CN111915773A - Unlocking method and system for transmission device - Google Patents
Unlocking method and system for transmission device Download PDFInfo
- Publication number
- CN111915773A CN111915773A CN202010801027.6A CN202010801027A CN111915773A CN 111915773 A CN111915773 A CN 111915773A CN 202010801027 A CN202010801027 A CN 202010801027A CN 111915773 A CN111915773 A CN 111915773A
- Authority
- CN
- China
- Prior art keywords
- information
- transmission device
- auxiliary
- unlocking
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 277
- 238000000034 method Methods 0.000 title claims abstract description 100
- 238000012795 verification Methods 0.000 claims abstract description 156
- 238000004891 communication Methods 0.000 claims description 22
- 238000004590 computer program Methods 0.000 claims description 14
- 239000000126 substance Substances 0.000 claims description 6
- 230000008569 process Effects 0.000 abstract description 40
- 238000012546 transfer Methods 0.000 description 20
- 238000012384 transportation and delivery Methods 0.000 description 16
- 238000010586 diagram Methods 0.000 description 15
- 230000006870 function Effects 0.000 description 15
- 238000012545 processing Methods 0.000 description 7
- 238000007726 management method Methods 0.000 description 6
- 239000000872 buffer Substances 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000006399 behavior Effects 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 239000007795 chemical reaction product Substances 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000013523 data management Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000000877 morphologic effect Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000010422 painting Methods 0.000 description 1
- 238000012216 screening Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B49/00—Electric permutation locks; Circuits therefor ; Mechanical aspects of electronic locks; Mechanical keys therefor
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
Abstract
The application provides an unlocking method and system for a transmission device, which are used in the technical field of Internet of things and information security, and overcome the problems that in the prior art, in the transmission process of important articles, the articles are worried about being opened and stolen or falling off a package by a transmission person privately, the articles are dared not to be transmitted randomly and only can be sent and taken personally, even if the articles are transmitted by a person, the worry of the diligence is also raised in the transmission process, after the article is transmitted, disputes occur between a transmitting side and a receiving side and the transmission person due to package damage or number and quality difference, the important articles are put into a special device personally by a shipper and can be monitored in the whole transmission process, only the consignee can clamp the articles to take out the articles through the certification rear side, in addition, the verification process is rigorous, the mobile phone, personal operation, the device legality and the server legality are confirmed, the authentication process is completed through the mobile phone of the client without inputting any information on the device, so that the information safety is guaranteed.
Description
Technical Field
The present application relates to the field of article conveying technologies, and in particular, to an unlocking method and system for a conveying device.
Background
This section is intended to provide a background or context to the embodiments of the application that are recited in the claims. The description herein is not admitted to be prior art by inclusion in this section.
With the development of modern communication technology, various industries provide more convenient and richer electronic channel services by using the modern communication technology, and the application of online banking, electronic commerce and electronic government affairs is continuously emerging, so that great values are created for service providers and users. In the process of these online transactions, many physical connections are involved, general physical connections are mostly realized by express delivery or special employee door-to-door connections, but for some important items, such as bank valuable documents, cash (for example, bank cash is submitted and received, cash delivery is provided for customers to door-to-door), valuable jewelry, ancient calligraphy and painting, data files needing to be kept secret, and the like, the risk that a person is lost during the transit (or partially lost) or stolen exists in the transfer process, and the risk that a dispute is caused after the person signs the money after the transfer arrives exists, so that the transfer of the important items is often completed by the person concerned who is in person at the door-to-door, and many inconveniences exist. The invention aims at the situation, adopts a device and a method, a non-consignee can not open the device in the important article transfer process, the risks of package falling and signature replacing in the process of being taken by a person are avoided, simultaneously the article conveying track and state information can be tracked, an alarm is automatically given when the device is illegally opened, the consignee needs to carry out multiple authentications before the goods are taken out by the opening device, the multiple authentications comprise mobile phone legality authentication, identity authentication and three-party authentication, wherein the identity authentication process is carried out between a server and a client binding mobile phone without inputting any information on the transfer device, the information safety is protected while the risks of package falling or partial package falling and stealing of the person in the important article transfer process are greatly reduced, after the operation of the client is confirmed by an identity authentication card, a round of three-party authentication of identity verification by the transfer device, the server and a terminal device is carried out, illegal behaviors such as fake servers, simulated mobile phones and fake device fishing are prevented, and unlocking is started after the illegal behaviors pass.
Disclosure of Invention
In order to solve at least one of the above problems, an embodiment of the present application provides an unlocking method for a transmission device, which is applied to a terminal device, and includes:
scanning the unique identification information on the transport device;
acquiring authentication information of a user, and comparing the authentication information with locally stored authentication information;
and if the unique identification information and the user identity information are consistent, sending the unique identification information and the user identity information to a server so that the server verifies whether the user establishes a binding relationship with the transmission device or not according to the unique identification information and the identity authentication result, and if so, sending auxiliary unlocking encryption information to the transmission device so that the transmission device determines to open the transmission device according to the auxiliary unlocking encryption information.
In a preferred embodiment, further comprising:
and receiving auxiliary verification information sent by the server so that a user inputs the auxiliary verification information on an input interface of the transmission device to further assist the transmission device in starting.
In a preferred embodiment, further comprising:
inputting auxiliary verification information, wherein the auxiliary verification information is randomly generated by the transmission device;
and sending the auxiliary verification information to a server to assist the server in generating the auxiliary unlocking encryption information.
The embodiment of the present application further provides an unlocking method for a transmission device, which is applied to a server, and includes:
receiving unique identification information and user identity information sent by terminal equipment; the unique identification information is obtained by scanning the transmission device by the terminal equipment, and the user identity information is sent by the terminal equipment after local authentication;
verifying whether the user establishes a binding relationship with the transmission device according to the unique identification information and the user identity information;
if so, generating auxiliary unlocking encryption information, sending the auxiliary unlocking encryption information to the transmission device, so that the transmission device decrypts the auxiliary unlocking encryption information by using a secret key, and determining whether to open the transmission device according to the auxiliary unlocking encryption information.
In a preferred embodiment, after receiving the unique identification information and the user identity information sent by the terminal device, the method further includes:
and randomly generating auxiliary verification information and sending the auxiliary verification information to the terminal equipment and the transmission device so that the user inputs the auxiliary verification information into the transmission device, and the transmission device can compare the input auxiliary verification information with the received auxiliary verification information.
In a preferred embodiment, said verifying whether the user establishes a binding relationship with the transmitting device according to the unique identification information and the user identity information includes:
determining the serial number of the transmission device according to the unique identification information, and searching reserved user identity information which has a binding relationship with the transmission device through the serial number of the transmission device;
and comparing the user identity information with the reserved user identity information, and if the user identity information is consistent with the reserved user identity information, the verification is passed.
In a preferred embodiment, further comprising:
receiving auxiliary verification information and timestamp information sent by terminal equipment; the auxiliary verification information is randomly generated by the transmission device and is input to the terminal equipment; the time stamp information is generated by the transmission device and is used for recording the generation time of the auxiliary verification information;
generating encrypted verification data according to the auxiliary verification information and the timestamp information and by combining an encryption key of the transmission device;
and sending the encrypted verification data to a transmission device so that the transmission device decrypts the encrypted verification data by using a locally stored encryption key, further compares the auxiliary verification information obtained by decryption with the transmission device to generate auxiliary verification information, compares the timestamp information obtained by decryption with the timestamp information generated by the transmission device, and if the comparison is consistent and the auxiliary unlocking encryption information is checked to pass, the transmission device is started.
The embodiment of the present application further provides an unlocking method for a transmission device, which is applied to the transmission device, and includes:
receiving auxiliary unlocking encryption information; the auxiliary unlocking encryption information is generated by adopting the unique secret key encryption of the transmission device after the server verifies that the user establishes the binding relationship with the transmission device according to the unique identification information of the transmission device and the identity authentication result of the terminal equipment; the unique identification information is obtained by the terminal equipment from the transmission device;
and decrypting by using the unique key and determining whether to open according to the auxiliary unlocking encryption information.
In a preferred embodiment, the determining whether to unlock according to the auxiliary unlocking encryption information includes:
decrypting the auxiliary unlocking encrypted information by using the stored secret key to obtain unlocking instruction information;
and verifying the unlocking instruction information, and confirming the unlocking after the verification is passed.
In a preferred embodiment, further comprising:
randomly generating auxiliary verification information, and generating verification data according to the auxiliary verification information and a preset generation rule;
displaying the auxiliary verification information to enable a user to transmit the auxiliary verification information to a server through terminal equipment, and further enabling the server to generate verification data according to the auxiliary verification information and the preset generation rule;
and receiving the encrypted verification data sent by the server, comparing the locally generated verification data with the received verification data, and starting the transmission device after the verification of the auxiliary unlocking encryption information is passed if the comparison is consistent.
In a preferred embodiment, the auxiliary verification information includes a random number with a set number of bits and a timestamp, and the generating verification data according to the auxiliary verification information and a preset generation rule includes:
inputting the random number according to a preset generation rule to generate verification data; wherein the encrypted verification data sent by the server comprises the verification data and a timestamp at which the server generated the verification data.
In a preferred embodiment, further comprising:
receiving auxiliary verification information sent by a server and auxiliary verification information input by a user, wherein the auxiliary verification information input by the user is obtained by the server informing the terminal equipment;
and comparing the two pieces of auxiliary verification information, and if the two pieces of auxiliary verification information are identical, and starting the transmission device after the auxiliary unlocking encryption information passes verification.
The embodiment of the application also provides an unlocking method for the transmission device, which comprises the following steps:
the terminal equipment acquires the unique identification information of the transmission device from the transmission device; acquiring authentication information of a user, comparing the authentication information with locally stored authentication information, and if the authentication information is consistent with the locally stored authentication information, sending the unique identification information and the user identity information to a server;
the server verifies whether the user establishes a binding relationship with the transmission device or not according to the unique identification information and the identity authentication result, and if so, auxiliary unlocking encryption information is sent to the transmission device;
and the transmitting device utilizes the unique secret key decryption to determine whether to open according to the auxiliary unlocking encryption information.
An embodiment of the present application further provides a terminal device, including:
the scanning module acquires the unique identification information of the conveying device from the conveying device;
the comparison module is used for acquiring the authentication information of the user and comparing the authentication information with the authentication information stored locally;
and if the unique identification information and the user identity information are consistent, the sending module sends the unique identification information and the user identity information to a server so that the server verifies whether the user establishes a binding relationship with the transmission device or not according to the unique identification information and the identity authentication result, and if so, sends auxiliary unlocking encryption information to the transmission device so that the transmission device determines to open the transmission device according to the auxiliary unlocking encryption information.
An embodiment of the present application further provides a server, including:
the receiving module is used for receiving the unique identification information and the user identity information sent by the terminal equipment; the unique identification information is obtained by the terminal equipment from the transmitting device, and the user identity information is the authentication information of the terminal equipment collected user and is determined after being compared with the authentication information stored locally;
the binding relation determining module is used for verifying whether the user establishes the binding relation with the transmission device or not according to the unique identification information and the user identity information;
and if so, generating auxiliary unlocking encryption information, sending the auxiliary unlocking encryption information to the transmission device, so that the transmission device decrypts the auxiliary unlocking encryption information by using a secret key, and determining whether to open the transmission device according to the auxiliary unlocking encryption information.
An embodiment of the present application further provides a transmission device, including: a box body; the communication module and the opening module are arranged on the box body; wherein the content of the first and second substances,
the communication module receives the auxiliary unlocking encryption information; the auxiliary unlocking encryption information is generated by adopting the unique secret key encryption of the transmission device after the server verifies that the user establishes the binding relationship with the transmission device according to the unique identification information of the transmission device and the identity authentication result of the terminal equipment; the unique identification information is obtained by the terminal equipment from the transmission device;
and the opening module utilizes the unique key decryption to determine whether to open according to the auxiliary unlocking encryption information.
An embodiment of the present application further provides an article conveying system, including: a transmission device, a terminal device, and a server; wherein the content of the first and second substances,
the terminal equipment acquires the unique identification information of the transmission device from the transmission device; acquiring authentication information of a user, comparing the authentication information with locally stored authentication information, and if the authentication information is consistent with the locally stored authentication information, sending the unique identification information and the user identity information to a server;
the server verifies whether the user establishes a binding relationship with the transmission device or not according to the unique identification information and the identity authentication result, and if so, auxiliary unlocking encryption information is sent to the transmission device;
and the transmitting device utilizes the unique secret key decryption to determine whether to open according to the auxiliary unlocking encryption information.
An embodiment of the present application provides a computer device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor executes the computer program to implement the method according to any one of the first aspect.
An embodiment of the present application provides a computer-readable storage medium, which stores a computer program for executing any one of the methods in the first aspect.
In summary, the present application provides an unlocking method and system for a transmission device, which uses a camera on a terminal device to scan a unique identifier on the transmission device, establishes a connection relationship, then uses a local identity authentication system of the terminal device to authenticate the identity of a user, verifies the identity of the user at a server, determines whether the user is the user who previously bound the transmission device, and if so, opens the transmission device, thereby overcoming the previous problems that the article is stolen or dropped by the transmission personnel privately in the transmission process of the important article, the transmission personnel is not dared to transmit the article freely and only can send the article to the door personally, even if the transmission personnel transmits the article, the problem is worried about in the transmission process, the problem that the receiving and transmitting parties and the transmission personnel are in dispute due to the package damage or the number and the quality difference after the article transmission is completed is solved, the important article is put into a special device by the shipper himself, the whole transfer process can be monitored, only the consignee himself can punch the card device to take out the goods after passing the authentication, the verification process is rigorous, the mobile phone is legal, the personal operation, the device is legal and the server is legal, the safety and the reliability of the transfer of important goods are greatly improved, the authentication process is finished through the mobile phone of the client without inputting any information on the device, and the information safety is guaranteed.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts. In the drawings:
fig. 1 is a schematic diagram of a network architecture of a transmission system according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of an unlocking method for a transmission device executed by a terminal device in an embodiment of the present application;
fig. 3 is a schematic flowchart of an unlocking method for a transmitting device executed by a server in an embodiment of the present application;
fig. 4 is a schematic flow chart of an unlocking method for a transmission device, which is executed by the transmission device in the embodiment of the present application;
fig. 5 is a schematic structural diagram of a terminal device provided in an embodiment of the present application;
fig. 6 is a schematic structural diagram of a server provided in an embodiment of the present application;
fig. 7 is a schematic structural diagram of a conveying device provided in an embodiment of the present application;
fig. 8 is a schematic structural diagram of a computer device suitable for implementing the unlocking method for the transmission device according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and the described embodiments are only a part of the embodiments of the present application, but not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The principles and spirit of the present application are explained in detail below with reference to several representative embodiments of the present application.
Although the present application provides method operational steps or apparatus configurations as illustrated in the following examples or figures, more or fewer operational steps or modular units may be included in the methods or apparatus based on conventional or non-inventive efforts. In the case of steps or structures which do not logically have the necessary cause and effect relationship, the execution sequence of the steps or the module structure of the apparatus is not limited to the execution sequence or the module structure shown in the embodiment or the drawings of the present application. The described methods or modular structures, when applied in an actual device or end product, may be executed sequentially or in parallel according to embodiments or the methods or modular structures shown in the figures.
It should be noted that the unlocking method and device for the transmission device in the present application can be used in the technical field of information security, can also be used in the technical field of internet of things, and certainly can also be used in other technical fields.
Fig. 1 shows a schematic diagram of a network architecture in an embodiment of the present invention. As shown in fig. 1, the transfer system of the present invention includes: terminal equipment 1, server 3 and transmission device 2. Further, the system also comprises a management terminal 4 for data management or operation management and control of the server 3, and the server 3, the terminal device 1, the management terminal 4 and the transmission device 2 are all connected with the server through a network (wired or wireless). The server is provided with a whole system platform which comprises a background service program, a relevant database, an encryption and decryption device and the like. Terminal equipment has installed special APP (also can be as a module of certain APP according to actual conditions), and customer's accessible APP registers, fills in delivery information, locks, unblanks, looks over the state position of corresponding device, receives alarm information, receives and carries out authentication, maintenance modification registration information etc. according to the verification procedure of reserving, and the managers also can accomplish relevant administrative work (authority setting, special page) through APP. The management terminal is used by system management personnel and can be used for writing a secret key and an appointed algorithm into the device security chip SE, registering device information, checking device information, alarming information, upgrading or maintaining a server program and the like.
The terminal device may be a terminal such as a mobile phone, a mobile computer, a handheld smart device, etc. having a camera and having an authentication function such as fingerprint recognition or face recognition, taking the mobile phone as an example, on which a dedicated APP needs to be installed, or an embedded applet is used to borrow a public APP platform, which is not limited in the present invention.
It should be noted that the terminal device may scan the unique identification information on the transmitting device by calling the camera, or may receive the unique identification information of the transmitting device by using an assembly having a wireless transceiving function, such as NFC, without limitation.
The last chamber, tool to lock and communication module of holding of need including holding, the tool to lock opens or closes the chamber that holds that corresponds after receiving a settlement signal, also can realize opening and closing of conveyer through remote control, the user places article in this conveyer during the use, then closes the tool to lock and conveys the transportation, the delivery side utilizes the cell-phone to sweep the sign indicating number and connects, then the server assigns the instruction after the authentication and opens conveyer.
The server is used for receiving the authenticated identity information of the terminal equipment, then comparing the identity information with the 'consignee' bound in the database, if the identity information is consistent with the 'consignee', indicating that the user has the authority of opening the transmission device, and sending an opening instruction to the transmission device to indicate that the transmission device is opened.
The respective apparatuses of the present invention will be described in detail below.
Fig. 2 shows an unlocking method for a transmission device in an embodiment of the present invention, which is applied to a terminal device, and includes:
s11: acquiring unique identification information of a transmission device from the transmission device;
s12: acquiring authentication information of a user, and comparing the authentication information with locally stored authentication information;
s13: and if the unique identification information and the user identity information are consistent, sending the unique identification information and the user identity information to a server so that the server verifies whether the user establishes a binding relationship with the transmission device or not according to the unique identification information and the identity authentication result, and if so, sending auxiliary unlocking encryption information to the transmission device so that the transmission device determines to open the transmission device according to the auxiliary unlocking encryption information.
The application provides an unlocking method for a transmission device, which comprises the steps of scanning a unique identifier on the transmission device by using a camera on a terminal device, establishing a connection relation, then carrying out identity authentication by using a local identity authentication system of the terminal device, verifying the identity of a user at a server terminal, judging whether the user is the user binding the transmission device in advance, and if so, opening the transmission device, thereby overcoming the problems that the goods are illegally opened or stolen or dropped by a transmission person in the transmission process of the important goods, the transmission is not dared to be freely transmitted, only the user can be personally sent to the door, even if the user transmits the goods, the user is wary of worrying about the problems in the transmission process, the package is damaged or the number and the quality difference cause disputes between a transmitter and a receiver and the transmission person after the goods are transmitted, and the important goods are personally put into a special device by a shipper, the system can be monitored in the whole transfer process, the device can be opened to take out the articles only after the consignee passes the authentication, the verification process is rigorous, the mobile phone is legal, the personal operation, the device is legal and the server is legal, the safety and the reliability of the transfer of important articles are greatly improved, the authentication process is finished through the mobile phone of a client without inputting any information on the device, and the information safety is guaranteed.
In a preferred embodiment, further comprising:
and receiving auxiliary authentication information sent by the server so that a user inputs the auxiliary authentication information on an input interface of the transmission device, and further assisting the transmission device to open the accommodating cavity by using the key.
In this embodiment, the secondary authentication may be further performed in cooperation with secondary authentication information, and the secondary authentication information may be randomly generated by the server, and may be, for example, a four-digit random number, such as "5273".
In this embodiment, the specific auxiliary manner may be: the transmitting device randomly generates four random numbers (in this embodiment, the random numbers are pseudo random numbers and can be generated according to a certain rule) in the same manner, and then the transmitting device compares whether the two random numbers are consistent, so that the transmitting device can be started in cooperation with assistance.
Of course, the auxiliary verification information may be sent to the transmission device by the server, and then the transmission device compares whether the auxiliary verification information input by the user is consistent with the auxiliary verification information sent by the server, that is, the transmission device may be started in cooperation with the assistance.
In other embodiments, the auxiliary authentication information may be randomly generated by the transmitting device, and the process of auxiliary authentication may be performed at the server, as shown below, further including:
inputting auxiliary verification information, wherein the auxiliary verification information is randomly generated by the transmission device;
and sending the auxiliary verification information to a server to assist the server in generating the auxiliary unlocking encryption information.
Fig. 3 shows an unlocking method for a transmission device, which is applied to a server and includes:
s21: receiving unique identification information and user identity information sent by terminal equipment; the unique identification information is obtained by scanning the transmission device by the terminal equipment, and the user identity information is sent by the terminal equipment after local authentication;
s22: verifying whether the user establishes a binding relationship with the transmission device according to the unique identification information and the user identity information;
s23: if so, generating auxiliary unlocking encryption information, sending the auxiliary unlocking encryption information to the transmission device, so that the transmission device decrypts the auxiliary unlocking encryption information by using a secret key, and determining whether to open the transmission device according to the auxiliary unlocking encryption information.
The application provides an unlocking method for a transmission device, which comprises the steps of scanning a unique identifier on the transmission device by using a camera on a terminal device, establishing a connection relation, then carrying out identity authentication by using a local identity authentication system of the terminal device, verifying the identity of a user at a server terminal, judging whether the user is the user binding the transmission device in advance, and if so, opening the transmission device, thereby overcoming the problems that the goods are illegally opened or stolen or dropped by a transmission person in the transmission process of the important goods, the transmission is not dared to be freely transmitted, only the user can be personally sent to the door, even if the user transmits the goods, the user is wary of worrying about the problems in the transmission process, the package is damaged or the number and the quality difference cause disputes between a transmitter and a receiver and the transmission person after the goods are transmitted, and the important goods are personally put into a special device by a shipper, the whole transfer process can be monitored, only the consignee himself can punch the card device to take out the goods after passing the authentication, the verification process is rigorous, the mobile phone is legal, the personal operation, the device is legal and the server is legal, the safety and the reliability of the transfer of important goods are greatly improved, the authentication process is finished through the mobile phone of the client without inputting any information on the device, and the information safety is guaranteed.
In a preferred embodiment, the generating of the auxiliary verification information in the above embodiment may further include, after receiving the unique identification information and the user identity information sent by the terminal device:
and randomly generating auxiliary verification information and sending the auxiliary verification information to the terminal equipment and the transmission device so that the user inputs the auxiliary verification information into the transmission device, and the transmission device can compare the input auxiliary verification information with the received auxiliary verification information.
In a preferred embodiment, step S22 specifically includes:
s221: determining the serial number of the transmission device according to the unique identification information, and searching reserved user identity information which has a binding relationship with the transmission device through the serial number of the transmission device;
s222: and comparing the user identity information with the reserved user identity information, and if the user identity information is consistent with the reserved user identity information, the verification is passed.
In a preferred embodiment, further comprising:
receiving auxiliary verification information and timestamp information sent by terminal equipment; the auxiliary verification information is randomly generated by the transmission device and is input to the terminal equipment; the time stamp information is generated by the transmission device and is used for recording the generation time of the auxiliary verification information;
generating encrypted verification data according to the auxiliary verification information and the timestamp information and by combining an encryption key of the transmission device;
and sending the encrypted verification data to a transmission device so that the transmission device decrypts the encrypted verification data by using a locally stored encryption key, further compares the auxiliary verification information obtained by decryption with the transmission device to generate auxiliary verification information, compares the timestamp information obtained by decryption with the timestamp information generated by the transmission device, and if the comparison is consistent and the auxiliary unlocking encryption information is checked to pass, the transmission device is started.
In this embodiment, the encryption information is formed based on the time stamp, and further, the encryption can be performed based on the time stamp, thereby improving the security of the transmission device.
Fig. 4 shows an unlocking method for a conveying device, which is applied to the conveying device and includes the following steps:
s31: receiving auxiliary unlocking encryption information; the auxiliary unlocking encryption information is generated by adopting the unique secret key encryption of the transmission device after the server verifies that the user establishes the binding relationship with the transmission device according to the unique identification information of the transmission device and the identity authentication result of the terminal equipment; the unique identification information is obtained by the terminal equipment from the transmission device;
s32: and decrypting by using the unique key and determining whether to open according to the auxiliary unlocking encryption information.
The application provides an unlocking method for a transmission device, which comprises the steps of scanning a unique identifier on the transmission device by using a camera on a terminal device, establishing a connection relation, then carrying out identity authentication by using a local identity authentication system of the terminal device, verifying the identity of a user at a server terminal, judging whether the user is the user binding the transmission device in advance, and if so, opening the transmission device, thereby overcoming the problems that the goods are illegally opened or stolen or dropped by a transmission person in the transmission process of the important goods, the transmission is not dared to be freely transmitted, only the user can be personally sent to the door, even if the user transmits the goods, the user is wary of worrying about the problems in the transmission process, the package is damaged or the number and the quality difference cause disputes between a transmitter and a receiver and the transmission person after the goods are transmitted, and the important goods are personally put into a special device by a shipper, the whole transfer process can be monitored, only the consignee himself can punch the card device to take out the goods after passing the authentication, the verification process is rigorous, the mobile phone is legal, the personal operation, the device is legal and the server is legal, the safety and the reliability of the transfer of important goods are greatly improved, the authentication process is finished through the mobile phone of the client without inputting any information on the device, and the information safety is guaranteed.
In a preferred embodiment, step S32 includes:
s321: decrypting the auxiliary unlocking encrypted information by using the stored secret key to obtain unlocking instruction information;
s322: and verifying the unlocking instruction information, and confirming the unlocking after the verification is passed.
In a preferred embodiment, the auxiliary authentication information may be generated by the transmitting device itself, i.e. further comprising:
randomly generating auxiliary verification information, and generating verification data according to the auxiliary verification information and a preset generation rule;
displaying the auxiliary verification information to enable a user to transmit the auxiliary verification information to a server through terminal equipment, and further enabling the server to generate verification data according to the auxiliary verification information and the preset generation rule;
and receiving the encrypted verification data sent by the server, comparing the locally generated verification data with the received verification data, and starting the transmission device after the verification of the auxiliary unlocking encryption information is passed if the comparison is consistent.
In a preferred embodiment, the auxiliary verification information includes a random number with a set number of bits and a timestamp, and the generating verification data according to the auxiliary verification information and a preset generation rule includes:
inputting the random number according to a preset generation rule to generate verification data; wherein the encrypted verification data sent by the server comprises the verification data and a timestamp at which the server generated the verification data.
In this embodiment, the encryption information is formed based on the time stamp, and further, the encryption can be performed based on the time stamp, thereby improving the security of the transmission device.
In a preferred embodiment, further comprising:
receiving auxiliary verification information sent by a server and auxiliary verification information input by a user, wherein the auxiliary verification information input by the user is obtained by the server informing the terminal equipment;
and comparing the two pieces of auxiliary verification information, and if the two pieces of auxiliary verification information are identical, and starting the transmission device after the auxiliary unlocking encryption information passes verification.
As is clear to a person skilled in the art, the unlocking method for the transmission device in the invention has the following specific interaction process:
s001: the terminal equipment acquires the unique identification information of the transmission device from the transmission device; acquiring authentication information of a user, comparing the authentication information with locally stored authentication information, and if the authentication information is consistent with the locally stored authentication information, sending the unique identification information and the user identity information to a server;
s002: the server verifies whether the user establishes a binding relationship with the transmission device or not according to the unique identification information and the identity authentication result, and if so, auxiliary unlocking encryption information is sent to the transmission device;
s003: and the transmitting device utilizes the unique secret key decryption to determine whether to open according to the auxiliary unlocking encryption information.
The following is a detailed description with reference to specific scenarios.
The important article transfer method comprises the following processing procedures:
step 100: a system administrator is connected with a management terminal and a transmission device through a USB line, information such as a secret key and an appointed algorithm is written into a security chip SE through a special tool (the method for writing the secret key and the appointment is mature, the secret key is generated by a special tool such as an encryption machine, different devices correspond to different secret keys, and the description is omitted), then the information of the device is recorded into a server, and relevant parameters such as the size and the like of the device can be input through a mode of scanning a two-dimensional code or inputting a box number.
Step 101: if the customer uses for the first time, download APP earlier, accessible scanning box two-dimensional code is according to the suggestion download, also can download to cell-phone application market. If the client is not used for the first time, directly entering the step 103, otherwise entering the step 102;
step 102: the client finishes the registration work, including real-name authentication, mobile phone binding and reserved identity authentication modes, wherein the real-name authentication needs to upload an identity card photo and is compared with the identity verification system of the ministry of public security through face recognition; the mobile phone authentication passes the short message sending authentication code authentication; the mobile phone binding means binding some unique information of a client registered to use the mobile phone, and ensuring that the user can only use the mobile phone for authentication in the future; the reserved identity authentication comprises but is not limited to face recognition, fingerprint recognition, voiceprint recognition and other biological recognition modes, gesture recognition and the like, UKEY recognition and dynamic scrambler recognition (the UKEY and the dynamic scrambler need to be applied to a service provider), reserved password recognition, short message identification code recognition and the like, wherein the face recognition, the fingerprint recognition, the voiceprint recognition and other biological recognition modes call the local existing biological recognition information of the client mobile phone, an uploading server is not needed, and the privacy information of the client is protected. Several combinations of authentication may be used depending on the importance of the item being conveyed; in the process, a client needs to complete a protocol for agreeing to use related information, so that legal risks are avoided;
step 103: a client scans the two-dimension code of the box body, opens the APP, enters an interface corresponding to the device after identity authentication is completed, and inputs consignee information, if the consignee is registered, the consignee can directly input a consignee phone number for verification without error, and then confirms, if the consignee is not registered, the consignee name, address and phone number are input, and the system prompts the client for verification confirmation;
step 104: a client puts articles to be conveyed into the box body, the APP clicks and locks, and the server sends a locking signal after receiving the signal;
step 105: the transmitting device starts an alarm sensor after receiving the locking signal;
step 106: the transmitting device controls lockups (security may be enhanced by a double lock arrangement in some embodiments). If the receiver is not registered, the server can send a short message to the receiver to prompt that important articles are delivered, and prompt the receiver to download the APP in advance and complete registration;
step 107: the device enters the transmission process, both the goods receiving and dispatching parties and the related parties can check the state information sent by the transmission device and the position information sent by the GPS positioning chip through the mobile phone in the process, if the outer box cover is illegally opened or damaged in the transmission process, the sensing alarm unit starts an alarm and sends alarm information to both the goods receiving and dispatching parties and the related parties, the GPS positioner sends the alarm position information to both the goods receiving and dispatching parties and the related parties, and the buzzer buzzes at the same time;
step 108: the receiver scans the two-dimension code of the box body, if the receiver uses for the first time and is not registered, the step 109 is entered, otherwise, the step 110 is directly entered;
step 109: if the receiver uses for the first time and is not registered, downloading APP according to the prompt of scanning the two-dimensional code of the box body and finishing the registration work, wherein the APP comprises real-name authentication, mobile phone binding and reserved identity authentication modes, the real-name authentication needs to upload an identity card photo and is compared with the identity verification system of the public security department through the networking of face recognition, and the authenticator and the receiver are the same person; the mobile phone authentication is authenticated by sending an authentication code through a short message, and the mobile phone number is consistent with the mobile phone number filled by the shipper; the mobile phone binding means binding some unique information of a client registered to use the mobile phone, and ensuring that the user can only use the mobile phone for authentication in the future; the reserved identity authentication comprises but is not limited to face recognition, fingerprint recognition, voiceprint recognition and other biological recognition modes, gesture recognition and the like, UKEY recognition and dynamic scrambler recognition (the UKEY and the dynamic scrambler need to be applied to a service provider), reserved password recognition, short message identification code recognition and the like, wherein the face recognition, the fingerprint recognition, the voiceprint recognition and other biological recognition modes call the local existing biological recognition information of the client mobile phone, an uploading server is not needed, and the privacy information of the client is protected. Several combinations of authentication may be used depending on the importance of the item being conveyed; in the process, a client needs to complete a protocol for agreeing to use related information, so that legal risks are avoided;
step 110: the server receives the two-dimensional code scanning information of the receiver to initiate a receiving request, checks whether the scanning mobile phone is consistent with the binding mobile phone of the corresponding client, and if not, initiates a warning to the sender, the receiver and the related parties. If the authentication result is consistent with the authentication result, the consignee clicks to receive the goods to complete identity authentication, the authentication mode is an authentication mode reserved during consignee registration, and through the step, the operation authentication of the mobile phone legality authentication client is completed;
step 111: after the authentication is passed, the server sends an unlocking signal to the device, three-party verification is started, and the three-party validity of the server, the device and the client mobile phone is confirmed;
step 112: the transmission device turns off the alarm;
step 113: the conveying device controls the box body to finish opening;
step 114: the receiver opens the box and takes the transported item out of the box.
The three-party verification process after the client initiates the unlocking request in step 111 is as follows:
step 111-1: a client clicks unlocking, and an APP sends an unlocking request to a server;
step 111-2: after verifying that the mobile phone of the unlocking request is the bound mobile phone, the server sends the unlocking request to the corresponding transmission device;
step 111-3: after receiving the unlocking request, the transmission device sends the request to the transmission device, then generates a 4-bit random number and displays the random number on a liquid crystal screen, and the random number can automatically change at intervals (such as two minutes);
step 111-4: the APP reminds the client to input the four-digit random number on the liquid crystal display on the APP and confirms the four-digit random number;
step 111-5: after receiving the 4-bit random number, the server calls a key and an appointed algorithm of a corresponding device to perform operation, and a timestamp element is added in the operation process;
step 111-6: the server encrypts the operation result and the timestamp element by the corresponding device key and transmits the encrypted operation result and the encrypted timestamp element to the corresponding device;
step 111-7: the communication module 13 receives the server encrypted information and then transmits the information to the transmission device;
step 111-8: the secure chip SE in the transmission device decrypts the encrypted information;
step 111-9: after the safety chip checks that the timestamp information is valid, the safety chip adds the timestamp into the random number through a self secret key and an agreed algorithm for operation, and compares the result with the result obtained after the information transmitted by the server is decrypted, if the result is consistent, the step 111-11 is executed, otherwise, the step 111-10 is executed;
step 111-10: if the comparison result is inconsistent, unlocking is refused, information is sent to the server, and the step 111 is repeated;
step 111-11: if the comparison result is consistent, the device control unit transmits an unlock signal, and executes step 112 in fig. 3.
It can be understood that the invention overcomes the problems that the prior important goods are only stolen or dropped due to personal opening or personal delivery, the goods are not dared to be delivered randomly but only can be delivered by oneself, even if the goods are delivered, the problem of diligent war is worried in the delivery process, disputes occur between the receiving and sending parties and the delivery personnel due to the damaged package or the difference of number and quality after the goods are delivered, the important goods are put into the special device by the shipper personally, the whole delivery process can be monitored, only the consignee can take out the goods by using the card-clamping device after the certification, the verification process is rigorous, the mobile phone is validated, the personal operation, the device is legal, and the server is legal, the safety and the reliability of the delivery of the important goods are greatly increased, the certification process is finished by the mobile phone of the client without inputting any information on the device, information safety is guaranteed, and the specific advantages are as follows:
1. the device is locked and is initiated by a delivery party in person, and only a receiving party can open the device, so that the safety of the receiving party, the sending party and the delivery party is improved, and the reliability of the delivery of important articles is greatly improved.
2. The authentication process is rigorous, comprises mobile phone validity verification, personal operation authentication (identity authentication), device validity verification and server validity verification, and can effectively deal with various illegal means, such as impersonation of a person, stealing client information operation by using hacker software, operation by using a false server, phishing by using a false device and the like.
Based on the same inventive concept, the present invention provides a terminal device, as shown in fig. 5, comprising:
the scanning module 11 acquires the unique identification information of the conveying device from the conveying device;
the comparison module 12 is used for collecting authentication information of a user and comparing the authentication information with locally stored authentication information;
and if the comparison is consistent, the sending module 13 sends the unique identification information and the user identity information to a server so that the server verifies whether the user establishes a binding relationship with the transmission device according to the unique identification information and the identity authentication result, and if so, sends auxiliary unlocking encryption information to the transmission device so that the transmission device determines to open the transmission device according to the auxiliary unlocking encryption information.
Based on the same inventive concept, the present invention provides a server, as shown in fig. 6, comprising:
the receiving module 21 is used for receiving the unique identification information and the user identity information sent by the terminal equipment; the unique identification information is obtained by the terminal equipment from the transmission device, and the user identity information is sent by the terminal equipment after local authentication;
a binding relation determining module 22, for verifying whether the user establishes a binding relation with the transmitting device according to the unique identification information and the user identity information;
and if so, the auxiliary unlocking encryption information generating module 23 generates auxiliary unlocking encryption information and sends the auxiliary unlocking encryption information to the transmission device, so that the transmission device decrypts the auxiliary unlocking encryption information by using a secret key and determines whether to open the transmission device according to the auxiliary unlocking encryption information.
Based on the same inventive concept, the present invention provides a transfer apparatus, as shown in fig. 7, comprising: a case 31; a communication module 32 and an opening module 33 arranged on the box body; wherein the content of the first and second substances,
the communication module receives the auxiliary unlocking encryption information; the auxiliary unlocking encryption information is generated by adopting the unique secret key encryption of the transmission device after the server verifies that the user establishes the binding relationship with the transmission device according to the unique identification information of the transmission device and the identity authentication result of the terminal equipment; the unique identification information is obtained by scanning the transmission device by the terminal equipment;
and the opening module utilizes the unique key decryption to determine whether to open according to the auxiliary unlocking encryption information.
Further, the present invention provides an article conveying system comprising: a transmission device, a terminal device, and a server; wherein the content of the first and second substances,
the terminal equipment acquires the unique identification information of the transmission device from the transmission device; acquiring authentication information of a user, comparing the authentication information with locally stored authentication information, and if the authentication information is consistent with the locally stored authentication information, sending the unique identification information and the user identity information to a server;
the server verifies whether the user establishes a binding relationship with the transmission device or not according to the unique identification information and the identity authentication result, and if so, auxiliary unlocking encryption information is sent to the transmission device;
and the transmitting device utilizes the unique secret key decryption to determine whether to open according to the auxiliary unlocking encryption information.
It can be understood that the terminal device, the transmission device, the server and the transmission system provided by the invention scan the unique identifier on the transmission device by using the camera on the terminal device to establish the connection relationship, then the local identity authentication system of the terminal device is used for identity authentication, the server side is used for verifying the identity of the user to judge whether the user is the user binding the transmission device first, if so, the transmission device is opened, thereby overcoming the problems that the article is opened and stolen or the package is dropped by the transmission personnel in the transmission process of the important article, the transmission is not dared to be transmitted freely and only the user can send the article to the door in person, even if the user transmits the important article, the problem is worried about in war in the transmission process, the problem that the receiving and transmitting parties and the transmitting personnel have disputes due to the package damage or the number and the quality difference after the article is transmitted is solved, the important article is put into the special device by the shipper in person, the whole transfer process can be monitored, only the consignee himself can punch the card device to take out the goods after passing the authentication, the verification process is rigorous, the mobile phone is legal, the personal operation, the device is legal and the server is legal, the safety and the reliability of the transfer of important goods are greatly improved, the authentication process is finished through the mobile phone of the client without inputting any information on the device, and the information safety is guaranteed.
In terms of hardware, in order to provide an embodiment of the electronic device for implementing all or part of the content in the unlocking method for the transmission device, the electronic device specifically includes the following content:
a processor (processor), a memory (memory), a communication Interface (Communications Interface), and a bus; the processor, the memory and the communication interface complete mutual communication through the bus; the communication interface is used for realizing information transmission among related equipment such as a server, a device, a distributed message middleware cluster device, various databases, a user terminal and the like; the electronic device may be a desktop computer, a tablet computer, a mobile terminal, and the like, but the embodiment is not limited thereto. In this embodiment, the electronic device may refer to the embodiment of the unlocking method for the transmission device and the embodiment of the unlocking method for the transmission device in the embodiments, and the contents thereof are incorporated herein, and repeated descriptions are omitted.
Fig. 8 is a schematic block diagram of a system configuration of an electronic device 9600 according to an embodiment of the present invention. As shown in fig. 8, the electronic device 9600 can include a central processor 9100 and a memory 9140; the memory 9140 is coupled to the central processor 9100. Notably, this FIG. 8 is exemplary; other types of structures may also be used in addition to or in place of the structure to implement telecommunications or other functions.
In one embodiment, the unlocking method function for the transmission device may be integrated into the central processor 9100. For example, the central processor 9100 may be configured to control as follows:
s21: receiving unique identification information and user identity information sent by terminal equipment; the unique identification information is obtained by scanning the transmission device by the terminal equipment, and the user identity information is sent by the terminal equipment after local authentication;
s22: verifying whether the user establishes a binding relationship with the transmission device according to the unique identification information and the user identity information;
s23: if so, generating auxiliary unlocking encryption information, sending the auxiliary unlocking encryption information to the transmission device, so that the transmission device decrypts the auxiliary unlocking encryption information by using a secret key, and determining whether to open the transmission device according to the auxiliary unlocking encryption information.
As can be seen from the above description, the electronic device provided in the embodiment of the present invention verifies the user identity at the server, determines whether the user is a user who has bound the transmission device in advance, and if yes, opens the transmission device, thereby overcoming the problems that in the prior art, the important object is only taken by himself/herself without being delivered because of the fear that the object is stolen or dropped by the delivery person privately, and even if the object is delivered by a person, the problem of the fear of the war is worried about in the delivery process, after the object is delivered, the problem of dispute between the transmitter and receiver and the delivery person due to the damaged package, the number and the quality difference occurs, the important object is put into the dedicated device by the shipper himself/herself, the entire delivery process can be monitored, only the consignee can take out the object by using the card-mounting device after the authentication, and the verification process is rigorous, the mobile phone is confirmed to be legitimate, and the shipper operates the electronic, The device is legal, the server is legal, the safety and the reliability of important article transmission are greatly improved, any information does not need to be input into the device in the authentication process, the authentication is completed through the mobile phone of a client, and the information safety is guaranteed.
In another embodiment, the unlocking method for the transmission device may be configured separately from the central processor 9100, for example, the unlocking method for the transmission device may be configured as a chip connected to the central processor 9100, and the unlocking method function for the transmission device may be realized by the control of the central processor.
As shown in fig. 8, the electronic device 9600 may further include: a communication module 9110, an input unit 9120, an audio processor 9130, a display 9160, and a power supply 9170. It is noted that the electronic device 9600 also does not necessarily include all of the components shown in fig. 8; further, the electronic device 9600 may further include components not shown in fig. 8, which may be referred to in the art.
As shown in fig. 8, a central processor 9100, sometimes referred to as a controller or operational control, can include a microprocessor or other processor device and/or logic device, which central processor 9100 receives input and controls the operation of the various components of the electronic device 9600.
The memory 9140 can be, for example, one or more of a buffer, a flash memory, a hard drive, a removable media, a volatile memory, a non-volatile memory, or other suitable device. The information relating to the failure may be stored, and a program for executing the information may be stored. And the central processing unit 9100 can execute the program stored in the memory 9140 to realize information storage or processing, or the like.
The input unit 9120 provides input to the central processor 9100. The input unit 9120 is, for example, a key or a touch input device. Power supply 9170 is used to provide power to electronic device 9600. The display 9160 is used for displaying display objects such as images and characters. The display may be, for example, an LCD display, but is not limited thereto.
The memory 9140 can be a solid state memory, e.g., Read Only Memory (ROM), Random Access Memory (RAM), a SIM card, or the like. There may also be a memory that holds information even when power is off, can be selectively erased, and is provided with more data, an example of which is sometimes called an EPROM or the like. The memory 9140 could also be some other type of device. Memory 9140 includes a buffer memory 9141 (sometimes referred to as a buffer). The memory 9140 may include an application/function storage portion 9142, the application/function storage portion 9142 being used for storing application programs and function programs or for executing a flow of operations of the electronic device 9600 by the central processor 9100.
The memory 9140 can also include a data store 9143, the data store 9143 being used to store data, such as contacts, digital data, pictures, sounds, and/or any other data used by an electronic device. The driver storage portion 9144 of the memory 9140 may include various drivers for the electronic device for communication functions and/or for performing other functions of the electronic device (e.g., messaging applications, contact book applications, etc.).
The communication module 9110 is a transmitter/receiver 9110 that transmits and receives signals via an antenna 9111. The communication module (transmitter/receiver) 9110 is coupled to the central processor 9100 to provide input signals and receive output signals, which may be the same as in the case of a conventional mobile communication terminal.
Based on different communication technologies, a plurality of communication modules 9110, such as a cellular network module, a bluetooth module, and/or a wireless local area network module, may be provided in the same electronic device. The communication module (transmitter/receiver) 9110 is also coupled to a speaker 9131 and a microphone 9132 via an audio processor 9130 to provide audio output via the speaker 9131 and receive audio input from the microphone 9132, thereby implementing ordinary telecommunications functions. The audio processor 9130 may include any suitable buffers, decoders, amplifiers and so forth. In addition, the audio processor 9130 is also coupled to the central processor 9100, thereby enabling recording locally through the microphone 9132 and enabling locally stored sounds to be played through the speaker 9131.
An embodiment of the present invention further provides a computer-readable storage medium capable of implementing all the steps of the unlocking method for a transmission device, where an execution subject in the above embodiment may be a server, and the computer-readable storage medium stores thereon a computer program which, when executed by a processor, implements all the steps of the unlocking method for a transmission device in the above embodiment.
As can be seen from the above description, the computer-readable storage medium provided in the embodiment of the present invention obtains a filtered edge image by performing edge noise filtering on the initially processed banknote image; performing stroke width transformation according to the image edge points of the edge image and the gradient direction to obtain a stroke width image; forming a connected region in the obtained stroke width image by using morphological operation; and screening all the communicated areas according to the prior information to determine the paper money crown word number area. The paper money serial number can be quickly and accurately positioned.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (devices), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The principle and the implementation mode of the invention are explained by applying specific embodiments in the invention, and the description of the embodiments is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.
Claims (19)
1. An unlocking method for a transmission device, which is applied to a terminal device, is characterized by comprising the following steps:
acquiring unique identification information of a transmission device from the transmission device;
acquiring authentication information of a user, and comparing the authentication information with locally stored authentication information;
and if the unique identification information and the user identity information are consistent, sending the unique identification information and the user identity information to a server so that the server verifies whether the user establishes a binding relationship with the transmission device or not according to the unique identification information and the identity authentication result, and if so, sending auxiliary unlocking encryption information to the transmission device so that the transmission device determines to open the transmission device according to the auxiliary unlocking encryption information.
2. The unlocking method of claim 1, further comprising:
and receiving auxiliary verification information sent by the server so that a user inputs the auxiliary verification information on an input interface of the transmission device to further assist the transmission device in starting.
3. The unlocking method of claim 1, further comprising:
inputting auxiliary verification information, wherein the auxiliary verification information is randomly generated by the transmission device;
and sending the auxiliary verification information to a server to assist the server in generating the auxiliary unlocking encryption information.
4. An unlocking method for a transmission device, which is applied to a server, is characterized by comprising the following steps:
receiving unique identification information and user identity information sent by terminal equipment; the unique identification information is obtained by the terminal equipment from a transmission device, and the user identity information is sent by the terminal equipment after local authentication;
verifying whether the user establishes a binding relationship with the transmission device according to the unique identification information and the user identity information;
if so, generating auxiliary unlocking encryption information, sending the auxiliary unlocking encryption information to the transmission device, so that the transmission device decrypts the auxiliary unlocking encryption information by using a secret key, and determining whether to open the transmission device according to the auxiliary unlocking encryption information.
5. The unlocking method according to claim 4, wherein after receiving the unique identification information and the user identification information transmitted by the terminal device, further comprising:
and randomly generating auxiliary verification information and sending the auxiliary verification information to the terminal equipment and the transmission device so that the user inputs the auxiliary verification information into the transmission device, and the transmission device can compare the input auxiliary verification information with the received auxiliary verification information.
6. The unlocking method of claim 4, wherein said verifying whether the user establishes the binding relationship with the transmission device according to the unique identification information and the user identity information comprises:
determining the serial number of the transmission device according to the unique identification information, and searching reserved user identity information which has a binding relationship with the transmission device through the serial number of the transmission device;
and comparing the user identity information with the reserved user identity information, and if the user identity information is consistent with the reserved user identity information, the verification is passed.
7. The unlocking method of claim 4, further comprising:
receiving auxiliary verification information and timestamp information sent by terminal equipment; the auxiliary verification information is randomly generated by the transmission device and is input to the terminal equipment; the time stamp information is generated by the transmission device and is used for recording the generation time of the auxiliary verification information;
generating encrypted verification data according to the auxiliary verification information and the timestamp information and by combining an encryption key of the transmission device;
and sending the encrypted verification data to a transmission device so that the transmission device decrypts the encrypted verification data by using a locally stored encryption key, further compares the auxiliary verification information obtained by decryption with the transmission device to generate auxiliary verification information, compares the timestamp information obtained by decryption with the timestamp information generated by the transmission device, and if the comparison is consistent and the auxiliary unlocking encryption information is checked to pass, the transmission device is started.
8. An unlocking method for a transmission device, which is applied to the transmission device, is characterized by comprising the following steps:
receiving auxiliary unlocking encryption information; the auxiliary unlocking encryption information is generated by adopting the unique secret key encryption of the transmission device after the server verifies that the user establishes the binding relationship with the transmission device according to the unique identification information of the transmission device and the identity authentication result of the terminal equipment; the unique identification information is obtained by the terminal equipment from the transmission device;
and decrypting by using the unique key and determining whether to open according to the auxiliary unlocking encryption information.
9. The unlocking method according to claim 8, wherein the determining whether to unlock according to the auxiliary unlocking encryption information includes:
decrypting the auxiliary unlocking encrypted information by using the stored secret key to obtain unlocking instruction information;
and verifying the unlocking instruction information, and confirming the unlocking after the verification is passed.
10. The unlocking method according to claim 8, further comprising:
randomly generating auxiliary verification information, and generating verification data according to the auxiliary verification information and a preset generation rule;
displaying the auxiliary verification information to enable a user to transmit the auxiliary verification information to a server through terminal equipment, and further enabling the server to generate verification data according to the auxiliary verification information and the preset generation rule;
and receiving the encrypted verification data sent by the server, comparing the locally generated verification data with the received verification data, and starting the transmission device after the verification of the auxiliary unlocking encryption information is passed if the comparison is consistent.
11. The unlocking method according to claim 10, wherein the auxiliary verification information includes a random number with a set number of bits and a time stamp, and the generating verification data according to the auxiliary verification information and a preset generation rule includes:
inputting the random number according to a preset generation rule to generate verification data; wherein the encrypted verification data sent by the server comprises the verification data and a timestamp at which the server generated the verification data.
12. The unlocking method according to claim 8, further comprising:
receiving auxiliary verification information sent by a server and auxiliary verification information input by a user, wherein the auxiliary verification information input by the user is obtained by the server informing the terminal equipment;
and comparing the two pieces of auxiliary verification information, and if the two pieces of auxiliary verification information are identical, and starting the transmission device after the auxiliary unlocking encryption information passes verification.
13. An unlocking method for a conveyor, comprising:
the terminal equipment acquires the unique identification information of the transmission device from the transmission device; acquiring authentication information of a user, comparing the authentication information with locally stored authentication information, and if the authentication information is consistent with the locally stored authentication information, sending the unique identification information and the user identity information to a server;
the server verifies whether the user establishes a binding relationship with the transmission device or not according to the unique identification information and the identity authentication result, and if so, auxiliary unlocking encryption information is sent to the transmission device;
and the transmitting device utilizes the unique secret key decryption to determine whether to open according to the auxiliary unlocking encryption information.
14. A terminal device, comprising:
the scanning module acquires the unique identification information of the conveying device from the conveying device;
the comparison module is used for acquiring the authentication information of the user and comparing the authentication information with the authentication information stored locally;
and if the unique identification information and the user identity information are consistent, the sending module sends the unique identification information and the user identity information to a server so that the server verifies whether the user establishes a binding relationship with the transmission device or not according to the unique identification information and the identity authentication result, and if so, sends auxiliary unlocking encryption information to the transmission device so that the transmission device determines to open the transmission device according to the auxiliary unlocking encryption information.
15. A server, comprising:
the receiving module is used for receiving the unique identification information and the user identity information sent by the terminal equipment; the unique identification information is obtained by the terminal equipment from a transmission device, and the user identity information is sent by the terminal equipment after local authentication;
the binding relation determining module is used for verifying whether the user establishes the binding relation with the transmission device or not according to the unique identification information and the user identity information;
and if so, generating auxiliary unlocking encryption information, sending the auxiliary unlocking encryption information to the transmission device, so that the transmission device decrypts the auxiliary unlocking encryption information by using a secret key, and determining whether to open the transmission device according to the auxiliary unlocking encryption information.
16. A conveyor, comprising: a box body; the communication module and the opening module are arranged on the box body; wherein the content of the first and second substances,
the communication module receives the auxiliary unlocking encryption information; the auxiliary unlocking encryption information is generated by adopting the unique secret key encryption of the transmission device after the server verifies that the user establishes the binding relationship with the transmission device according to the unique identification information of the transmission device and the identity authentication result of the terminal equipment; the unique identification information is obtained by the terminal equipment from a transmission device;
and the opening module utilizes the unique key decryption to determine whether to open according to the auxiliary unlocking encryption information.
17. An article conveying system, comprising: a transmission device, a terminal device, and a server; wherein the content of the first and second substances,
the terminal equipment acquires the unique identification information of the transmission device from the transmission device; acquiring authentication information of a user, comparing the authentication information with locally stored authentication information, and if the authentication information is consistent with the locally stored authentication information, sending the unique identification information and the user identity information to a server;
the server verifies whether the user establishes a binding relationship with the transmission device or not according to the unique identification information and the identity authentication result, and if so, auxiliary unlocking encryption information is sent to the transmission device;
and the transmitting device utilizes the unique secret key decryption to determine whether to open according to the auxiliary unlocking encryption information.
18. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any one of claims 1 to 13 when executing the computer program.
19. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program for executing the method of any one of claims 1 to 13.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010801027.6A CN111915773A (en) | 2020-08-11 | 2020-08-11 | Unlocking method and system for transmission device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010801027.6A CN111915773A (en) | 2020-08-11 | 2020-08-11 | Unlocking method and system for transmission device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111915773A true CN111915773A (en) | 2020-11-10 |
Family
ID=73283035
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010801027.6A Pending CN111915773A (en) | 2020-08-11 | 2020-08-11 | Unlocking method and system for transmission device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111915773A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113898254A (en) * | 2021-10-11 | 2022-01-07 | 石家庄华泰电力工具有限公司 | Remote control method and management system suitable for intelligent safety management cabinet |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001013286A2 (en) * | 1999-08-17 | 2001-02-22 | Siemens Aktiengesellschaft | Method for distributing goods |
CN204087261U (en) * | 2014-07-18 | 2015-01-07 | 安然 | A kind of valuables logistics distribution system |
CN104657842A (en) * | 2015-03-03 | 2015-05-27 | 付飞泉 | Intelligent logistics signing method and system |
CN107274530A (en) * | 2017-06-30 | 2017-10-20 | 北京华云网际科技有限公司 | The receiving/transmission method and device and system of express delivery |
CN108009780A (en) * | 2017-12-29 | 2018-05-08 | 北京远大宏略科技股份有限公司 | A kind of intelligent and safe delivery system |
CN108564317A (en) * | 2018-03-26 | 2018-09-21 | 顺丰科技有限公司 | Packing case recycling method, server, user terminal and system |
CN109956181A (en) * | 2017-12-14 | 2019-07-02 | 顺丰科技有限公司 | Unlocking method and device |
CN110276574A (en) * | 2019-03-27 | 2019-09-24 | 比奥香港有限公司 | A kind of safe delivery system, method, cloud server and electronic equipment |
CN110298607A (en) * | 2018-03-23 | 2019-10-01 | 阿里健康信息技术有限公司 | A kind of packing case and its management method |
-
2020
- 2020-08-11 CN CN202010801027.6A patent/CN111915773A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001013286A2 (en) * | 1999-08-17 | 2001-02-22 | Siemens Aktiengesellschaft | Method for distributing goods |
CN204087261U (en) * | 2014-07-18 | 2015-01-07 | 安然 | A kind of valuables logistics distribution system |
CN104657842A (en) * | 2015-03-03 | 2015-05-27 | 付飞泉 | Intelligent logistics signing method and system |
CN107274530A (en) * | 2017-06-30 | 2017-10-20 | 北京华云网际科技有限公司 | The receiving/transmission method and device and system of express delivery |
CN109956181A (en) * | 2017-12-14 | 2019-07-02 | 顺丰科技有限公司 | Unlocking method and device |
CN108009780A (en) * | 2017-12-29 | 2018-05-08 | 北京远大宏略科技股份有限公司 | A kind of intelligent and safe delivery system |
CN110298607A (en) * | 2018-03-23 | 2019-10-01 | 阿里健康信息技术有限公司 | A kind of packing case and its management method |
CN108564317A (en) * | 2018-03-26 | 2018-09-21 | 顺丰科技有限公司 | Packing case recycling method, server, user terminal and system |
CN110276574A (en) * | 2019-03-27 | 2019-09-24 | 比奥香港有限公司 | A kind of safe delivery system, method, cloud server and electronic equipment |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113898254A (en) * | 2021-10-11 | 2022-01-07 | 石家庄华泰电力工具有限公司 | Remote control method and management system suitable for intelligent safety management cabinet |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210350013A1 (en) | Security systems and methods for continuous authorized access to restricted access locations | |
US9059972B2 (en) | Issuing, presenting and challenging mobile device identification documents | |
CN109274652B (en) | Identity information verification system, method and device and computer storage medium | |
US9112705B2 (en) | ID system and program, and ID method | |
US8751801B2 (en) | System and method for authenticating users using two or more factors | |
TW201741922A (en) | Biological feature based safety certification method and device | |
CN108805573A (en) | A kind of Information Authentication method, server and storage medium | |
US20100042835A1 (en) | System and method for permission confirmation by transmitting a secure request through a central server to a mobile biometric device | |
US11861042B2 (en) | Individual data unit and methods and systems for enhancing the security of user data | |
WO2004066177A1 (en) | Card settlement method using portable electronic device having fingerprint sensor | |
CN110415414B (en) | Unlocking method and device of dynamic coded lock based on two-party authentication | |
CN109389709B (en) | Unlocking control system and unlocking control method | |
CN107113613B (en) | Server, mobile terminal, network real-name authentication system and method | |
US10069820B2 (en) | Linked registration | |
US10810318B2 (en) | Method for leveraging a secure telecommunication session | |
CN106936588A (en) | A kind of trustship method, the apparatus and system of hardware controls lock | |
CN111915773A (en) | Unlocking method and system for transmission device | |
CN111709747B (en) | Intelligent terminal authentication method and system | |
CN104010306A (en) | Mobile device user identity authentication system and method | |
CN101296080B (en) | Authorized consumer affirmation method and related device thereof | |
JP4303952B2 (en) | Multiple authentication system, computer program, and multiple authentication method | |
CA3227278A1 (en) | Methods and systems for generating and validating uses of digital credentials and other documents | |
CN115482132A (en) | Data processing method and device for electronic contract based on block chain and server | |
CN109583977A (en) | A kind of certificate chain house pre-sale permit electronics license system and its application method | |
JP2013009052A (en) | Server device, agent authentication method and agent authentication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20201110 |