a connection relation, then carrying out identity authentication by using a local identity authentication system of the terminal device, verifying the identity of a user at a server terminal, judging whether the user is the user binding the transmission device in advance, and if so, opening the transmission device, thereby overcoming the problems that the goods are illegally opened or stolen or dropped by a transmission person in the transmission process of the important goods, the transmission is not dared to be freely transmitted, only the user can be personally sent to the door, even if the user transmits the goods, the user is wary of worrying about the problems in the transmission process, the package is damaged or the number and the quality difference cause disputes between a transmitter and a receiver and the transmission person after the goods are transmitted, and the important goods are personally put into a special device by a shipper, the whole transfer process can be monitored, only the consignee himself can punch the card device to take out the goods after passing the authentication, the verification process is rigorous, the mobile phone is legal, the personal operation, the device is legal and the server is legal, the safety and the reliability of the transfer of important goods are greatly improved, the authentication process is finished through the mobile phone of the client without inputting any information on the device, and the information safety is guaranteed.
In a preferred embodiment, step S32 includes:
s321: decrypting the auxiliary unlocking encrypted information by using the stored secret key to obtain unlocking instruction information;
s322: and verifying the unlocking instruction information, and confirming the unlocking after the verification is passed.
In a preferred embodiment, the auxiliary authentication information may be generated by the transmitting device itself, i.e. further comprising:
randomly generating auxiliary verification information, and generating verification data according to the auxiliary verification information and a preset generation rule;
displaying the auxiliary verification information to enable a user to transmit the auxiliary verification information to a server through terminal equipment, and further enabling the server to generate verification data according to the auxiliary verification information and the preset generation rule;
and receiving the encrypted verification data sent by the server, comparing the locally generated verification data with the received verification data, and starting the transmission device after the verification of the auxiliary unlocking encryption information is passed if the comparison is consistent.
In a preferred embodiment, the auxiliary verification information includes a random number with a set number of bits and a timestamp, and the generating verification data according to the auxiliary verification information and a preset generation rule includes:
inputting the random number according to a preset generation rule to generate verification data; wherein the encrypted verification data sent by the server comprises the verification data and a timestamp at which the server generated the verification data.
In this embodiment, the encryption information is formed based on the time stamp, and further, the encryption can be performed based on the time stamp, thereby improving the security of the transmission device.
In a preferred embodiment, further comprising:
receiving auxiliary verification information sent by a server and auxiliary verification information input by a user, wherein the auxiliary verification information input by the user is obtained by the server informing the terminal equipment;
and comparing the two pieces of auxiliary verification information, and if the two pieces of auxiliary verification information are identical, and starting the transmission device after the auxiliary unlocking encryption information passes verification.
As is clear to a person skilled in the art, the unlocking method for the transmission device in the invention has the following specific interaction process:
s001: the terminal equipment acquires the unique identification information of the transmission device from the transmission device; acquiring authentication information of a user, comparing the authentication information with locally stored authentication information, and if the authentication information is consistent with the locally stored authentication information, sending the unique identification information and the user identity information to a server;
s002: the server verifies whether the user establishes a binding relationship with the transmission device or not according to the unique identification information and the identity authentication result, and if so, auxiliary unlocking encryption information is sent to the transmission device;
s003: and the transmitting device utilizes the unique secret key decryption to determine whether to open according to the auxiliary unlocking encryption information.
The following is a detailed description with reference to specific scenarios.
The important article transfer method comprises the following processing procedures:
step 100: a system administrator is connected with a management terminal and a transmission device through a USB line, information such as a secret key and an appointed algorithm is written into a security chip SE through a special tool (the method for writing the secret key and the appointment is mature, the secret key is generated by a special tool such as an encryption machine, different devices correspond to different secret keys, and the description is omitted), then the information of the device is recorded into a server, and relevant parameters such as the size and the like of the device can be input through a mode of scanning a two-dimensional code or inputting a box number.
Step 101: if the customer uses for the first time, download APP earlier, accessible scanning box two-dimensional code is according to the suggestion download, also can download to cell-phone application market. If the client is not used for the first time, directly entering the step 103, otherwise entering the step 102;
step 102: the client finishes the registration work, including real-name authentication, mobile phone binding and reserved identity authentication modes, wherein the real-name authentication needs to upload an identity card photo and is compared with the identity verification system of the ministry of public security through face recognition; the mobile phone authentication passes the short message sending authentication code authentication; the mobile phone binding means binding some unique information of a client registered to use the mobile phone, and ensuring that the user can only use the mobile phone for authentication in the future; the reserved identity authentication comprises but is not limited to face recognition, fingerprint recognition, voiceprint recognition and other biological recognition modes, gesture recognition and the like, UKEY recognition and dynamic scrambler recognition (the UKEY and the dynamic scrambler need to be applied to a service provider), reserved password recognition, short message identification code recognition and the like, wherein the face recognition, the fingerprint recognition, the voiceprint recognition and other biological recognition modes call the local existing biological recognition information of the client mobile phone, an uploading server is not needed, and the privacy information of the client is protected. Several combinations of authentication may be used depending on the importance of the item being conveyed; in the process, a client needs to complete a protocol for agreeing to use related information, so that legal risks are avoided;
step 103: a client scans the two-dimension code of the box body, opens the APP, enters an interface corresponding to the device after identity authentication is completed, and inputs consignee information, if the consignee is registered, the consignee can directly input a consignee phone number for verification without error, and then confirms, if the consignee is not registered, the consignee name, address and phone number are input, and the system prompts the client for verification confirmation;
step 104: a client puts articles to be conveyed into the box body, the APP clicks and locks, and the server sends a locking signal after receiving the signal;
step 105: the transmitting device starts an alarm sensor after receiving the locking signal;
step 106: the transmitting device controls lockups (security may be enhanced by a double lock arrangement in some embodiments). If the receiver is not registered, the server can send a short message to the receiver to prompt that important articles are delivered, and prompt the receiver to download the APP in advance and complete registration;
step 107: the device enters the transmission process, both the goods receiving and dispatching parties and the related parties can check the state information sent by the transmission device and the position information sent by the GPS positioning chip through the mobile phone in the process, if the outer box cover is illegally opened or damaged in the transmission process, the sensing alarm unit starts an alarm and sends alarm information to both the goods receiving and dispatching parties and the related parties, the GPS positioner sends the alarm position information to both the goods receiving and dispatching parties and the related parties, and the buzzer buzzes at the same time;
step 108: the receiver scans the two-dimension code of the box body, if the receiver uses for the first time and is not registered, the step 109 is entered, otherwise, the step 110 is directly entered;
step 109: if the receiver uses for the first time and is not registered, downloading APP according to the prompt of scanning the two-dimensional code of the box body and finishing the registration work, wherein the APP comprises real-name authentication, mobile phone binding and reserved identity authentication modes, the real-name authentication needs to upload an identity card photo and is compared with the identity verification system of the public security department through the networking of face recognition, and the authenticator and the receiver are the same person; the mobile phone authentication is authenticated by sending an authentication code through a short message, and the mobile phone number is consistent with the mobile phone number filled by the shipper; the mobile phone binding means binding some unique information of a client registered to use the mobile phone, and ensuring that the user can only use the mobile phone for authentication in the future; the reserved identity authentication comprises but is not limited to face recognition, fingerprint recognition, voiceprint recognition and other biological recognition modes, gesture recognition and the like, UKEY recognition and dynamic scrambler recognition (the UKEY and the dynamic scrambler need to be applied to a service provider), reserved password recognition, short message identification code recognition and the like, wherein the face recognition, the fingerprint recognition, the voiceprint recognition and other biological recognition modes call the local existing biological recognition information of the client mobile phone, an uploading server is not needed, and the privacy information of the client is protected. Several combinations of authentication may be used depending on the importance of the item being conveyed; in the process, a client needs to complete a protocol for agreeing to use related information, so that legal risks are avoided;
step 110: the server receives the two-dimensional code scanning information of the receiver to initiate a receiving request, checks whether the scanning mobile phone is consistent with the binding mobile phone of the corresponding client, and if not, initiates a warning to the sender, the receiver and the related parties. If the authentication result is consistent with the authentication result, the consignee clicks to receive the goods to complete identity authentication, the authentication mode is an authentication mode reserved during consignee registration, and through the step, the operation authentication of the mobile phone legality authentication client is completed;
step 111: after the authentication is passed, the server sends an unlocking signal to the device, three-party verification is started, and the three-party validity of the server, the device and the client mobile phone is confirmed;
step 112: the transmission device turns off the alarm;
step 113: the conveying device controls the box body to finish opening;
step 114: the receiver opens the box and takes the transported item out of the box.
The three-party verification process after the client initiates the unlocking request in step 111 is as follows:
step 111-1: a client clicks unlocking, and an APP sends an unlocking request to a server;
step 111-2: after verifying that the mobile phone of the unlocking request is the bound mobile phone, the server sends the unlocking request to the corresponding transmission device;
step 111-3: after receiving the unlocking request, the transmission device sends the request to the transmission device, then generates a 4-bit random number and displays the random number on a liquid crystal screen, and the random number can automatically change at intervals (such as two minutes);
step 111-4: the APP reminds the client to input the four-digit random number on the liquid crystal display on the APP and confirms the four-digit random number;
step 111-5: after receiving the 4-bit random number, the server calls a key and an appointed algorithm of a corresponding device to perform operation, and a timestamp element is added in the operation process;
step 111-6: the server encrypts the operation result and the timestamp element by the corresponding device key and transmits the encrypted operation result and the encrypted timestamp element to the corresponding device;
step 111-7: the communication module 13 receives the server encrypted information and then transmits the information to the transmission device;
step 111-8: the secure chip SE in the transmission device decrypts the encrypted information;
step 111-9: after the safety chip checks that the timestamp information is valid, the safety chip adds the timestamp into the random number through a self secret key and an agreed algorithm for operation, and compares the result with the result obtained after the information transmitted by the server is decrypted, if the result is consistent, the step 111-11 is executed, otherwise, the step 111-10 is executed;
step 111-10: if the comparison result is inconsistent, unlocking is refused, information is sent to the server, and the step 111 is repeated;
step 111-11: if the comparison result is consistent, the device control unit transmits an unlock signal, and executes step 112 in fig. 3.
It can be understood that the invention overcomes the problems that the prior important goods are only stolen or dropped due to personal opening or personal delivery, the goods are not dared to be delivered randomly but only can be delivered by oneself, even if the goods are delivered, the problem of diligent war is worried in the delivery process, disputes occur between the receiving and sending parties and the delivery personnel due to the damaged package or the difference of number and quality after the goods are delivered, the important goods are put into the special device by the shipper personally, the whole delivery process can be monitored, only the consignee can take out the goods by using the card-clamping device after the certification, the verification process is rigorous, the mobile phone is validated, the personal operation, the device is legal, and the server is legal, the safety and the reliability of the delivery of the important goods are greatly increased, the certification process is finished by the mobile phone of the client without inputting any information on the device, information safety is guaranteed, and the specific advantages are as follows:
1. the device is locked and is initiated by a delivery party in person, and only a receiving party can open the device, so that the safety of the receiving party, the sending party and the delivery party is improved, and the reliability of the delivery of important articles is greatly improved.
2. The authentication process is rigorous, comprises mobile phone validity verification, personal operation authentication (identity authentication), device validity verification and server validity verification, and can effectively deal with various illegal means, such as impersonation of a person, stealing client information operation by using hacker software, operation by using a false server, phishing by using a false device and the like.
Based on the same inventive concept, the present invention provides a terminal device, as shown in fig. 5, comprising:
the scanning module 11 acquires the unique identification information of the conveying device from the conveying device;
the comparison module 12 is used for collecting authentication information of a user and comparing the authentication information with locally stored authentication information;
and if the comparison is consistent, the sending module 13 sends the unique identification information and the user identity information to a server so that the server verifies whether the user establishes a binding relationship with the transmission device according to the unique identification information and the identity authentication result, and if so, sends auxiliary unlocking encryption information to the transmission device so that the transmission device determines to open the transmission device according to the auxiliary unlocking encryption information.
Based on the same inventive concept, the present invention provides a server, as shown in fig. 6, comprising:
the receiving module 21 is used for receiving the unique identification information and the user identity information sent by the terminal equipment; the unique identification information is obtained by the terminal equipment from the transmission device, and the user identity information is sent by the terminal equipment after local authentication;
a binding relation determining module 22, for verifying whether the user establishes a binding relation with the transmitting device according to the unique identification information and the user identity information;
and if so, the auxiliary unlocking encryption information generating module 23 generates auxiliary unlocking encryption information and sends the auxiliary unlocking encryption information to the transmission device, so that the transmission device decrypts the auxiliary unlocking encryption information by using a secret key and determines whether to open the transmission device according to the auxiliary unlocking encryption information.
Based on the same inventive concept, the present invention provides a transfer apparatus, as shown in fig. 7, comprising: a case 31; a communication module 32 and an opening module 33 arranged on the box body; wherein the content of the first and second substances,
the communication module receives the auxiliary unlocking encryption information; the auxiliary unlocking encryption information is generated by adopting the unique secret key encryption of the transmission device after the server verifies that the user establishes the binding relationship with the transmission device according to the unique identification information of the transmission device and the identity authentication result of the terminal equipment; the unique identification information is obtained by scanning the transmission device by the terminal equipment;
and the opening module utilizes the unique key decryption to determine whether to open according to the auxiliary unlocking encryption information.
Further, the present invention provides an article conveying system comprising: a transmission device, a terminal device, and a server; wherein the content of the first and second substances,
the terminal equipment acquires the unique identification information of the transmission device from the transmission device; acquiring authentication information of a user, comparing the authentication information with locally stored authentication information, and if the authentication information is consistent with the locally stored authentication information, sending the unique identification information and the user identity information to a server;
the server verifies whether the user establishes a binding relationship with the transmission device or not according to the unique identification information and the identity authentication result, and if so, auxiliary unlocking encryption information is sent to the transmission device;
and the transmitting device utilizes the unique secret key decryption to determine whether to open according to the auxiliary unlocking encryption information.
It can be understood that the terminal device, the transmission device, the server and the transmission system provided by the invention scan the unique identifier on the transmission device by using the camera on the terminal device to establish the connection relationship, then the local identity authentication system of the terminal device is used for identity authentication, the server side is used for verifying the identity of the user to judge whether the user is the user binding the transmission device first, if so, the transmission device is opened, thereby overcoming the problems that the article is opened and stolen or the package is dropped by the transmission personnel in the transmission process of the important article, the transmission is not dared to be transmitted freely and only the user can send the article to the door in person, even if the user transmits the important article, the problem is worried about in war in the transmission process, the problem that the receiving and transmitting parties and the transmitting personnel have disputes due to the package damage or the number and the quality difference after the article is transmitted is solved, the important article is put into the special device by the shipper in person, the whole transfer process can be monitored, only the consignee himself can punch the card device to take out the goods after passing the authentication, the verification process is rigorous, the mobile phone is legal, the personal operation, the device is legal and the server is legal, the safety and the reliability of the transfer of important goods are greatly improved, the authentication process is finished through the mobile phone of the client without inputting any information on the device, and the information safety is guaranteed.
In terms of hardware, in order to provide an embodiment of the electronic device for implementing all or part of the content in the unlocking method for the transmission device, the electronic device specifically includes the following content:
a processor (processor), a memory (memory), a communication Interface (Communications Interface), and a bus; the processor, the memory and the communication interface complete mutual communication through the bus; the communication interface is used for realizing information transmission among related equipment such as a server, a device, a distributed message middleware cluster device, various databases, a user terminal and the like; the electronic device may be a desktop computer, a tablet computer, a mobile terminal, and the like, but the embodiment is not limited thereto. In this embodiment, the electronic device may refer to the embodiment of the unlocking method for the transmission device and the embodiment of the unlocking method for the transmission device in the embodiments, and the contents thereof are incorporated herein, and repeated descriptions are omitted.
Fig. 8 is a schematic block diagram of a system configuration of an electronic device 9600 according to an embodiment of the present invention. As shown in fig. 8, the electronic device 9600 can include a central processor 9100 and a memory 9140; the memory 9140 is coupled to the central processor 9100. Notably, this FIG. 8 is exemplary; other types of structures may also be used in addition to or in place of the structure to implement telecommunications or other functions.
In one embodiment, the unlocking method function for the transmission device may be integrated into the central processor 9100. For example, the central processor 9100 may be configured to control as follows:
s21: receiving unique identification information and user identity information sent by terminal equipment; the unique identification information is obtained by scanning the transmission device by the terminal equipment, and the user identity information is sent by the terminal equipment after local authentication;
s22: verifying whether the user establishes a binding relationship with the transmission device according to the unique identification information and the user identity information;
s23: if so, generating auxiliary unlocking encryption information, sending the auxiliary unlocking encryption information to the transmission device, so that the transmission device decrypts the auxiliary unlocking encryption information by using a secret key, and determining whether to open the transmission device according to the auxiliary unlocking encryption information.
As can be seen from the above description, the electronic device provided in the embodiment of the present invention verifies the user identity at the server, determines whether the user is a user who has bound the transmission device in advance, and if yes, opens the transmission device, thereby overcoming the problems that in the prior art, the important object is only taken by himself/herself without being delivered because of the fear that the object is stolen or dropped by the delivery person privately, and even if the object is delivered by a person, the problem of the fear of the war is worried about in the delivery process, after the object is delivered, the problem of dispute between the transmitter and receiver and the delivery person due to the damaged package, the number and the quality difference occurs, the important object is put into the dedicated device by the shipper himself/herself, the entire delivery process can be monitored, only the consignee can take out the object by using the card-mounting device after the authentication, and the verification process is rigorous, the mobile phone is confirmed to be legitimate, and the shipper operates the electronic, The device is legal, the server is legal, the safety and the reliability of important article transmission are greatly improved, any information does not need to be input into the device in the authentication process, the authentication is completed through the mobile phone of a client, and the information safety is guaranteed.
In another embodiment, the unlocking method for the transmission device may be configured separately from the central processor 9100, for example, the unlocking method for the transmission device may be configured as a chip connected to the central processor 9100, and the unlocking method function for the transmission device may be realized by the control of the central processor.
As shown in fig. 8, the electronic device 9600 may further include: a communication module 9110, an input unit 9120, an audio processor 9130, a display 9160, and a power supply 9170. It is noted that the electronic device 9600 also does not necessarily include all of the components shown in fig. 8; further, the electronic device 9600 may further include components not shown in fig. 8, which may be referred to in the art.
As shown in fig. 8, a central processor 9100, sometimes referred to as a controller or operational control, can include a microprocessor or other processor device and/or logic device, which central processor 9100 receives input and controls the operation of the various components of the electronic device 9600.
The memory 9140 can be, for example, one or more of a buffer, a flash memory, a hard drive, a removable media, a volatile memory, a non-volatile memory, or other suitable device. The information relating to the failure may be stored, and a program for executing the information may be stored. And the central processing unit 9100 can execute the program stored in the memory 9140 to realize information storage or processing, or the like.
The input unit 9120 provides input to the central processor 9100. The input unit 9120 is, for example, a key or a touch input device. Power supply 9170 is used to provide power to electronic device 9600. The display 9160 is used for displaying display objects such as images and characters. The display may be, for example, an LCD display, but is not limited thereto.
The memory 9140 can be a solid state memory, e.g., Read Only Memory (ROM), Random Access Memory (RAM), a SIM card, or the like. There may also be a memory that holds information even when power is off, can be selectively erased, and is provided with more data, an example of which is sometimes called an EPROM or the like. The memory 9140 could also be some other type of device. Memory 9140 includes a buffer memory 9141 (sometimes referred to as a buffer). The memory 9140 may include an application/function storage portion 9142, the application/function storage portion 9142 being used for storing application programs and function programs or for executing a flow of operations of the electronic device 9600 by the central processor 9100.
The memory 9140 can also include a data store 9143, the data store 9143 being used to store data, such as contacts, digital data, pictures, sounds, and/or any other data used by an electronic device. The driver storage portion 9144 of the memory 9140 may include various drivers for the electronic device for communication functions and/or for performing other functions of the electronic device (e.g., messaging applications, contact book applications, etc.).
The communication module 9110 is a transmitter/receiver 9110 that transmits and receives signals via an antenna 9111. The communication module (transmitter/receiver) 9110 is coupled to the central processor 9100 to provide input signals and receive output signals, which may be the same as in the case of a conventional mobile communication terminal.
Based on different communication technologies, a plurality of communication modules 9110, such as a cellular network module, a bluetooth module, and/or a wireless local area network module, may be provided in the same electronic device. The communication module (transmitter/receiver) 9110 is also coupled to a speaker 9131 and a microphone 9132 via an audio processor 9130 to provide audio output via the speaker 9131 and receive audio input from the microphone 9132, thereby implementing ordinary telecommunications functions. The audio processor 9130 may include any suitable buffers, decoders, amplifiers and so forth. In addition, the audio processor 9130 is also coupled to the central processor 9100, thereby enabling recording locally through the microphone 9132 and enabling locally stored sounds to be played through the speaker 9131.
An embodiment of the present invention further provides a computer-readable storage medium capable of implementing all the steps of the unlocking method for a transmission device, where an execution subject in the above embodiment may be a server, and the computer-readable storage medium stores thereon a computer program which, when executed by a processor, implements all the steps of the unlocking method for a transmission device in the above embodiment.
As can be seen from the above description, the computer-readable storage medium provided in the embodiment of the present invention obtains a filtered edge image by performing edge noise filtering on the initially processed banknote image; performing stroke width transformation according to the image edge points of the edge image and the gradient direction to obtain a stroke width image; forming a connected region in the obtained stroke width image by using morphological operation; and screening all the communicated areas according to the prior information to determine the paper money crown word number area. The paper money serial number can be quickly and accurately positioned.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (devices), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The principle and the implementation mode of the invention are explained by applying specific embodiments in the invention, and the description of the embodiments is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (19)

1. An unlocking method for a transmission device, which is applied to a terminal device, is characterized by comprising the following steps:
acquiring unique identification information of a transmission device from the transmission device;
acquiring authentication information of a user, and comparing the authentication information with locally stored authentication information;
and if the unique identification information and the user identity information are consistent, sending the unique identification information and the user identity information to a server so that the server verifies whether the user establishes a binding relationship with the transmission device or not according to the unique identification information and the identity authentication result, and if so, sending auxiliary unlocking encryption information to the transmission device so that the transmission device determines to open the transmission device according to the auxiliary unlocking encryption information.
2. The unlocking method of claim 1, further comprising:
and receiving auxiliary verification information sent by the server so that a user inputs the auxiliary verification information on an input interface of the transmission device to further assist the transmission device in starting.
3. The unlocking method of claim 1, further comprising:
inputting auxiliary verification information, wherein the auxiliary verification information is randomly generated by the transmission device;
and sending the auxiliary verification information to a server to assist the server in generating the auxiliary unlocking encryption information.
4. An unlocking method for a transmission device, which is applied to a server, is characterized by comprising the following steps:
receiving unique identification information and user identity information sent by terminal equipment; the unique identification information is obtained by the terminal equipment from a transmission device, and the user identity information is sent by the terminal equipment after local authentication;
verifying whether the user establishes a binding relationship with the transmission device according to the unique identification information and the user identity information;
if so, generating auxiliary unlocking encryption information, sending the auxiliary unlocking encryption information to the transmission device, so that the transmission device decrypts the auxiliary unlocking encryption information by using a secret key, and determining whether to open the transmission device according to the auxiliary unlocking encryption information.
5. The unlocking method according to claim 4, wherein after receiving the unique identification information and the user identification information transmitted by the terminal device, further comprising:
and randomly generating auxiliary verification information and sending the auxiliary verification information to the terminal equipment and the transmission device so that the user inputs the auxiliary verification information into the transmission device, and the transmission device can compare the input auxiliary verification information with the received auxiliary verification information.
6. The unlocking method of claim 4, wherein said verifying whether the user establishes the binding relationship with the transmission device according to the unique identification information and the user identity information comprises:
determining the serial number of the transmission device according to the unique identification information, and searching reserved user identity information which has a binding relationship with the transmission device through the serial number of the transmission device;
and comparing the user identity information with the reserved user identity information, and if the user identity information is consistent with the reserved user identity information, the verification is passed.
7. The unlocking method of claim 4, further comprising:
receiving auxiliary verification information and timestamp information sent by terminal equipment; the auxiliary verification information is randomly generated by the transmission device and is input to the terminal equipment; the time stamp information is generated by the transmission device and is used for recording the generation time of the auxiliary verification information;
generating encrypted verification data according to the auxiliary verification information and the timestamp information and by combining an encryption key of the transmission device;
and sending the encrypted verification data to a transmission device so that the transmission device decrypts the encrypted verification data by using a locally stored encryption key, further compares the auxiliary verification information obtained by decryption with the transmission device to generate auxiliary verification information, compares the timestamp information obtained by decryption with the timestamp information generated by the transmission device, and if the comparison is consistent and the auxiliary unlocking encryption information is checked to pass, the transmission device is started.
8. An unlocking method for a transmission device, which is applied to the transmission device, is characterized by comprising the following steps:
receiving auxiliary unlocking encryption information; the auxiliary unlocking encryption information is generated by adopting the unique secret key encryption of the transmission device after the server verifies that the user establishes the binding relationship with the transmission device according to the unique identification information of the transmission device and the identity authentication result of the terminal equipment; the unique identification information is obtained by the terminal equipment from the transmission device;
and decrypting by using the unique key and determining whether to open according to the auxiliary unlocking encryption information.
9. The unlocking method according to claim 8, wherein the determining whether to unlock according to the auxiliary unlocking encryption information includes:
decrypting the auxiliary unlocking encrypted information by using the stored secret key to obtain unlocking instruction information;
and verifying the unlocking instruction information, and confirming the unlocking after the verification is passed.
10. The unlocking method according to claim 8, further comprising:
randomly generating auxiliary verification information, and generating verification data according to the auxiliary verification information and a preset generation rule;
displaying the auxiliary verification information to enable a user to transmit the auxiliary verification information to a server through terminal equipment, and further enabling the server to generate verification data according to the auxiliary verification information and the preset generation rule;
and receiving the encrypted verification data sent by the server, comparing the locally generated verification data with the received verification data, and starting the transmission device after the verification of the auxiliary unlocking encryption information is passed if the comparison is consistent.
11. The unlocking method according to claim 10, wherein the auxiliary verification information includes a random number with a set number of bits and a time stamp, and the generating verification data according to the auxiliary verification information and a preset generation rule includes:
inputting the random number according to a preset generation rule to generate verification data; wherein the encrypted verification data sent by the server comprises the verification data and a timestamp at which the server generated the verification data.
12. The unlocking method according to claim 8, further comprising:
receiving auxiliary verification information sent by a server and auxiliary verification information input by a user, wherein the auxiliary verification information input by the user is obtained by the server informing the terminal equipment;
and comparing the two pieces of auxiliary verification information, and if the two pieces of auxiliary verification information are identical, and starting the transmission device after the auxiliary unlocking encryption information passes verification.
13. An unlocking method for a conveyor, comprising:
the terminal equipment acquires the unique identification information of the transmission device from the transmission device; acquiring authentication information of a user, comparing the authentication information with locally stored authentication information, and if the authentication information is consistent with the locally stored authentication information, sending the unique identification information and the user identity information to a server;
the server verifies whether the user establishes a binding relationship with the transmission device or not according to the unique identification information and the identity authentication result, and if so, auxiliary unlocking encryption information is sent to the transmission device;
and the transmitting device utilizes the unique secret key decryption to determine whether to open according to the auxiliary unlocking encryption information.
14. A terminal device, comprising:
the scanning module acquires the unique identification information of the conveying device from the conveying device;
the comparison module is used for acquiring the authentication information of the user and comparing the authentication information with the authentication information stored locally;
and if the unique identification information and the user identity information are consistent, the sending module sends the unique identification information and the user identity information to a server so that the server verifies whether the user establishes a binding relationship with the transmission device or not according to the unique identification information and the identity authentication result, and if so, sends auxiliary unlocking encryption information to the transmission device so that the transmission device determines to open the transmission device according to the auxiliary unlocking encryption information.
15. A server, comprising:
the receiving module is used for receiving the unique identification information and the user identity information sent by the terminal equipment; the unique identification information is obtained by the terminal equipment from a transmission device, and the user identity information is sent by the terminal equipment after local authentication;
the binding relation determining module is used for verifying whether the user establishes the binding relation with the transmission device or not according to the unique identification information and the user identity information;
and if so, generating auxiliary unlocking encryption information, sending the auxiliary unlocking encryption information to the transmission device, so that the transmission device decrypts the auxiliary unlocking encryption information by using a secret key, and determining whether to open the transmission device according to the auxiliary unlocking encryption information.
16. A conveyor, comprising: a box body; the communication module and the opening module are arranged on the box body; wherein the content of the first and second substances,
the communication module receives the auxiliary unlocking encryption information; the auxiliary unlocking encryption information is generated by adopting the unique secret key encryption of the transmission device after the server verifies that the user establishes the binding relationship with the transmission device according to the unique identification information of the transmission device and the identity authentication result of the terminal equipment; the unique identification information is obtained by the terminal equipment from a transmission device;
and the opening module utilizes the unique key decryption to determine whether to open according to the auxiliary unlocking encryption information.
17. An article conveying system, comprising: a transmission device, a terminal device, and a server; wherein the content of the first and second substances,
the terminal equipment acquires the unique identification information of the transmission device from the transmission device; acquiring authentication information of a user, comparing the authentication information with locally stored authentication information, and if the authentication information is consistent with the locally stored authentication information, sending the unique identification information and the user identity information to a server;
the server verifies whether the user establishes a binding relationship with the transmission device or not according to the unique identification information and the identity authentication result, and if so, auxiliary unlocking encryption information is sent to the transmission device;
and the transmitting device utilizes the unique secret key decryption to determine whether to open according to the auxiliary unlocking encryption information.
18. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any one of claims 1 to 13 when executing the computer program.
19. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program for executing the method of any one of claims 1 to 13.
CN202010801027.6A 2020-08-11 2020-08-11 Unlocking method and system for transmission device Pending CN111915773A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010801027.6A CN111915773A (en) 2020-08-11 2020-08-11 Unlocking method and system for transmission device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010801027.6A CN111915773A (en) 2020-08-11 2020-08-11 Unlocking method and system for transmission device

Publications (1)

Publication Number Publication Date
CN111915773A true CN111915773A (en) 2020-11-10

Family

ID=73283035

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010801027.6A Pending CN111915773A (en) 2020-08-11 2020-08-11 Unlocking method and system for transmission device

Country Status (1)

Country Link
CN (1) CN111915773A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113898254A (en) * 2021-10-11 2022-01-07 石家庄华泰电力工具有限公司 Remote control method and management system suitable for intelligent safety management cabinet

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001013286A2 (en) * 1999-08-17 2001-02-22 Siemens Aktiengesellschaft Method for distributing goods
CN204087261U (en) * 2014-07-18 2015-01-07 安然 A kind of valuables logistics distribution system
CN104657842A (en) * 2015-03-03 2015-05-27 付飞泉 Intelligent logistics signing method and system
CN107274530A (en) * 2017-06-30 2017-10-20 北京华云网际科技有限公司 The receiving/transmission method and device and system of express delivery
CN108009780A (en) * 2017-12-29 2018-05-08 北京远大宏略科技股份有限公司 A kind of intelligent and safe delivery system
CN108564317A (en) * 2018-03-26 2018-09-21 顺丰科技有限公司 Packing case recycling method, server, user terminal and system
CN109956181A (en) * 2017-12-14 2019-07-02 顺丰科技有限公司 Unlocking method and device
CN110276574A (en) * 2019-03-27 2019-09-24 比奥香港有限公司 A kind of safe delivery system, method, cloud server and electronic equipment
CN110298607A (en) * 2018-03-23 2019-10-01 阿里健康信息技术有限公司 A kind of packing case and its management method

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001013286A2 (en) * 1999-08-17 2001-02-22 Siemens Aktiengesellschaft Method for distributing goods
CN204087261U (en) * 2014-07-18 2015-01-07 安然 A kind of valuables logistics distribution system
CN104657842A (en) * 2015-03-03 2015-05-27 付飞泉 Intelligent logistics signing method and system
CN107274530A (en) * 2017-06-30 2017-10-20 北京华云网际科技有限公司 The receiving/transmission method and device and system of express delivery
CN109956181A (en) * 2017-12-14 2019-07-02 顺丰科技有限公司 Unlocking method and device
CN108009780A (en) * 2017-12-29 2018-05-08 北京远大宏略科技股份有限公司 A kind of intelligent and safe delivery system
CN110298607A (en) * 2018-03-23 2019-10-01 阿里健康信息技术有限公司 A kind of packing case and its management method
CN108564317A (en) * 2018-03-26 2018-09-21 顺丰科技有限公司 Packing case recycling method, server, user terminal and system
CN110276574A (en) * 2019-03-27 2019-09-24 比奥香港有限公司 A kind of safe delivery system, method, cloud server and electronic equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113898254A (en) * 2021-10-11 2022-01-07 石家庄华泰电力工具有限公司 Remote control method and management system suitable for intelligent safety management cabinet

Similar Documents

Publication Publication Date Title
US20210350013A1 (en) Security systems and methods for continuous authorized access to restricted access locations
US9059972B2 (en) Issuing, presenting and challenging mobile device identification documents
CN109274652B (en) Identity information verification system, method and device and computer storage medium
US9112705B2 (en) ID system and program, and ID method
US8751801B2 (en) System and method for authenticating users using two or more factors
TW201741922A (en) Biological feature based safety certification method and device
CN108805573A (en) A kind of Information Authentication method, server and storage medium
US20100042835A1 (en) System and method for permission confirmation by transmitting a secure request through a central server to a mobile biometric device
US11861042B2 (en) Individual data unit and methods and systems for enhancing the security of user data
WO2004066177A1 (en) Card settlement method using portable electronic device having fingerprint sensor
CN110415414B (en) Unlocking method and device of dynamic coded lock based on two-party authentication
CN109389709B (en) Unlocking control system and unlocking control method
CN107113613B (en) Server, mobile terminal, network real-name authentication system and method
US10069820B2 (en) Linked registration
US10810318B2 (en) Method for leveraging a secure telecommunication session
CN106936588A (en) A kind of trustship method, the apparatus and system of hardware controls lock
CN111915773A (en) Unlocking method and system for transmission device
CN111709747B (en) Intelligent terminal authentication method and system
CN104010306A (en) Mobile device user identity authentication system and method
CN101296080B (en) Authorized consumer affirmation method and related device thereof
JP4303952B2 (en) Multiple authentication system, computer program, and multiple authentication method
CA3227278A1 (en) Methods and systems for generating and validating uses of digital credentials and other documents
CN115482132A (en) Data processing method and device for electronic contract based on block chain and server
CN109583977A (en) A kind of certificate chain house pre-sale permit electronics license system and its application method
JP2013009052A (en) Server device, agent authentication method and agent authentication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20201110