CN112330855A - Electronic lock safety management method, equipment and system - Google Patents

Electronic lock safety management method, equipment and system Download PDF

Info

Publication number
CN112330855A
CN112330855A CN202011087270.2A CN202011087270A CN112330855A CN 112330855 A CN112330855 A CN 112330855A CN 202011087270 A CN202011087270 A CN 202011087270A CN 112330855 A CN112330855 A CN 112330855A
Authority
CN
China
Prior art keywords
electronic lock
mobile terminal
user
cloud server
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011087270.2A
Other languages
Chinese (zh)
Other versions
CN112330855B (en
Inventor
戚建淮
郑伟范
宋晶
姚兆东
罗刚
罗俊炘
杨开碧
周杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Ether Node Technology Co ltd
Original Assignee
Chengdu Ether Node Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Ether Node Technology Co ltd filed Critical Chengdu Ether Node Technology Co ltd
Priority to CN202011087270.2A priority Critical patent/CN112330855B/en
Publication of CN112330855A publication Critical patent/CN112330855A/en
Application granted granted Critical
Publication of CN112330855B publication Critical patent/CN112330855B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Abstract

The embodiment of the invention provides a method, equipment and a system for managing the safety of an electronic lock, wherein the method comprises the following steps: the cloud server obtains user identity information to be verified and bound, the electronic lock determines that the mobile terminal is a legal user, a password obtaining request is sent to the cloud server, the cloud server distributes a secret key to the electronic lock according to the received password obtaining request, the cloud server generates a dynamic password according to the response of the electronic lock and sends the dynamic password to the electronic lock, the electronic lock verifies the dynamic password according to the received secret key, unlocking is carried out after the verification is passed, finally the cloud server cancels the dynamic password based on a secret key deleting result fed back by the electronic lock, the cloud server carries out safety management on the password, and business services and password safety services of the electronic lock are separated, so that not only is user data safety guaranteed, but also the business execution efficiency of the electronic lock is improved, and quick and flexible electronic lock safety management is realized.

Description

Electronic lock safety management method, equipment and system
Technical Field
The invention relates to the technical field of information security, in particular to a method, equipment and a system for security management of an electronic lock.
Background
With the continuous development of the internet of things, the electronic lock is widely used and becomes an indispensable part of the life of people. The password in the electronic lock is produced in batch in advance and stored in a charged Erasable Programmable read only memory (EEPROM for short), and has certain potential safety hazard. The password service mode of the electronic lock is similar to the password service of the internet application, for most internet applications, a user needs to register an account and set a password, the number of user accounts and passwords is increased, the management difficulty of the user on the accounts and the passwords is increased, and for most internet applications, business service and password security service are provided by an application provider, so that the application provider has all resources for analyzing user data.
Existing electronic locks can be divided into two main categories: the first category is a fixed password (i.e., static password) that can be set by a user, the fixed password is stored in a nonvolatile memory, the user inputs a password each time the user unlocks the lock, the password input by the user is checked against the fixed password stored in the nonvolatile memory, the lock is unlocked when the password input by the user is compared with the fixed password stored in the nonvolatile memory, and the user needs to input the password again when the password input by the user is not compared with the fixed password stored in the nonvolatile memory. However, the static password cannot be modified for a long time in use, if the static password is repeatedly modified, the user can easily forget the static password, even if the password value in the nonvolatile memory can be modified through password setting to update the password so as to enhance the security, the static password is easily stolen by lawbreakers along with long-term use and development of high-tech criminal means, and great risk is brought to the security of life and property of the user. The second category is the situation of using the electronic key, which can be various contact or non-contact magnetic cards, electronic tags such as IC cards, etc., the electronic tags are pre-authorized in the centralized authentication system and can be used for unlocking, and with each use of the electronic key, in the process of data exchange between the electronic key and the electronic lock, the passwords in the nonvolatile memory and the electronic key are dynamically updated through an algorithm or random numbers, so that the electronic tags are not easily imitated or cracked by others, thereby solving the trouble that a user needs to remember the passwords to a certain extent, but for a temporary user, the user needs to give the electronic key to the temporary user and needs to withdraw the electronic key in time after use, the flexibility of using the electronic key is poor, and the quick service that the temporary user can check at any time cannot be realized.
In summary, how to design a safe and convenient password service which can ensure the safety of user data, enable a user not to remember an account password any more, does not need to carry a key, and realizes the purpose of checking at any time is an urgent problem to be solved for realizing the quick and flexible safety management of an electronic lock while ensuring the safety of the user data.
Disclosure of Invention
The embodiment of the invention provides a method, equipment and a system for electronic lock safety management, which solve the problems that a cloud server is used for carrying out safety management on a password, and the business service and the password safety service of an electronic lock are separated, so that the electronic lock only needs to verify a dynamic password by using a secret key fed back by the cloud server to automatically complete lock opening and closing service, not only is the user data safety ensured, but also the quick and flexible electronic lock safety management is realized, and the ever-increasing business requirements of users are met.
In a first aspect, an embodiment of the present invention provides a method for managing security of an electronic lock, where the method includes:
the method comprises the steps that a cloud server obtains an identity registration request sent by a mobile terminal, wherein the identity registration request comprises user identity information;
the cloud server verifies the user identity information, and after the user identity information passes the verification, the cloud server forms a corresponding relation between the user identity information and the identification information of the mobile terminal and stores the corresponding relation in a database of the cloud server;
the electronic lock acquires identification information of the mobile terminal according to an unlocking instruction initiated by the mobile terminal;
the electronic lock determines that the mobile terminal is a legal user based on the identification information of the mobile terminal;
the electronic lock sends a password acquisition request to the cloud server, wherein the password acquisition request comprises identification information of the mobile terminal and identification information of the electronic lock;
the cloud server distributes a key to the electronic lock according to the received password acquisition request and sends the key to the electronic lock;
the electronic lock responds to the cloud server after receiving the key;
the cloud server generates a dynamic password according to the secret key after receiving the response of the electronic lock;
the cloud server sends the dynamic password to the electronic lock;
the electronic lock verifies the dynamic password and unlocks after the dynamic password passes the verification;
the electronic lock deletes the key according to a locking instruction initiated by the mobile terminal and sends a deletion result to the cloud server;
and the cloud server logs out the dynamic password based on the deletion result.
Further, the verifying the user identity information by the cloud server includes: the cloud server acquires the biological characteristics of the user through the mobile terminal, matches the biological characteristics of the user with the user identity information, and determines that the user passes the verification under the condition of successful matching.
Further, the acquiring, by the electronic lock, the identification information of the mobile terminal according to the unlocking instruction initiated by the mobile terminal includes: and the electronic lock establishes WiFi connection with the mobile terminal according to the unlocking instruction initiated by the mobile terminal, so that the identification information of the mobile terminal is acquired.
Further, the determining, by the electronic lock, that the mobile terminal is a valid user based on the identification information of the mobile terminal includes: after the electronic lock judges that the mobile terminal is the user bound for the first time according to the identification information of the mobile terminal, the electronic lock determines that the mobile terminal is a legal user, and/or,
the electronic lock sends an authorization request to the first bound user after judging that the mobile terminal is not the first bound user according to the identification information of the mobile terminal, and determines that the mobile terminal is a legal user after receiving an allowance response sent by the first bound user, wherein the authorization request is used for requesting whether the first bound user allows the mobile terminal to be listed as the legal user, and the authorization request comprises the identification information of the mobile terminal.
Further, the method further comprises: and if the electronic lock receives the refusal response sent by the first bound user or does not receive the response of the first bound user under a preset condition, the mobile terminal is listed as an illegal user.
The embodiment of the invention provides an electronic lock safety management method, a cloud server of the invention verifies user identity information after acquiring an identity registration request sent by a mobile terminal, after the verification is passed, the user identity information and identification information of the mobile terminal form a corresponding relation and are stored in a database of the cloud server, then the electronic lock acquires the identification information of the mobile terminal according to an unlocking instruction initiated by the mobile terminal, a password acquisition request is sent to the cloud server after the mobile terminal is determined to be a legal user based on the identification information of the mobile terminal, then the cloud server distributes a secret key for the electronic lock according to the received password acquisition request and sends the secret key to the electronic lock, so that the electronic lock responds to the cloud server after receiving the secret key, the cloud server generates a dynamic password according to the secret key after receiving the response of the electronic lock and sends the dynamic password to the electronic lock, then the electronic lock verifies the dynamic password according to the secret key, after the verification is passed, the electronic lock is unlocked, then the electronic lock deletes the secret key according to a locking instruction initiated by the mobile terminal and sends a deletion result to the cloud server, so that the cloud server can conveniently delete the dynamic password based on the deletion result, the business service and the password security service of the electronic lock are separated by carrying out security management on the password, the electronic lock only needs to verify the dynamic password by using the secret key fed back by the cloud server to automatically complete the lock-locking service, the data security of a user is ensured, and the password security management of 'preventing from outside and preventing from inside' is realized, meanwhile, the user can not remember the account password any more, and does not need to carry a key, so that the safe and convenient password service of checking at any time and using at one secret can be realized, and the quick and flexible safety management of the electronic lock can be realized.
In a second aspect, an embodiment of the present invention further provides an electronic lock security management apparatus, which is applied to a cloud server, and includes:
the identity registration module is used for acquiring an identity registration request sent by the mobile terminal, wherein the identity registration request comprises user identity information;
the identity authentication module is used for authenticating the user identity information, and after the authentication is passed, the identity authentication module forms a corresponding relation between the user identity information and the identification information of the mobile terminal and stores the corresponding relation in a database of the identity authentication module;
the request acquisition module is used for receiving a password acquisition request sent by an electronic lock, wherein the password acquisition request comprises identification information of the mobile terminal and identification information of the electronic lock, the password acquisition request is the request sent by the electronic lock after the electronic lock acquires the identification information of the mobile terminal based on an unlocking instruction initiated by the mobile terminal and the mobile terminal is determined to be a legal user according to the identification information of the mobile terminal;
the password management module is used for distributing a key to the electronic lock according to the received password acquisition request and sending the key to the electronic lock;
the password management module is also used for generating a dynamic password according to the secret key after receiving the response of the electronic lock;
the password management module is also used for sending the dynamic password to the electronic lock so that the electronic lock can verify the dynamic password and unlock the electronic lock after the dynamic password passes the verification;
the password management module is further configured to cancel the dynamic password based on a deletion result sent by the electronic lock, where the deletion result is a result of deleting the secret key by the electronic lock according to a locking instruction initiated by the mobile terminal.
Further, the identity verification module is configured to: and acquiring the biological characteristics of the user through the mobile terminal, matching the biological characteristics of the user with the identity information of the user, and determining that the user passes the verification under the condition of successful matching.
The electronic lock safety management device provided by the embodiment of the invention is applied to a cloud server, an identity registration module in the cloud server verifies user identity information after acquiring an identity registration request sent by a mobile terminal, after the verification is passed, the user identity information and identification information of the mobile terminal form a corresponding relation and are stored in a database of the cloud server, then a request acquisition module receives a password acquisition request sent by the electronic lock, a password management module distributes a secret key for the electronic lock according to the received password acquisition request and sends the secret key to the electronic lock, the password management module is also used for generating a dynamic password according to the secret key after receiving a response of the electronic lock, and the password management module is also used for sending the dynamic password to the electronic lock, the electronic lock is convenient to verify the dynamic password, the electronic lock is unlocked after the dynamic password is verified, the password management module is further used for canceling the dynamic password based on a deleting result sent by the electronic lock, the cloud server is used for safely managing the password, and business service and password safety service of the electronic lock are separated, so that the electronic lock only needs to verify the dynamic password by using a secret key fed back by the cloud server to automatically complete locking and unlocking service, the user data safety is guaranteed, the password safety management of 'preventing from outside and inside' is achieved, meanwhile, a user can not remember an account password any more, a key is not needed to be carried, the password service is safe and convenient, the password service is verified at any time, and the electronic lock is used conveniently and quickly.
In a third aspect, an embodiment of the present invention further provides an electronic lock, including:
the system comprises an acquisition module, a storage module and a processing module, wherein the acquisition module is used for acquiring identification information of a mobile terminal according to an unlocking instruction initiated by the mobile terminal, the identification information of the mobile terminal is information which is obtained by a cloud server after acquiring an identity registration request sent by the mobile terminal, verifies user identity information in the identity registration request, and after the verification is passed, the identification information of the mobile terminal and the user identity information form a corresponding relation and are stored in a database of the mobile terminal;
the identification module is used for determining the mobile terminal as a legal user according to the identification information of the mobile terminal;
the request module is used for sending a password acquisition request to the cloud server;
the response module is used for responding to the cloud server after receiving a key, wherein the key is a key distributed to the electronic lock by the cloud server according to the received password acquisition request, and the password acquisition request comprises identification information of the mobile terminal and identification information of the electronic lock;
the receiving module is used for receiving a dynamic password sent by the cloud server, wherein the dynamic password is generated by the cloud server according to the secret key after receiving the response of the electronic lock;
the verification module is used for verifying the dynamic password and unlocking after the dynamic password passes the verification;
and the deleting module is used for deleting the key according to a locking instruction initiated by the mobile terminal and sending a deleting result to the cloud server so that the cloud server can log out the dynamic password based on the deleting result.
Further, the obtaining module is configured to: and establishing WiFi connection with the mobile terminal according to the unlocking instruction initiated by the mobile terminal, so as to acquire the identification information of the mobile terminal.
Further, the identification module is configured to: after the mobile terminal is judged to be the user bound for the first time according to the identification information of the mobile terminal, the mobile terminal is determined to be a legal user, and/or,
after judging that the mobile terminal is not the first bound user according to the identification information of the mobile terminal, sending an authorization request to the first bound user, and after receiving an allowance response sent by the first bound user, determining that the mobile terminal is a legal user, wherein the authorization request is used for requesting whether the first bound user allows the mobile terminal to be listed as a legal user, and the authorization request comprises the identification information of the mobile terminal.
Further, the identification module is further configured to: and if the electronic lock receives the refusal response sent by the first bound user or does not receive the response of the first bound user under a preset condition, the mobile terminal is listed as an illegal user.
In the electronic lock provided by the embodiment of the invention, the acquisition module of the electronic lock acquires the identification information of the mobile terminal according to the unlocking instruction initiated by the mobile terminal, then the identification module determines that the mobile terminal is a legal user according to the identification information of the mobile terminal, then the request module sends the password acquisition request to the cloud server, the response module responds to the cloud server after receiving the secret key, then the receiving module receives the dynamic password sent by the cloud server, the verification module verifies the dynamic password, the electronic lock is unlocked after the verification is passed, finally the deletion module deletes the secret key according to the locking instruction initiated by the mobile terminal and sends the deletion result to the cloud server so that the cloud server can conveniently logout the dynamic password based on the deletion result and safely interacts the password with the cloud server, the service and the password security service of the electronic lock are separated, so that the electronic lock only needs to verify the dynamic password by using the secret key fed back by the cloud server to automatically complete the lock opening and closing service, the user data security is guaranteed, the password security management of 'preventing from outside and inside' is realized, the user can not remember the account password any more, the key is not required to be carried, the safe and convenient password service of using one password and using one password at any time is realized, and the quick and flexible electronic lock security management is realized.
In a fourth aspect, an embodiment of the present invention further provides an electronic lock security management system, where the system includes: the mobile terminal, the cloud server of the second aspect, and the electronic lock of the third aspect.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic structural diagram of an electronic lock security management system according to an embodiment of the present invention;
fig. 2 is a flowchart of a method for managing security of an electronic lock according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an electronic lock security management apparatus according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an electronic lock according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, an architecture diagram of an electronic lock security management system provided in an embodiment of the present invention includes: the cloud server can directly interact with the electronic lock in the system, and data interaction is performed between the electronic lock APP installed on the mobile terminal by a user and the mobile terminal.
As shown in fig. 2, a flowchart of an electronic lock security management method according to an embodiment of the present invention is provided, where the method includes:
step 201, the cloud server obtains an identity registration request sent by the mobile terminal.
Wherein, the identity registration request comprises user identity information.
As will be described with reference to fig. 1, a user fills in own identity information through an electronic lock APP installed on a mobile terminal of the user, so as to initiate an identity registration request to a cloud server, where the identity registration request includes user identity information, and the user identity information includes a name, an address, an identity number, a certificate photo, biometric information of the user, a mobile phone number, and other contents of the user.
Step 202, the cloud server verifies the user identity information, and after the user identity information passes the verification, the cloud server forms a corresponding relationship between the user identity information and the identification information of the mobile terminal and stores the corresponding relationship in a database of the cloud server.
The cloud server verifies the user identity information, and the verification comprises the following steps: the cloud server acquires the biological characteristics of the user through the mobile terminal, matches the biological characteristics of the user with the user identity information, and determines that the user passes the verification under the condition of successful matching.
In this step, the cloud server needs to verify the acquired user identity information, the cloud server collects the biological characteristics of the user through the APP installed on the mobile terminal, and may collect one or more characteristics of the face, voice, fingerprint, palm print, and the like of the user, the collected content may be set by the cloud server according to the actual business requirements, where no specific limitation is made, then the mobile terminal feeds back the collected characteristics of the user to the cloud server, then the cloud server matches the acquired one or more combined biological characteristics with the certificate photo, the user biological identification information, and the like in the acquired user identity information, and if the matching is successful, the user identity information passes the verification, and then the user identity information is bound with the identification information of the MAC address, the device serial number, and the like of the mobile terminal, so that the corresponding relationship is formed and stored in the database of the cloud server, thereby completing the account registration of the user .
And 203, the electronic lock acquires the identification information of the mobile terminal according to the unlocking instruction initiated by the mobile terminal.
The electronic lock acquires the identification information of the mobile terminal according to the unlocking instruction initiated by the mobile terminal, and the method comprises the following steps: and the electronic lock establishes WiFi connection with the mobile terminal according to the unlocking instruction initiated by the mobile terminal, so that the identification information of the mobile terminal is acquired.
In this step, the electronic lock may be associated with a home router of the user (i.e., a wireless access point AP in the home of the user) in advance, and successfully register on the AP, when the user needs to unlock the door, the user initiates an unlock instruction to the electronic lock by logging in the APP, since the mobile terminal is successfully registered on the AP, the electronic lock may establish a WiFi connection with the mobile terminal by opening a WiFi function of the electronic lock itself, and further quickly and safely acquire identification information such as a MAC address and an equipment serial number of the mobile terminal, and the electronic lock may also acquire the identification information of the mobile terminal in other manners, such as bluetooth, infrared ray, or NFC, in this embodiment of the present invention, it is preferable to acquire the identification information of the mobile terminal by establishing a WiFi connection with the mobile terminal, mainly because compared to wireless communication manners such as bluetooth and infrared ray, utilize the wiFi to connect and carry out wireless communication mode, have that the signal is difficult to be sheltered from, signal transmission distance is short, information transfer efficiency is higher and user's privacy obtains advantages such as security guarantee more easily to this electronic lock can be fast and safe acquireing mobile terminal's relevant information.
And step 204, the electronic lock determines that the mobile terminal is a legal user based on the identification information of the mobile terminal.
Wherein, the electronic lock determines that the mobile terminal is a legal user based on the identification information of the mobile terminal, including: after the electronic lock judges that the mobile terminal is the user bound for the first time according to the identification information of the mobile terminal, the electronic lock determines that the mobile terminal is a legal user, and/or,
the electronic lock sends an authorization request to the first bound user after judging that the mobile terminal is not the first bound user according to the identification information of the mobile terminal, and determines that the mobile terminal is a legal user after receiving an allowance response sent by the first bound user, wherein the authorization request is used for requesting whether the first bound user allows the mobile terminal to be listed as the legal user, and the authorization request comprises the identification information of the mobile terminal.
Further, the electronic lock receives a refusal response sent by the first-time binding user or does not receive the response of the first-time binding user under a preset condition, and then the mobile terminal is listed as an illegal user.
In this step, the electronic lock determines whether the mobile terminal is a user bound for the first time in its own database according to the obtained identification information of the mobile terminal, such as the MAC address, the device serial number, etc., and if the electronic lock does not find any record of the mobile terminal device in the device identification list of its own database, the mobile terminal may be determined as the user bound for the first time by the electronic lock, where the device identification list may be a MAC address list, a mobile terminal device serial number list, or a list in which the two are correspondingly combined, as long as the list can play a role of unique identification for the mobile terminal device, this is not specifically limited, and in the following embodiments of the present invention, the MAC address list is used as an example, and since no record of the mobile terminal exists in the MAC address list of the electronic lock when the electronic lock is used for the first time, only the user using the electronic lock will firstly bind the own mobile terminal with the electronic lock, so that the mobile terminal can be determined to be a legal user and have the authority of an administrator.
Further, if the electronic lock judges that the mobile terminal is not the user bound for the first time in the MAC address list of its own database according to the obtained identification information such as the MAC address, the device serial number, etc. of the mobile terminal, that is, the user bound for the first time already exists in the MAC address list of the electronic lock, the electronic lock may send an authorization request to the user bound for the first time according to the record of the MAC address list, where the authorization request includes the identification information such as the MAC address, the device serial number, etc. of the mobile terminal, the authorization request is used to ask whether the user bound for the first time allows the mobile terminal to be listed as a legitimate user, and after receiving an agreement message fed back by the user bound for the first time, the electronic lock determines that the mobile terminal is a legitimate user, may add the mobile terminal to the MAC address list, and may set a certain validity period for the electronic lock after adding the mobile terminal to the MAC address list, when the validity period is over, the electronic lock can automatically clear the MAC address of the mobile terminal, and by verifying the validity of the mobile terminal and making an authorization request to a user with administrator authority, the family safety of the user is guaranteed, and meanwhile, temporary users (such as relatives, friends and the like of the user) can conveniently follow up, and quick and safe service when guests visit temporarily is realized.
In addition, under the condition that the electronic lock judges that the mobile terminal is not the user bound for the first time, after an authorization request is sent to the user bound for the first time, if the electronic lock receives a refusal message sent by the user bound for the first time, or the electronic lock does not receive the response of the first-bound user after continuously sending the authorization request for the preset times to the first-bound user or within the preset time after sending the authorization request, the mobile terminal is listed as an illegitimate user, its MAC address is added to a blacklist of MAC address lists, the electronic lock will not remove the MAC address added to the blacklist from the list unless authorized by the first bound user, therefore, the family safety of the user is further guaranteed, and it should be noted that the preset times and the preset time can be set according to the actual scene, and are not specifically limited herein.
In addition, on the basis, the electronic lock can set the user authority according to the actual situation, for example, the name of the user bound for the first time can be set to be 2 or 3 in the database of the electronic lock, the electronic lock can be set and adjusted according to the family role of the user, and the authorization validity period can be set for the authorization of the temporary user, so that the temporary user can operate within the authorization validity period, which is not specifically limited herein.
Step 205, the electronic lock sends a password acquisition request to the cloud server.
The password obtaining request comprises identification information of the mobile terminal and identification information of the electronic lock.
In this step, with reference to step 204, after the electronic lock determines that the mobile terminal is a valid user, a password acquisition request is sent to the cloud server, where the password acquisition request includes identification information such as the device parameters of the mobile terminal and the electronic lock.
And step 206, the cloud server distributes a key to the electronic lock according to the received password acquisition request and sends the key to the electronic lock.
In this step, the cloud server receives a password acquisition request sent by the electronic lock, searches in its own database according to identification information such as the MAC address of the mobile terminal and the device serial number in the password acquisition request, finds that the information is registration information of a user that has been previously stored correspondingly, randomly allocates a key to the electronic lock and stores the key, where the key has validity, and is randomly generated by the cloud server according to the identification information such as the MAC address of the mobile terminal and the device serial number and the identification information of the electronic lock, and sends the key to the electronic lock.
And step 207, responding to the cloud server after the electronic lock receives the key.
In this step, after receiving the key sent by the cloud server, the electronic lock feeds back a confirmation message to the cloud server so as to respond in time.
And 208, the cloud server generates a dynamic password according to the secret key after receiving the response of the electronic lock.
In this step, after receiving the confirmation message fed back by the electronic lock, the cloud service generates a dynamic password according to the secret key.
And step 209, the cloud server sends the dynamic password to the electronic lock.
In this step, the cloud server sends the dynamic password generated in step 208 to the electronic lock.
And step 210, the electronic lock verifies the dynamic password, and after the dynamic password passes the verification, the electronic lock is unlocked.
In this step, after receiving the dynamic password sent by the cloud server, the electronic lock decrypts the dynamic password by using the previously received secret key, and if the decryption is successful, the electronic lock passes the verification, so that the electronic lock automatically unlocks based on the dynamic password after passing the verification, and the dynamic password is a changed password.
Further, if the electronic lock cannot decrypt the dynamic password by using the previously received secret key, the verification fails, the electronic lock feeds back a result of the verification failing to the cloud server, so that the cloud server randomly allocates a secret key to the electronic lock and sends the secret key to the electronic lock, and then the steps 208 to 210 are repeated, so that the electronic lock can successfully decrypt the dynamic password, when the dynamic password sent by the cloud server reaches a preset number (for example, 3), the preset number can be set by an actual scene, which is not specifically limited, and if the electronic lock is not successfully decrypted, the electronic lock sends an alarm prompt to the user in the form of sound, light and the like, so as to prompt the user to restart the APP of the mobile terminal, and request for unlocking again.
And step 211, the electronic lock deletes the key according to the locking instruction initiated by the mobile terminal and sends the deletion result to the cloud server.
In this step, when the user exits from the APP on the mobile terminal or clicks the locking operation on the APP, the electronic lock deletes the stored key according to the locking instruction initiated by the mobile terminal, and simultaneously feeds back the deletion result to the cloud server.
In addition, the electronic lock can delete the stored key according to the locking instruction initiated by the mobile terminal, and can delete the stored key after the electronic lock is automatically unlocked and feed back the deletion result to the cloud server, so that the synchronous cloud server can process the dynamic password in time, and further the security management of the password is optimized.
And 212, logging out the dynamic password by the cloud server based on the deletion result.
In this step, in combination with step 211, the cloud server cancels the dynamic password according to the deletion result fed back by the electronic lock, and sets the dynamic password to an invalid state.
The embodiment of the invention provides an electronic lock safety management method, which comprises the following steps: after acquiring an identity registration request sent by a mobile terminal, a cloud server verifies user identity information, after the verification is passed, the user identity information and identification information of the mobile terminal form a corresponding relation and are stored in a database of the cloud server, then an electronic lock acquires the identification information of the mobile terminal according to an unlocking instruction initiated by the mobile terminal, after the mobile terminal is determined to be a legal user based on the identification information of the mobile terminal, a password acquisition request is sent to the cloud server, then the cloud server distributes a secret key for the electronic lock according to the received password acquisition request and sends the secret key to the electronic lock, so that the electronic lock responds to the cloud server after receiving the secret key, and then the cloud server generates a dynamic password according to the secret key and sends the dynamic password to the electronic lock after receiving a response of the electronic lock, then the electronic lock verifies the dynamic password, after the verification is passed, the electronic lock is unlocked, then the electronic lock deletes the secret key according to a locking instruction initiated by the mobile terminal and sends a deletion result to the cloud server, so that the cloud server cancels the dynamic password based on the deletion result, the cloud server uniformly manages the password, the business service and the password security service of the electronic lock are separated, the business service and the security service provider can not independently analyze, falsify or forge user data, the electronic lock only needs to utilize the secret key fed back by the cloud server to verify the dynamic password so as to automatically complete the lock opening and closing service, the user data security is ensured, the password security management of 'preventing from outside and inside' is realized, and the difficulty of managing the password by the user is reduced, the key is not required to be carried, the safe and convenient password service with use and use at any time and one secret at any time is realized, and the quick and flexible electronic lock safety management is realized.
As shown in fig. 3, an electronic lock security management apparatus 300 provided in an embodiment of the present invention is applied to a cloud server, and includes:
an identity registration module 301, configured to obtain an identity registration request sent by a mobile terminal, where the identity registration request includes user identity information;
the identity authentication module 302 is configured to authenticate the user identity information, and after the authentication is passed, form a corresponding relationship between the user identity information and the identification information of the mobile terminal and store the corresponding relationship in a database of the identity authentication module;
a request obtaining module 303, configured to receive a password obtaining request sent by an electronic lock, where the password obtaining request includes identification information of the mobile terminal and identification information of the electronic lock, and the password obtaining request is a request sent by the electronic lock after the electronic lock obtains the identification information of the mobile terminal based on an unlocking instruction initiated by the mobile terminal and determines that the mobile terminal is a valid user according to the identification information of the mobile terminal;
the password management module 304 is configured to allocate a key to the electronic lock according to the received password acquisition request and send the key to the electronic lock;
the password management module 304 is further configured to generate a dynamic password according to the secret key after receiving the response from the electronic lock;
the password management module 304 is further configured to send the dynamic password to the electronic lock, so that the electronic lock verifies the dynamic password and unlocks the electronic lock after the dynamic password passes the verification;
the password management module 304 is further configured to cancel the dynamic password based on a deletion result sent by the electronic lock, where the deletion result is a result of deleting the secret key by the electronic lock according to a locking instruction initiated by the mobile terminal.
The implementation principle and the generated technical effects of the security management device 300 for an electronic lock of a wireless controller according to the embodiment of the present invention are the same as those of the foregoing method embodiments, and for the sake of brief description, corresponding contents in the method embodiment of fig. 2 may be referred to where no corresponding product embodiment is mentioned, and are not repeated herein.
The electronic lock safety management device provided by the embodiment of the invention is applied to a cloud server and comprises the following components: after an identity registration module in the cloud server acquires an identity registration request sent by a mobile terminal, an identity authentication module authenticates user identity information, after the authentication is passed, the user identity information and identification information of the mobile terminal form a corresponding relation and are stored in a database of the identity authentication module, then the request acquisition module receives a password acquisition request sent by an electronic lock, then a password management module distributes a secret key to the electronic lock according to the received password acquisition request and sends the secret key to the electronic lock, the password management module is also used for generating a dynamic password according to the secret key after receiving a response of the electronic lock, and the password management module is also used for sending the dynamic password to the electronic lock so that the electronic lock can authenticate the dynamic password and unlock the mobile terminal after the authentication is passed, the password management module is also used for canceling the dynamic password based on a deletion result sent by the electronic lock, the cloud server is used for uniformly managing the password, business service and password security service of the electronic lock are separated, and business service and security service providers cannot independently analyze, tamper or forge user data, so that the electronic lock only needs to verify the dynamic password by using a secret key fed back by the cloud server to automatically complete lock opening and closing service, the user data security is guaranteed, the password security management of 'preventing from outside and inside', the password management difficulty of a user per se is reduced, a key does not need to be carried, the password is managed conveniently and safely by using the password and checking at any time, and the quick and flexible electronic lock security management is realized.
As shown in fig. 4, an electronic lock 400 provided in an embodiment of the present invention includes:
an obtaining module 401, configured to obtain identification information of a mobile terminal according to an unlocking instruction initiated by the mobile terminal, where the identification information of the mobile terminal is information obtained by a cloud server after obtaining an identity registration request sent by the mobile terminal, and after the identity registration request passes the verification, the identification information of the mobile terminal and the user identity information form a corresponding relationship and are stored in a database of the mobile terminal;
an identifying module 402, configured to determine that the mobile terminal is a valid user according to the identifier information of the mobile terminal;
a request module 403, configured to send a password obtaining request to the cloud server;
a response module 404, configured to respond to the cloud server after receiving a key, where the key is a key that is allocated to the electronic lock by the cloud server according to the received password acquisition request, where the password acquisition request includes identification information of the mobile terminal and identification information of the electronic lock;
a receiving module 405, configured to receive a dynamic password sent by the cloud server, where the dynamic password is a password generated by the cloud server according to the key after receiving the response of the electronic lock;
the verification module 406 is used for verifying the dynamic password and unlocking after the dynamic password passes the verification;
a deleting module 407, configured to delete the key according to a locking indication initiated by the mobile terminal and send a deletion result to the cloud server, so that the cloud server cancels the dynamic password based on the deletion result.
The implementation principle and the generated technical effect of the electronic lock 400 provided by the embodiment of the present invention are the same as those of the foregoing method embodiments, and for brief description, corresponding contents in the method embodiment of fig. 2 may be referred to where no corresponding product embodiment is mentioned, and are not described herein again.
An electronic lock provided in an embodiment of the present invention includes: the electronic lock comprises an acquisition module, an identification module, a request module, a response module, a receiving module, a verification module, a deletion module and a cloud server, wherein the acquisition module of the electronic lock acquires identification information of a mobile terminal according to an unlocking instruction initiated by the mobile terminal, the identification module determines that the mobile terminal is a legal user according to the identification information of the mobile terminal, the request module then sends a password acquisition request to the cloud server, the response module responds to the cloud server after receiving a secret key, the receiving module then receives a dynamic password sent by the cloud server, the verification module verifies the dynamic password, the unlocking is carried out after the verification is passed, the deletion module finally deletes the secret key according to a locking instruction initiated by the mobile terminal and sends a deletion result to the cloud server, so that the cloud server can conveniently logout the dynamic password based on the deletion result, and separates self business service from password security service by carrying out, the electronic lock can automatically complete lock opening and closing service by only verifying the dynamic password by using the secret key fed back by the cloud server, so that the user data safety is guaranteed, the password safety management of 'preventing from outside and preventing from inside' is realized, the service execution efficiency of the electronic lock is improved, the difficulty of managing the password by the user is reduced, the key is not required to be carried, the safe and convenient password service of one secret and one user is realized by using the secret key at any time, and the quick and flexible electronic lock safety management is realized.
In addition, in the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method can be implemented in other ways. The apparatus embodiments described above are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, the functional modules in the embodiments of the present invention may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (12)

1. An electronic lock security management method, the method comprising:
the method comprises the steps that a cloud server obtains an identity registration request sent by a mobile terminal, wherein the identity registration request comprises user identity information;
the cloud server verifies the user identity information, and after the user identity information passes the verification, the cloud server forms a corresponding relation between the user identity information and the identification information of the mobile terminal and stores the corresponding relation in a database of the cloud server;
the electronic lock acquires identification information of the mobile terminal according to an unlocking instruction initiated by the mobile terminal;
the electronic lock determines that the mobile terminal is a legal user based on the identification information of the mobile terminal;
the electronic lock sends a password acquisition request to the cloud server, wherein the password acquisition request comprises identification information of the mobile terminal and identification information of the electronic lock;
the cloud server distributes a key to the electronic lock according to the received password acquisition request and sends the key to the electronic lock;
the electronic lock responds to the cloud server after receiving the key;
the cloud server generates a dynamic password according to the secret key after receiving the response of the electronic lock;
the cloud server sends the dynamic password to the electronic lock;
the electronic lock verifies the dynamic password and unlocks after the dynamic password passes the verification;
the electronic lock deletes the key according to a locking instruction initiated by the mobile terminal and sends a deletion result to the cloud server;
and the cloud server logs out the dynamic password based on the deletion result.
2. The electronic lock security management method of claim 1, wherein the verifying the user identity information by the cloud server comprises: the cloud server acquires the biological characteristics of the user through the mobile terminal, matches the biological characteristics of the user with the user identity information, and determines that the user passes the verification under the condition of successful matching.
3. The electronic lock security management method according to claim 1 or 2, wherein the acquiring, by the electronic lock, the identification information of the mobile terminal according to the unlocking instruction initiated by the mobile terminal includes: and the electronic lock establishes WiFi connection with the mobile terminal according to the unlocking instruction initiated by the mobile terminal, so that the identification information of the mobile terminal is acquired.
4. The electronic lock security management method of any one of claims 1 to 3, wherein the electronic lock determines that the mobile terminal is a legitimate user based on the identification information of the mobile terminal, including: after the electronic lock judges that the mobile terminal is the user bound for the first time according to the identification information of the mobile terminal, the electronic lock determines that the mobile terminal is a legal user, and/or,
the electronic lock sends an authorization request to the first bound user after judging that the mobile terminal is not the first bound user according to the identification information of the mobile terminal, and determines that the mobile terminal is a legal user after receiving an allowance response sent by the first bound user, wherein the authorization request is used for requesting whether the first bound user allows the mobile terminal to be listed as the legal user, and the authorization request comprises the identification information of the mobile terminal.
5. The electronic lock security management method of claim 4, wherein the method further comprises: and if the electronic lock receives the refusal response sent by the first bound user or does not receive the response of the first bound user under a preset condition, the mobile terminal is listed as an illegal user.
6. The utility model provides an electronic lock safety management device, is applied to cloud ware, its characterized in that includes:
the identity registration module is used for acquiring an identity registration request sent by the mobile terminal, wherein the identity registration request comprises user identity information;
the identity authentication module is used for authenticating the user identity information, and after the authentication is passed, the identity authentication module forms a corresponding relation between the user identity information and the identification information of the mobile terminal and stores the corresponding relation in a database of the identity authentication module;
the request acquisition module is used for receiving a password acquisition request sent by an electronic lock, wherein the password acquisition request comprises identification information of the mobile terminal and identification information of the electronic lock, the password acquisition request is the request sent by the electronic lock after the electronic lock acquires the identification information of the mobile terminal based on an unlocking instruction initiated by the mobile terminal and the mobile terminal is determined to be a legal user according to the identification information of the mobile terminal;
the password management module is used for distributing a key to the electronic lock according to the received password acquisition request and sending the key to the electronic lock;
the password management module is also used for generating a dynamic password according to the secret key after receiving the response of the electronic lock;
the password management module is also used for sending the dynamic password to the electronic lock so that the electronic lock can verify the dynamic password and unlock the electronic lock after the dynamic password passes the verification;
the password management module is further configured to cancel the dynamic password based on a deletion result sent by the electronic lock, where the deletion result is a result of deleting the secret key by the electronic lock according to a locking instruction initiated by the mobile terminal.
7. The electronic lock security management apparatus of claim 6, wherein the authentication module is to: and acquiring the biological characteristics of the user through the mobile terminal, matching the biological characteristics of the user with the identity information of the user, and determining that the user passes the verification under the condition of successful matching.
8. An electronic lock, comprising:
the system comprises an acquisition module, a storage module and a processing module, wherein the acquisition module is used for acquiring identification information of a mobile terminal according to an unlocking instruction initiated by the mobile terminal, the identification information of the mobile terminal is information which is obtained by a cloud server after an identity registration request sent by the mobile terminal is acquired, the user identity information in the identity registration request is verified, and after the verification is passed, the identification information of the mobile terminal and the user identity information form a corresponding relation and are stored in a database of the mobile terminal;
the identification module is used for determining the mobile terminal as a legal user according to the identification information of the mobile terminal;
the request module is used for sending a password acquisition request to the cloud server;
the response module is used for responding to the cloud server after receiving a key, wherein the key is a key distributed to the electronic lock by the cloud server according to the received password acquisition request, and the password acquisition request comprises identification information of the mobile terminal and identification information of the electronic lock;
the receiving module is used for receiving a dynamic password sent by the cloud server, wherein the dynamic password is generated by the cloud server according to the secret key after receiving the response of the electronic lock;
the verification module is used for verifying the dynamic password and unlocking after the dynamic password passes the verification;
and the deleting module is used for deleting the key according to a locking instruction initiated by the mobile terminal and sending a deleting result to the cloud server so that the cloud server can log out the dynamic password based on the deleting result.
9. The electronic lock of claim 8, wherein the acquisition module is to: and establishing WiFi connection with the mobile terminal according to the unlocking instruction initiated by the mobile terminal, so as to acquire the identification information of the mobile terminal.
10. The electronic lock of claim 8 or 9, wherein the identification module is to: after the mobile terminal is judged to be the user bound for the first time according to the identification information of the mobile terminal, the mobile terminal is determined to be a legal user, and/or,
after judging that the mobile terminal is not the first bound user according to the identification information of the mobile terminal, sending an authorization request to the first bound user, and after receiving an allowance response sent by the first bound user, determining that the mobile terminal is a legal user, wherein the authorization request is used for requesting whether the first bound user allows the mobile terminal to be listed as a legal user, and the authorization request comprises the identification information of the mobile terminal.
11. The electronic lock of claim 10, wherein the identification module is further to: and if the electronic lock receives the refusal response sent by the first bound user or does not receive the response of the first bound user under a preset condition, the mobile terminal is listed as an illegal user.
12. An electronic lock security management system, characterized by comprising a mobile terminal, a cloud server according to any one of claims 6 to 7, and an electronic lock according to any one of claims 8 to 11.
CN202011087270.2A 2020-10-15 2020-10-15 Electronic lock safety management method, equipment and system Active CN112330855B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011087270.2A CN112330855B (en) 2020-10-15 2020-10-15 Electronic lock safety management method, equipment and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011087270.2A CN112330855B (en) 2020-10-15 2020-10-15 Electronic lock safety management method, equipment and system

Publications (2)

Publication Number Publication Date
CN112330855A true CN112330855A (en) 2021-02-05
CN112330855B CN112330855B (en) 2022-06-28

Family

ID=74314845

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011087270.2A Active CN112330855B (en) 2020-10-15 2020-10-15 Electronic lock safety management method, equipment and system

Country Status (1)

Country Link
CN (1) CN112330855B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113556718A (en) * 2021-09-23 2021-10-26 深圳市信润富联数字科技有限公司 Device management method, device and storage medium
CN113593088A (en) * 2021-07-27 2021-11-02 胡奕旸 Intelligent unlocking method, intelligent lock, mobile terminal and server
CN113904949A (en) * 2021-11-11 2022-01-07 宁波奥克斯电气股份有限公司 Distribution network binding method and device, intelligent equipment and storage medium
CN114189863A (en) * 2021-12-16 2022-03-15 青岛海尔科技有限公司 Binding method and device of intelligent door lock, storage medium and electronic device
CN114268440A (en) * 2021-12-20 2022-04-01 中国农业银行股份有限公司 Production operation room management system and method
CN114999030A (en) * 2022-05-25 2022-09-02 杭州萤石软件有限公司 Unlocking method, system, electronic equipment and storage medium
CN115171245A (en) * 2022-06-09 2022-10-11 郑州信大捷安信息技术股份有限公司 HCE-based door lock security authentication method and system
CN116543485A (en) * 2023-06-15 2023-08-04 智慧云联信息技术(北京)有限公司 Emergency help seeking method, system, electronic equipment and storage medium
CN116563985A (en) * 2023-07-10 2023-08-08 深圳市旭子科技有限公司 Task processing method and system based on Internet of things lock

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103971435A (en) * 2014-05-22 2014-08-06 广东欧珀移动通信有限公司 Unlocking method, server, mobile terminal, electronic lock and unlocking system
CN204390320U (en) * 2014-10-21 2015-06-10 深圳市俊武科技有限公司 A kind of dynamic puzzle-lock system
CN105005862A (en) * 2015-07-22 2015-10-28 深圳市俊武科技有限公司 Internet dynamic password unlocking management system
CN105160744A (en) * 2015-10-09 2015-12-16 广州市坤拓智能科技有限公司 System and method for opening door by utilizing mobile phone based on cloud platform
CN105279832A (en) * 2015-12-01 2016-01-27 北京卡多宝信息技术有限公司 Intelligent door lock system and control method thereof
CN105871546A (en) * 2016-05-24 2016-08-17 张雪莱 Verification method combining static password and dynamic password and terminal equipment
CN106898064A (en) * 2017-01-09 2017-06-27 云丁网络技术(北京)有限公司 A kind of generation method and its system of the off-line verification code based on intelligent door lock system
CN107893583A (en) * 2017-10-16 2018-04-10 杭州软库科技有限公司 A kind of intelligent door lock system and control method
CN108022346A (en) * 2017-12-07 2018-05-11 北海威德电子科技有限公司 A kind of intelligence door control method
WO2018119623A1 (en) * 2016-12-27 2018-07-05 深圳易马达科技有限公司 Method of unlocking electronic lock device, and client and electronic lock device thereof
CN109389727A (en) * 2018-10-30 2019-02-26 南昌努比亚技术有限公司 Method for unlocking, system and computer readable storage medium
CN110335394A (en) * 2019-07-05 2019-10-15 深圳市智臻环保能源科技有限公司 A kind of smart lock control method and system based on cipher code set

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103971435A (en) * 2014-05-22 2014-08-06 广东欧珀移动通信有限公司 Unlocking method, server, mobile terminal, electronic lock and unlocking system
CN204390320U (en) * 2014-10-21 2015-06-10 深圳市俊武科技有限公司 A kind of dynamic puzzle-lock system
CN105005862A (en) * 2015-07-22 2015-10-28 深圳市俊武科技有限公司 Internet dynamic password unlocking management system
CN105160744A (en) * 2015-10-09 2015-12-16 广州市坤拓智能科技有限公司 System and method for opening door by utilizing mobile phone based on cloud platform
CN105279832A (en) * 2015-12-01 2016-01-27 北京卡多宝信息技术有限公司 Intelligent door lock system and control method thereof
CN105871546A (en) * 2016-05-24 2016-08-17 张雪莱 Verification method combining static password and dynamic password and terminal equipment
WO2018119623A1 (en) * 2016-12-27 2018-07-05 深圳易马达科技有限公司 Method of unlocking electronic lock device, and client and electronic lock device thereof
CN106898064A (en) * 2017-01-09 2017-06-27 云丁网络技术(北京)有限公司 A kind of generation method and its system of the off-line verification code based on intelligent door lock system
CN107893583A (en) * 2017-10-16 2018-04-10 杭州软库科技有限公司 A kind of intelligent door lock system and control method
CN108022346A (en) * 2017-12-07 2018-05-11 北海威德电子科技有限公司 A kind of intelligence door control method
CN109389727A (en) * 2018-10-30 2019-02-26 南昌努比亚技术有限公司 Method for unlocking, system and computer readable storage medium
CN110335394A (en) * 2019-07-05 2019-10-15 深圳市智臻环保能源科技有限公司 A kind of smart lock control method and system based on cipher code set

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113593088A (en) * 2021-07-27 2021-11-02 胡奕旸 Intelligent unlocking method, intelligent lock, mobile terminal and server
CN113556718B (en) * 2021-09-23 2022-01-07 深圳市信润富联数字科技有限公司 Device management method, device and storage medium
CN113556718A (en) * 2021-09-23 2021-10-26 深圳市信润富联数字科技有限公司 Device management method, device and storage medium
CN113904949B (en) * 2021-11-11 2024-02-09 宁波奥克斯电气股份有限公司 Distribution network binding method and device, intelligent equipment and storage medium
CN113904949A (en) * 2021-11-11 2022-01-07 宁波奥克斯电气股份有限公司 Distribution network binding method and device, intelligent equipment and storage medium
CN114189863A (en) * 2021-12-16 2022-03-15 青岛海尔科技有限公司 Binding method and device of intelligent door lock, storage medium and electronic device
CN114189863B (en) * 2021-12-16 2024-03-22 青岛海尔科技有限公司 Binding method and device of intelligent door lock, storage medium and electronic device
CN114268440A (en) * 2021-12-20 2022-04-01 中国农业银行股份有限公司 Production operation room management system and method
CN114268440B (en) * 2021-12-20 2024-03-26 中国农业银行股份有限公司 Production operation room management system and method
CN114999030A (en) * 2022-05-25 2022-09-02 杭州萤石软件有限公司 Unlocking method, system, electronic equipment and storage medium
CN115171245B (en) * 2022-06-09 2024-03-12 郑州信大捷安信息技术股份有限公司 Door lock security authentication method and system based on HCE
CN115171245A (en) * 2022-06-09 2022-10-11 郑州信大捷安信息技术股份有限公司 HCE-based door lock security authentication method and system
CN116543485A (en) * 2023-06-15 2023-08-04 智慧云联信息技术(北京)有限公司 Emergency help seeking method, system, electronic equipment and storage medium
CN116563985B (en) * 2023-07-10 2023-09-05 深圳市旭子科技有限公司 Task processing method and system based on Internet of things lock
CN116563985A (en) * 2023-07-10 2023-08-08 深圳市旭子科技有限公司 Task processing method and system based on Internet of things lock

Also Published As

Publication number Publication date
CN112330855B (en) 2022-06-28

Similar Documents

Publication Publication Date Title
CN112330855B (en) Electronic lock safety management method, equipment and system
US10636240B2 (en) Architecture for access management
US10829088B2 (en) Identity management for implementing vehicle access and operation management
CN111903104B (en) Method and system for performing user authentication
CN110121873B (en) Access token management method, terminal and server
CN110213246B (en) Wide-area multi-factor identity authentication system
US10219154B1 (en) Frictionless or near-frictionless 3 factor user authentication method and system by use of triad network
WO2019191214A1 (en) Digital credentials for primary factor authentication
CN110149328B (en) Interface authentication method, device, equipment and computer readable storage medium
TW201741922A (en) Biological feature based safety certification method and device
EP3776421A1 (en) System for credential storage and verification
US11263558B2 (en) Method for monitoring access to electronically controllable devices
WO2020170976A1 (en) Authorization system, management server, and authorization method
WO2019191215A1 (en) Digital credentials for secondary factor authentication
KR101719511B1 (en) Method for approving access to gate through network, and server and computer-readable recording media using the same
US20230412400A1 (en) Method for suspending protection of an object achieved by a protection device
US20090327704A1 (en) Strong authentication to a network
CN114615309A (en) Client access control method, device and system, electronic equipment and storage medium
US20230269249A1 (en) Method and system for performing user authentication
CN115473709A (en) Identity authentication method and device, electronic equipment and storage medium
CN116418596A (en) Identity authentication method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant