CN112907790A - Method, device and medium for unlocking Bluetooth door lock by trusted digital identity two-dimensional code - Google Patents

Method, device and medium for unlocking Bluetooth door lock by trusted digital identity two-dimensional code Download PDF

Info

Publication number
CN112907790A
CN112907790A CN202110168064.2A CN202110168064A CN112907790A CN 112907790 A CN112907790 A CN 112907790A CN 202110168064 A CN202110168064 A CN 202110168064A CN 112907790 A CN112907790 A CN 112907790A
Authority
CN
China
Prior art keywords
door lock
digital identity
bluetooth
dimensional code
bluetooth door
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110168064.2A
Other languages
Chinese (zh)
Inventor
林乐智
林治贤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Newland Fujian Public Service Co ltd
Original Assignee
Newland Fujian Public Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Newland Fujian Public Service Co ltd filed Critical Newland Fujian Public Service Co ltd
Priority to CN202110168064.2A priority Critical patent/CN112907790A/en
Publication of CN112907790A publication Critical patent/CN112907790A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention relates to a method for unlocking a Bluetooth door lock by a trusted digital identity two-dimensional code, which comprises the following steps: step S1, the user connects the credible digital identity server through the client, downloads the credible digital identity two-dimensional code, and generates a credible digital identity two-dimensional code icon in the client; step S2, distributing a Bluetooth door lock list with unlocking authority by a background manager according to the information of the user; step S3, the user obtains the authority list through the client, selects the Bluetooth door lock to be unlocked, and the client establishes communication connection with the Bluetooth door lock through the Bluetooth SDK; and step S4, the user slides the credible digital identity two-dimensional code icon on the client interface to trigger the client to execute data sending operation, the data stream of the credible digital identity two-dimensional code is sent to the Bluetooth door lock through a Bluetooth data channel, and the Bluetooth door lock verifies the data stream to complete unlocking or report errors.

Description

Method, device and medium for unlocking Bluetooth door lock by trusted digital identity two-dimensional code
Technical Field
The invention relates to a method, equipment and a medium for unlocking a Bluetooth door lock by a trusted digital identity two-dimensional code, and belongs to the technical field of software management.
Background
At present, the Bluetooth door lock directly opens the door by clicking a button or sending a door opening instruction close to the button. With the development of smart phones, the bigger the mobile phone screen is, the lower the operation experience of clicking buttons is, and the clicking difficulty is increased; the problems of mistaken opening, lack of unlocking feedback and the like exist when the door is opened close to the door.
Disclosure of Invention
In order to solve the problems in the prior art, the invention provides a method, equipment and a medium for unlocking a Bluetooth door lock by using a trusted digital identity two-dimensional code, which can be used for unlocking the Bluetooth door lock in a mode of sliding the trusted digital identity two-dimensional code so as to protect the privacy of a user.
The technical scheme of the invention is as follows:
the first technical scheme is as follows:
the method for unlocking the Bluetooth door lock by the trusted digital identity two-dimensional code comprises the following steps:
step S1, the user connects the credible digital identity server through the client, downloads the credible digital identity two-dimensional code, and generates a credible digital identity two-dimensional code icon in the client;
step S2, distributing a Bluetooth door lock list with unlocking authority by a background manager according to the information of the user;
step S3, the user obtains the authority list through the client, selects the Bluetooth door lock to be unlocked, and the client establishes communication connection with the Bluetooth door lock through the Bluetooth SDK;
and step S4, the user slides the credible digital identity two-dimensional code icon on the client interface to trigger the client to execute data sending operation, the data stream of the credible digital identity two-dimensional code is sent to the Bluetooth door lock through a Bluetooth data channel, and the Bluetooth door lock verifies the data stream to complete unlocking or report errors.
Further, in step S1, the user connects to the trusted digital identity server through the client, and the step of downloading the trusted digital identity two-dimensional code specifically includes:
the user uploads personal information to the credible digital identity server through the client, the credible digital identity server obtains a digital BID value of the user according to the personal information, generates credible digital identity two-dimensional codes from data containing the personal information and the BID value according to the credible digital identity two-dimensional code manufacturing standard, and sends the generated credible digital identity two-dimensional codes to the client.
Further, in step S2, according to the BID value of the user, all bluetooth locks bound to the BID value are obtained and integrated into the bluetooth lock list to be sent to the client;
the Bluetooth door lock is used for the first time, the BID value of a user needs to be bound, and bound information is uploaded to a background management server.
Further, in step S3, the bluetooth lock list further includes MAC address information of the bluetooth module in the corresponding bluetooth lock; after the user selects the Bluetooth door lock to be unlocked, the client searches the corresponding Bluetooth door lock according to the MAC address information of the Bluetooth door lock, and if the MAC address information is matched, connection is established with the Bluetooth door lock.
Further, in step S4, the step of verifying the data stream by the bluetooth door lock to complete unlocking or error reporting includes:
the Bluetooth door lock decrypts the received data stream of the credible digital identity two-dimensional code through the internal credible digital identity two-dimensional code decoding module, acquires the personal information and the BID value of the user, verifies the personal information and the BID value with the data stored locally in the Bluetooth door lock, drives the lock cylinder to unlock if the verification is successful, and reports errors if the verification is failed.
The second technical scheme is as follows:
the device for unlocking the Bluetooth door lock by sliding the trusted digital identity two-dimensional code comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor executes the program to realize the method according to the first technical scheme.
The third technical scheme is as follows:
a medium for unlocking a bluetooth door lock by sliding a trusted digital identity two-dimensional code, on which a computer program is stored, wherein the program, when executed by a processor, implements the method according to the first aspect.
The invention has the following beneficial effects:
1. according to the method for unlocking the Bluetooth door lock by the credible digital identity two-dimensional code, a user can use the credible digital identity two-dimensional code image flow to match with the credible digital identity two-dimensional code special module to safely deliver and analyze the digital identity by sliding the credible digital identity two-dimensional code, the Bluetooth door lock is opened, the operation experience of the unlocking process is improved by the sliding mode, the unlocking feedback effect is improved, and the use comfort of the user is improved.
2. According to the method for unlocking the Bluetooth door lock by the trusted digital identity two-dimensional code, the Bluetooth door lock is bound with the user information, all the Bluetooth door locks of which the users have unlocking authority are displayed in the client, and therefore the user management and unlocking are facilitated.
Drawings
FIG. 1 is a flow chart of a first embodiment of the present invention;
FIG. 2 is a flowchart illustrating interaction between an APP client and a Bluetooth door lock according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating operation of sliding two-dimensional code according to an embodiment of the present invention;
FIG. 4 is an exemplary diagram of a trusted digital identity two-dimensional code icon in an embodiment of the present invention;
fig. 5 is a flowchart illustrating establishment of a connection between an APP client and a bluetooth door lock according to an embodiment of the present invention.
Detailed Description
The invention is described in detail below with reference to the figures and the specific embodiments.
The first embodiment is as follows:
referring to fig. 1 and 2, the method for unlocking the bluetooth door lock by using the trusted digital identity two-dimensional code comprises the following steps:
step S1, the user connects the credible digital identity server through the APP client, downloads the credible digital identity two-dimensional code, and generates a credible digital identity two-dimensional code icon in the APP client;
step S2, distributing a Bluetooth door lock list with unlocking authority by a background manager according to the information of the user;
step S3, the user obtains the authority list through the APP client, selects the Bluetooth door lock to be unlocked, and the APP client establishes communication connection with the Bluetooth door lock through the Bluetooth SDK;
and step S4, the user slides the credible digital identity two-dimensional code icon on the APP client interface to trigger the APP client to execute data sending operation, the credible digital identity two-dimensional code is converted into byte array data stream, the data stream is transmitted to the Bluetooth door lock through a Bluetooth data channel, and the Bluetooth door lock verifies the data stream to finish unlocking or report errors.
Referring to fig. 3 and 4, the specific operation of sliding the trusted digital identity two-dimensional code icon is that a user enters a trusted digital identity two-dimensional code page in the APP client to obtain the trusted digital identity two-dimensional code icon, presses the trusted digital identity two-dimensional code icon and slides upwards (or slides leftwards, rightwards and downwards), the size of the trusted digital identity two-dimensional code icon gradually decreases in the sliding process, and finally slides out of the page range upwards to represent that the trusted digital identity two-dimensional code icon is sent out.
Further, in step S1, the user connects to the trusted digital identity server through the APP client, and the step of downloading the trusted digital identity two-dimensional code specifically includes:
a user uploads personal information to the credible digital identity server through an APP client, the credible digital identity server generates a BID value according to the identity information (an identity card and face information) in user data, the identity information and the BID value are encrypted through a national secret SM4 key, then a data whole containing the identity information and the BID value is digitally signed through a national secret SM2 key, and then a two-dimensional code layout diagram of a credible digital identity is generated according to a credible digital identity two-dimensional code coding specification and sent to the APP client;
further, in step S2, according to the BID value of the user, all bluetooth locks bound to the BID value are obtained and integrated into the bluetooth lock list to be sent to the APP client;
the Bluetooth door lock is used for the first time, the BID value of a user needs to be bound, and bound information is uploaded to a background management server.
Further, referring to fig. 5, in step S3, the bluetooth lock list further includes MAC address information of the bluetooth module in the corresponding bluetooth lock; after the user selects the Bluetooth door lock to be unlocked, the APP client side searches the corresponding Bluetooth door lock according to the MAC address information of the Bluetooth door lock, and if the MAC address information is matched, connection is established with the Bluetooth door lock.
Further, in step S4, the step of verifying the data stream by the bluetooth door lock to complete unlocking or error reporting includes:
after the Bluetooth door lock receives the byte array data stream, the data stream is restored into an ASCII code character text string, a national secret key in a security chip arranged in the Bluetooth door lock is called for signature verification and decryption, identity information and a BID value are obtained, the identity information and the BID value are verified with identity information and the BID value of a user capable of opening the door, which are stored in a Bluetooth door lock body, the electronic lock cylinder is driven to unlock if verification is successful, and error is reported if verification is failed (for example, code scanning fails or no authority limit is provided) through voice prompt.
Example two:
the difference between this embodiment and the first embodiment lies in that, when the bluetooth lock that needs the unblock has and sweeps a yard module, not only can be through the mode of credible digital identity two-dimensional code icon with data stream transmission to bluetooth lock, can also be through sweeping a yard module transmission to bluetooth lock inside with the data of credible digital identity two-dimensional code through the mode of sweeping yard module department demonstration credible digital identity two-dimensional code icon at bluetooth lock.
Example three:
an apparatus for unlocking a bluetooth door lock by sliding a trusted digital identity two-dimensional code comprises a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor executes the program to implement the method according to the first embodiment.
Example four:
a medium for unlocking a bluetooth door lock by sliding a trusted digital identity two-dimensional code, the medium having a computer program stored thereon, wherein the computer program, when executed by a processor, implements a method as in one embodiment.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes performed by the present specification and drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (7)

1. The method for unlocking the Bluetooth door lock by the trusted digital identity two-dimensional code is characterized by comprising the following steps of:
step S1, the user connects the credible digital identity server through the client, downloads the credible digital identity two-dimensional code, and generates a credible digital identity two-dimensional code icon in the client;
step S2, distributing a Bluetooth door lock list with unlocking authority by a background manager according to the information of the user;
step S3, the user obtains the authority list through the client, selects the Bluetooth door lock to be unlocked, and the client establishes communication connection with the Bluetooth door lock through the Bluetooth SDK;
and step S4, the user slides the credible digital identity two-dimensional code icon on the client interface to trigger the client to execute data sending operation, the data stream of the credible digital identity two-dimensional code is sent to the Bluetooth door lock through a Bluetooth data channel, and the Bluetooth door lock verifies the data stream to complete unlocking or report errors.
2. The method for unlocking a bluetooth door lock by using the trusted digital identity two-dimensional code according to claim 1, wherein in step S1, the user connects to the trusted digital identity server through the client, and the step of downloading the trusted digital identity two-dimensional code specifically comprises:
the user uploads personal information to the credible digital identity server through the client, the credible digital identity server obtains a digital BID value of the user according to the personal information, generates credible digital identity two-dimensional codes from data containing the personal information and the BID value according to the credible digital identity two-dimensional code manufacturing standard, and sends the generated credible digital identity two-dimensional codes to the client.
3. The method for unlocking the Bluetooth door lock by the trusted digital identity two-dimensional code according to claim 2, wherein the method comprises the following steps: in step S2, according to the BID value of the user, all bluetooth locks bound to the BID value are obtained, integrated into the bluetooth lock list, and sent to the client;
the Bluetooth door lock is used for the first time, the BID value of a user needs to be bound, and bound information is uploaded to a background management server.
4. The method for unlocking the Bluetooth door lock by the trusted digital identity two-dimensional code according to claim 2, wherein the method comprises the following steps: in step S3, the bluetooth lock list further includes MAC address information of the bluetooth module in the corresponding bluetooth lock; after the user selects the Bluetooth door lock to be unlocked, the client searches the corresponding Bluetooth door lock according to the MAC address information of the Bluetooth door lock, and if the MAC address information is matched, connection is established with the Bluetooth door lock.
5. The method for unlocking a bluetooth door lock according to the trusted digital identity two-dimensional code of claim 2, wherein in step S4, the specific steps of the bluetooth door lock verifying the data stream and completing unlocking or reporting an error are as follows:
the Bluetooth door lock decrypts the received data stream of the credible digital identity two-dimensional code through the internal credible digital identity two-dimensional code decoding module, acquires the personal information and the BID value of the user, verifies the personal information and the BID value with the data stored locally in the Bluetooth door lock, drives the lock cylinder to unlock if the verification is successful, and reports errors if the verification is failed.
6. Device for unlocking a bluetooth door lock by sliding a trusted digital identity two-dimensional code, comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method according to any one of claims 1 to 5 when executing the program.
7. Medium for unlocking a bluetooth door lock by sliding a trusted digital identity two-dimensional code, on which a computer program is stored, characterized in that the program, when executed by a processor, implements the method according to any one of claims 1 to 5.
CN202110168064.2A 2021-02-07 2021-02-07 Method, device and medium for unlocking Bluetooth door lock by trusted digital identity two-dimensional code Pending CN112907790A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110168064.2A CN112907790A (en) 2021-02-07 2021-02-07 Method, device and medium for unlocking Bluetooth door lock by trusted digital identity two-dimensional code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110168064.2A CN112907790A (en) 2021-02-07 2021-02-07 Method, device and medium for unlocking Bluetooth door lock by trusted digital identity two-dimensional code

Publications (1)

Publication Number Publication Date
CN112907790A true CN112907790A (en) 2021-06-04

Family

ID=76123657

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110168064.2A Pending CN112907790A (en) 2021-02-07 2021-02-07 Method, device and medium for unlocking Bluetooth door lock by trusted digital identity two-dimensional code

Country Status (1)

Country Link
CN (1) CN112907790A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116703300A (en) * 2023-06-15 2023-09-05 苏州冠礼科技有限公司 Fool-proof control system and method for replacing acid bucket for semiconductor manufacturing process

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201023825A (en) * 2008-12-24 2010-07-01 Jin-Jing Zhang Movable network terminal device and method for electric physiology data and pathology vision-monitoring
CN102478986A (en) * 2010-11-30 2012-05-30 汉王科技股份有限公司 Portable electronic equipment and information sharing method thereof
CN104378416A (en) * 2014-10-29 2015-02-25 乐视网信息技术(北京)股份有限公司 Method and device for main control equipment to control controlled equipment
US20150061843A1 (en) * 2013-08-27 2015-03-05 Hon Hai Precision Industry Co., Ltd. Remote key for control of vehicles
CN104573608A (en) * 2015-01-23 2015-04-29 苏州海博智能系统有限公司 Coded message scanning method and device
CN204423463U (en) * 2015-01-13 2015-06-24 刘鑫 The intelligent control system of banister is opened with mobile phone
CN106327637A (en) * 2016-08-25 2017-01-11 青岛亿联信息科技股份有限公司 Bluetooth door opening system based on community management and method
CN106530454A (en) * 2016-10-10 2017-03-22 俞毅 House-renting management system capable of opening locks based on Bluetooth or two-dimensional codes and method thereof
CN107646127A (en) * 2015-06-02 2018-01-30 索尼公司 Lock control control equipment, information processing method, program and communication equipment
CN107741783A (en) * 2017-10-01 2018-02-27 上海量科电子科技有限公司 electronic transfer method and system
CN109243012A (en) * 2018-07-24 2019-01-18 上海帝图信息科技有限公司 Access control system
CN109903447A (en) * 2019-04-16 2019-06-18 北京景未和笋科技有限公司 A kind of solution lock control method, system and intelligent entrance guard based on multiple instruction
CN112200949A (en) * 2020-12-02 2021-01-08 北京紫光青藤微系统有限公司 Entrance guard starting method and device and identity verification system
CN112243233A (en) * 2020-11-06 2021-01-19 新大陆(福建)公共服务有限公司 CTID (computer telephony integration) verification method and device based on Bluetooth low-power-consumption protocol

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201023825A (en) * 2008-12-24 2010-07-01 Jin-Jing Zhang Movable network terminal device and method for electric physiology data and pathology vision-monitoring
CN102478986A (en) * 2010-11-30 2012-05-30 汉王科技股份有限公司 Portable electronic equipment and information sharing method thereof
US20150061843A1 (en) * 2013-08-27 2015-03-05 Hon Hai Precision Industry Co., Ltd. Remote key for control of vehicles
CN104378416A (en) * 2014-10-29 2015-02-25 乐视网信息技术(北京)股份有限公司 Method and device for main control equipment to control controlled equipment
CN204423463U (en) * 2015-01-13 2015-06-24 刘鑫 The intelligent control system of banister is opened with mobile phone
CN104573608A (en) * 2015-01-23 2015-04-29 苏州海博智能系统有限公司 Coded message scanning method and device
CN107646127A (en) * 2015-06-02 2018-01-30 索尼公司 Lock control control equipment, information processing method, program and communication equipment
CN106327637A (en) * 2016-08-25 2017-01-11 青岛亿联信息科技股份有限公司 Bluetooth door opening system based on community management and method
CN106530454A (en) * 2016-10-10 2017-03-22 俞毅 House-renting management system capable of opening locks based on Bluetooth or two-dimensional codes and method thereof
CN107741783A (en) * 2017-10-01 2018-02-27 上海量科电子科技有限公司 electronic transfer method and system
CN109243012A (en) * 2018-07-24 2019-01-18 上海帝图信息科技有限公司 Access control system
CN109903447A (en) * 2019-04-16 2019-06-18 北京景未和笋科技有限公司 A kind of solution lock control method, system and intelligent entrance guard based on multiple instruction
CN112243233A (en) * 2020-11-06 2021-01-19 新大陆(福建)公共服务有限公司 CTID (computer telephony integration) verification method and device based on Bluetooth low-power-consumption protocol
CN112200949A (en) * 2020-12-02 2021-01-08 北京紫光青藤微系统有限公司 Entrance guard starting method and device and identity verification system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116703300A (en) * 2023-06-15 2023-09-05 苏州冠礼科技有限公司 Fool-proof control system and method for replacing acid bucket for semiconductor manufacturing process

Similar Documents

Publication Publication Date Title
US11669465B1 (en) Secure storage of data through a multifaceted security scheme
CN112596802B (en) Information processing method and device
US9262616B2 (en) Simplified multi-factor authentication
US20190268770A1 (en) Method and apparatus for remote portable wireless device authentication
US20130237190A1 (en) Method and apparatus for remote portable wireless device authentication
US9198036B2 (en) Method for providing application service
WO2015014691A1 (en) System and method for securing a credential vault on a trusted computing base
CN1893713A (en) Mobile terminal device, program and method for biometric encrypted personal identification number
CN104424409A (en) Application unlocking method and device
WO2007076275A2 (en) Method and apparatus for creating and entering a pin code
CN104933343A (en) Secrecy method and apparatus of application program, and electronic device
US7913096B2 (en) Method and system for the cipher key controlled exploitation of data resources, related network and computer program products
CN109815666B (en) Identity authentication method and device based on FIDO protocol, storage medium and electronic equipment
CN105325021B (en) Method and apparatus for remote portable wireless device authentication
CN105610873A (en) Identity authentication method and device
CN112907790A (en) Method, device and medium for unlocking Bluetooth door lock by trusted digital identity two-dimensional code
CN106971436A (en) A kind of fingerprint control method for intelligent door lock
CN111405550B (en) WhatsApp key file extraction method and WhatsApp key file extraction equipment
CN104574615A (en) Electronic door lock control method and control device
CN110909366A (en) Anti-flashing method and system based on software end encryption
JP2015008462A (en) Multifunctional mcu implementation method and multifunctional mcu
CN112950817B (en) Encryption communication method of split type intelligent lock and split type intelligent lock
CN111935709B (en) Application program login method and device of terminal and electronic equipment
WO2012081968A1 (en) A system and method for quantum mobile access verification
KR20050096577A (en) Security system using mobile phone and method therefor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210604

RJ01 Rejection of invention patent application after publication