CN112910886A - Method and system for verifying identity of lock - Google Patents
Method and system for verifying identity of lock Download PDFInfo
- Publication number
- CN112910886A CN112910886A CN202110125277.7A CN202110125277A CN112910886A CN 112910886 A CN112910886 A CN 112910886A CN 202110125277 A CN202110125277 A CN 202110125277A CN 112910886 A CN112910886 A CN 112910886A
- Authority
- CN
- China
- Prior art keywords
- lock
- information
- identity
- plaintext
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 39
- 238000012360 testing method Methods 0.000 claims abstract description 30
- 238000012795 verification Methods 0.000 claims abstract description 22
- 230000008676 import Effects 0.000 claims abstract description 4
- 230000002159 abnormal effect Effects 0.000 description 10
- 238000010586 diagram Methods 0.000 description 9
- 102100038591 Endothelial cell-selective adhesion molecule Human genes 0.000 description 8
- 101000882622 Homo sapiens Endothelial cell-selective adhesion molecule Proteins 0.000 description 8
- 238000004590 computer program Methods 0.000 description 7
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 230000006870 function Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 230000002860 competitive effect Effects 0.000 description 3
- 238000012423 maintenance Methods 0.000 description 3
- 238000001514 detection method Methods 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 230000002411 adverse Effects 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Power Engineering (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The application discloses a method and a system for verifying the identity of a lockset. Wherein, the method comprises the following steps: the lock registration information generation module generates a lock registration code corresponding to the asset number of the to-be-tested lock by using an AES-256 symmetric encryption method based on the lock information, wherein the lock information comprises the asset number of the to-be-tested lock, serial number information of an embedded safety control module chip, a manufacturer name, a supply province, a supply type and a product quantity; the lock testing equipment imports the lock registration code through upper computer testing software, reads the lock information when the lock identity is verified, determines the corresponding lock registration code by using the lock asset number, and obtains plaintext information corresponding to the lock registration code through an AES-256 symmetric decryption method; and the lock testing equipment compares the plaintext information with the lock information and determines that the identity verification is passed under the condition that the plaintext information is consistent with the lock information.
Description
Technical Field
The application relates to the technical field of electric power internet of things, in particular to a method and a system for verifying the identity of a lock.
Background
At present, traditional mechanical locks are widely installed in customer side end batch box equipment. The work of using traditional mechanical tool to lock to give the field operation personnel brings great burden, can't discover in time simultaneously the nature of tool to lock or artificial damage, illegal unlocking etc. abnormal conditions, bring risks such as stealing electricity. For satisfying the demand of electric power thing networking construction, electric power intelligence thing allies oneself with safety lock and promotes traditional tool to lock from perception, innovation, safe three aspect comprehensively, improves the security that the tool to lock used and the convenience of management. Meanwhile, the state of the lock is monitored, the abnormal condition of the lock is reported in time, and the adverse effect caused by damage of the lock is reduced.
Aiming at the technical problems that the traditional mechanical lockset in the prior art brings great burden to the work of field operation personnel and can not find the abnormal condition of the lockset in time, an effective solution is not provided at present.
Disclosure of Invention
The embodiment of the disclosure provides a method and a system for verifying the identity of a lock, which at least solve the technical problems that the traditional mechanical lock in the prior art brings great burden to the work of field operation personnel and can not find the abnormal condition of the lock in time.
According to an aspect of the embodiments of the present disclosure, there is provided a method for verifying an identity of a lock, including: the lock registration information generation module generates a lock registration code corresponding to the asset number of the to-be-tested lock by using an AES-256 symmetric encryption method based on the lock information, wherein the lock information comprises the asset number of the to-be-tested lock, serial number information of an embedded safety control module chip, a manufacturer name, a supply province, a supply type and a product quantity; the lock testing equipment imports the lock registration code through upper computer testing software; when the identity of the lock is checked, the lock testing equipment reads the asset number of the lock to be tested and the serial number of the embedded safety control module chip, determines the corresponding lock registration code by using the lock asset number, and obtains plaintext information corresponding to the lock registration code by an AES-256 symmetric decryption method; and the lock testing equipment compares the plaintext information with the lock information and determines that the identity verification is passed under the condition that the plaintext information is consistent with the lock information.
According to another aspect of the embodiments of the present disclosure, there is also provided a system for verifying an identity of a lock, including: the lock registration code generation module is used for generating a lock registration code corresponding to the asset number of the to-be-tested lock by using an AES-256 symmetric encryption method based on lock information by the lock registration information generation module, wherein the lock information comprises the asset number of the to-be-tested lock, serial number information of an embedded safety control module chip, a manufacturer name, a goods supply province, a goods supply type and the product quantity; the lock identity verification module is used for acquiring a lock identity code of a lock, and acquiring plaintext information corresponding to the lock registration code by using an AES-256 symmetric decryption method; and the identity verification determining module is used for comparing the plaintext information with the lockset information by the lockset testing equipment and determining that the identity verification is passed under the condition that the plaintext information is consistent with the lockset information.
In the present invention, a method of verifying the identity of a lock is provided. The identity and the legality of the lockset are identified in the links of arrival acceptance and formal operation, so that the illegal lockset is avoided. The lock can be guaranteed to normally, safely, stably and effectively operate on site, timeliness of abnormal operation and maintenance of the lock is improved, legal rights and interests of lock purchasers are guaranteed, and meanwhile benign competitive environment of the whole market is maintained. And then solved the traditional mechanical lock that exists among the prior art and brought great burden for field operation personnel's work, can't in time discover the technical problem of the abnormal conditions of tool to lock simultaneously.
Drawings
The accompanying drawings, which are included to provide a further understanding of the disclosure and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the disclosure and together with the description serve to explain the disclosure and not to limit the disclosure. In the drawings:
fig. 1 is a schematic flow chart of a method for verifying an identity of a lock according to an embodiment of the present disclosure;
fig. 2 is a schematic flow chart of a system for verifying an identity of a lock according to an embodiment of the present disclosure.
Detailed Description
The exemplary embodiments of the present invention will now be described with reference to the accompanying drawings, however, the present invention may be embodied in many different forms and is not limited to the embodiments described herein, which are provided for complete and complete disclosure of the present invention and to fully convey the scope of the present invention to those skilled in the art. The terminology used in the exemplary embodiments illustrated in the accompanying drawings is not intended to be limiting of the invention. In the drawings, the same units/elements are denoted by the same reference numerals.
Unless otherwise defined, terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Further, it will be understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense.
According to a first aspect of the present embodiment, a method of verifying an identity of a lock is provided. Fig. 1 shows a schematic flow diagram of the method, which, with reference to fig. 1, comprises:
s102: the lock registration information generation module generates a lock registration code corresponding to the asset number of the to-be-tested lock by using an AES-256 symmetric encryption method based on the lock information, wherein the lock information comprises the asset number of the to-be-tested lock, serial number information of an embedded safety control module chip, a manufacturer name, a supply province, a supply type and a product quantity;
s104: the lock testing equipment imports the lock registration code through upper computer testing software, reads the asset number of the to-be-tested lock and the serial number of the embedded safety control module chip when the lock identity is verified, determines the corresponding lock registration code by using the lock asset number, and obtains plaintext information corresponding to the lock registration code through an AES-256 symmetric decryption method;
s106: and the lock testing equipment compares the plaintext information with the lock information and determines that the identity verification is passed under the condition that the plaintext information is consistent with the lock information.
Specifically, in this embodiment, the method for verifying the identity of the lock mainly includes three steps. Firstly, before the formal supply, a lock manufacturer obtains the asset number of the lock to be produced and the serial number of the ESAM chip from provincial companies and related organizations respectively. The manufacturer determines the one-to-one corresponding relation of the two according to the actual production condition, and forms the lock filing information table with the information of the manufacturer name, the supply province, the supply type, the product quantity and the like. The information such as the asset number of the lockset to be tested and the serial number of the embedded safety control module chip comprises the name of a manufacturer, the province of goods supply, the type of goods supply and the quantity of products. In addition, the manufacturer needs to fill in the lock filing application form of the batch of products, and submits the two documents together. To the receiving unit. And after the acceptance unit passes the verification, carrying out AES-256 symmetric encryption on the lock information in the information table to form a corresponding unique lock registration code, and providing the registration code for provincial companies for subsequent detection.
And secondly, in the link of receiving and accepting the goods by the provincial company, detecting the goods-receiving lock by using electric intelligent Internet of things safety lock testing equipment and issuing information such as an ESAM chip key, an asset number and the like. At the moment, the legality of the identity of the lockset needs to be identified by utilizing the lockset registration code, so that the illegal lockset is prevented from passing the test. A detection person introduces a lock registration code through upper computer test software, when the step of issuing an ESAM chip key and an asset number of the lock is executed, the upper computer software obtains the asset number and the ESAM chip serial number of the lock through test equipment, the same encryption key and algorithm as the previous step are used for encrypting the lock information, the encryption result is compared with the introduced lock registration code, the failed lock immediately stops testing and judges that the test result is unqualified, the unqualified lock cannot be put into use on site without information such as the ESAM chip key and the asset number, and the illegal lock is avoided. And continuously sending information through the compared lock, and encrypting the unlocking code plaintext, the key state and the ESAM serial number by the key server to form an unlocking code and storing the unlocking code in the lock. And after all the locks are tested, the unlocking codes are derived and provided for the lock management module.
Finally, in the formal operation link of the lock, when a field worker performs operations such as opening and closing the lock, the information such as the ESAM serial number and the asset number of the lock is read through a field operation terminal, the ESAM serial number and the asset number are connected with the lock in a safety application mode, and the acquired lock information is sent to a lock management module. The module checks the information, and subsequent operation cannot be performed if the information is not checked, so that illegal locks are avoided. If the unlocking code is verified, the corresponding unlocking code is sent to the lockset through the field operation terminal by the module, and the lockset can execute corresponding operation after being compared, so that the lockset is prevented from being cracked and the like.
Thus, a method of verifying the identity of a lock is provided. The identity and the legality of the lockset are identified in the links of arrival acceptance and formal operation, so that the illegal lockset is avoided. The lock can be guaranteed to normally, safely, stably and effectively operate on site, timeliness of abnormal operation and maintenance of the lock is improved, legal rights and interests of lock purchasers are guaranteed, and meanwhile benign competitive environment of the whole market is maintained. And then solved the traditional mechanical lock that exists among the prior art and brought great burden for field operation personnel's work, can't in time discover the technical problem of the abnormal conditions of tool to lock simultaneously.
Optionally, in a case that the plaintext information is consistent with the lock information, determining that the identity check passes includes: under the condition that the plaintext information is consistent with the lockset information, the lockset testing equipment encrypts a unlocking code plaintext, a secret key state and a serial number of the embedded type safety control module chip through a secret key server to generate a secret key unlocking code; and the lock testing equipment sends the key unlocking code to the lock for storage.
Optionally, determining that the identity verification passes under the condition that the plaintext information is consistent with the lock information, further comprising: under the condition that the plaintext information is consistent with the lockset information, the lockset testing equipment sends the plaintext information and the key unlocking code to a lockset management module; when the lock management module operates, lock information of a lock to be unlocked is acquired through unlocking equipment, a lock registration code corresponding to the lock information is acquired through the lock management module, and plaintext information is acquired through AES decryption.
Optionally, determining that the identity verification passes under the condition that the plaintext information is consistent with the lock information, further comprising: comparing the plaintext information with prestored plaintext information; under the condition that the plaintext information is consistent with prestored plaintext information, the unlocking equipment sends the key unlocking code to the lockset and compares the key unlocking code with the prestored unlocking code; and under the condition that the key unlocking code is consistent with the pre-stored unlocking code, the lock management module determines that the identity of the lock passes the verification. .
Optionally, the method further comprises: determining that the identity of the lock is unqualified under the condition that the plaintext information is inconsistent with the lock information; and locks with unqualified identities are not put into use.
Thus, a method of verifying the identity of a lock is provided. The identity and the legality of the lockset are identified in the links of arrival acceptance and formal operation, so that the illegal lockset is avoided. The lock can be guaranteed to normally, safely, stably and effectively operate on site, timeliness of abnormal operation and maintenance of the lock is improved, legal rights and interests of lock purchasers are guaranteed, and meanwhile benign competitive environment of the whole market is maintained. And then solved the traditional mechanical lock that exists among the prior art and brought great burden for field operation personnel's work, can't in time discover the technical problem of the abnormal conditions of tool to lock simultaneously.
According to another aspect of the present embodiment, a system 200 for verifying the identity of a lock is also provided. Referring to fig. 2, the system includes: a lock registration code generation module 210, configured to generate, by using an AES-256 symmetric encryption method, a lock registration code corresponding to an asset number of a to-be-tested lock based on lock information by the lock registration information generation module, where the lock information includes the asset number of the to-be-tested lock, serial number information of the embedded security control module chip, a manufacturer name, a supply province, a supply type, and a product quantity; the plaintext information obtaining module 220 is used for leading in the lock registration code by the lock testing equipment through the upper computer testing software, reading the lock information by the lock testing equipment when the lock identity is verified, determining the corresponding lock registration code by using the lock asset number, and obtaining plaintext information corresponding to the lock registration code by an AES-256 symmetric decryption method; an identity verification determining module 230, configured to compare the plaintext information with the lock information, and determine that the identity verification passes when the plaintext information is consistent with the lock information.
Optionally, the identity verification module 230 includes: the key unlocking code generation submodule is used for encrypting the unlocking code plaintext, the key state and the serial number of the embedded type safety control module chip by the lock testing equipment through a key server under the condition that the plaintext information is consistent with the lock information to generate a key unlocking code; and the key unlocking code storage submodule is used for sending the key unlocking code to the lock for storage by the lock testing equipment.
Optionally, the identity verification module 230 further includes: the unlocking code sending submodule is used for sending the plaintext information and the secret key unlocking code to the lock management module by the lock testing equipment under the condition that the plaintext information is consistent with the lock information; and the clear text information obtaining submodule is used for obtaining the lock information of the lock to be unlocked through unlocking equipment when the lock management module operates, and the lock management module obtains a lock registration code corresponding to the lock information and obtains clear text information through AES decryption.
Optionally, the identity verification module 230 further includes: the plaintext information comparison submodule is used for comparing the plaintext information with prestored plaintext information; the unlocking code comparison submodule is used for sending the key unlocking code to the lockset by the unlocking equipment under the condition that the plaintext information is consistent with prestored plaintext information, and comparing the key unlocking code with the prestored unlocking code; and the lock identity passing submodule is used for determining that the identity of the lock passes the verification by the lock management module under the condition that the key unlocking code is consistent with the pre-stored unlocking code.
Optionally, the method further comprises: the identity unqualified determining module is used for determining that the identity of the lock is unqualified under the condition that the plaintext information is inconsistent with the lock information; and the unused module is used for not putting into use the lockset with unqualified identity.
The system 200 for verifying the identity of a lock in the embodiment of the present invention corresponds to a method for verifying the identity of a lock in another embodiment of the present invention, and is not described herein again.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein. The scheme in the embodiment of the application can be implemented by adopting various computer languages, such as object-oriented programming language Java and transliterated scripting language JavaScript.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.
Claims (10)
1. A method of verifying an identity of a lock, comprising:
the lock registration information generation module generates a lock registration code corresponding to the asset number of the to-be-tested lock by using an AES-256 symmetric encryption method based on the lock information, wherein the lock information comprises the asset number of the to-be-tested lock, serial number information of an embedded safety control module chip, a manufacturer name, a supply province, a supply type and a product quantity;
the lock testing equipment imports the lock registration code through upper computer testing software, reads the lock information when the lock identity is verified, determines the corresponding lock registration code by using the lock asset number, and obtains plaintext information corresponding to the lock registration code through an AES-256 symmetric decryption method;
and the lock testing equipment compares the plaintext information with the lock information and determines that the identity verification is passed under the condition that the plaintext information is consistent with the lock information.
2. The method of claim 1, wherein determining that the identity check passes if the plaintext information matches the lockset information comprises:
under the condition that the plaintext information is consistent with the lockset information, the lockset testing equipment encrypts a unlocking code plaintext, a secret key state and a serial number of the embedded type safety control module chip through a secret key server to generate a secret key unlocking code;
and the lock testing equipment sends the key unlocking code to the lock for storage.
3. The method of claim 2, wherein determining that the identity check passes if the plaintext information matches the lockset information, further comprises:
under the condition that the plaintext information is consistent with the lockset information, the lockset testing equipment sends the plaintext information and the key unlocking code to a lockset management module;
when the lock management module operates, lock information of a lock to be unlocked is acquired through unlocking equipment, a lock registration code corresponding to the lock information is acquired through the lock management module, and plaintext information is acquired through AES decryption.
4. The method of claim 3, wherein determining that the identity check passes if the plaintext information matches the lockset information, further comprises:
comparing the plaintext information with prestored plaintext information;
under the condition that the plaintext information is consistent with prestored plaintext information, the unlocking equipment sends the key unlocking code to the lockset and compares the key unlocking code with the prestored unlocking code;
and under the condition that the key unlocking code is consistent with the pre-stored unlocking code, the lock management module determines that the identity of the lock passes the verification.
5. The method of claim 1, further comprising:
determining that the identity of the lock is unqualified under the condition that the plaintext information is inconsistent with the lock information; and
the lock with unqualified identity is not put into use.
6. A system for verifying an identity of a lock, comprising:
the lock registration code generation module is used for generating a lock registration code corresponding to the asset number of the to-be-tested lock by using an AES-256 symmetric encryption method based on lock information by the lock registration information generation module, wherein the lock information comprises the asset number of the to-be-tested lock, serial number information of an embedded safety control module chip, a manufacturer name, a goods supply province, a goods supply type and the product quantity;
the lock identity verification module is used for acquiring a lock identity code of a lock, and acquiring plaintext information corresponding to the lock registration code by using an AES-256 symmetric decryption method;
and the identity verification determining module is used for comparing the plaintext information with the lockset information by the lockset testing equipment and determining that the identity verification is passed under the condition that the plaintext information is consistent with the lockset information.
7. The system of claim 6, wherein determining an identity check module comprises:
the key unlocking code generation submodule is used for encrypting the unlocking code plaintext, the key state and the serial number of the embedded type safety control module chip by the lock testing equipment through a key server under the condition that the plaintext information is consistent with the lock information to generate a key unlocking code;
and the key unlocking code storage submodule is used for sending the key unlocking code to the lock for storage by the lock testing equipment.
8. The system of claim 7, wherein determining an identity check module further comprises:
the unlocking code sending submodule is used for sending the plaintext information and the secret key unlocking code to the lock management module by the lock testing equipment under the condition that the plaintext information is consistent with the lock information;
and the clear text information obtaining submodule is used for obtaining the lock information of the lock to be unlocked through unlocking equipment when the lock management module operates, and the lock management module obtains a lock registration code corresponding to the lock information and obtains clear text information through AES decryption.
9. The system of claim 8, wherein determining an identity check module further comprises:
the plaintext information comparison submodule is used for comparing the plaintext information with prestored plaintext information;
the unlocking code comparison submodule is used for sending the key unlocking code to the lockset by the unlocking equipment under the condition that the plaintext information is consistent with prestored plaintext information, and comparing the key unlocking code with the prestored unlocking code;
and the lock identity passing submodule is used for determining that the identity of the lock passes the verification by the lock management module under the condition that the key unlocking code is consistent with the pre-stored unlocking code.
10. The system of claim 6, further comprising:
the identity unqualified determining module is used for determining that the identity of the lock is unqualified under the condition that the plaintext information is inconsistent with the lock information; and
and the unused module is used for not putting the lock with unqualified identity into use.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110125277.7A CN112910886A (en) | 2021-01-29 | 2021-01-29 | Method and system for verifying identity of lock |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110125277.7A CN112910886A (en) | 2021-01-29 | 2021-01-29 | Method and system for verifying identity of lock |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112910886A true CN112910886A (en) | 2021-06-04 |
Family
ID=76120804
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110125277.7A Pending CN112910886A (en) | 2021-01-29 | 2021-01-29 | Method and system for verifying identity of lock |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112910886A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113645198A (en) * | 2021-07-23 | 2021-11-12 | 谭静 | Computer network information safety monitoring method |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109564598A (en) * | 2017-03-13 | 2019-04-02 | 华为技术有限公司 | A kind of endpoint detection methods and terminal |
CN109712278A (en) * | 2018-11-27 | 2019-05-03 | 深圳市小石安防科技有限公司 | Intelligent door lock identity identifying method, system, readable storage medium storing program for executing and mobile terminal |
WO2019204954A1 (en) * | 2018-04-23 | 2019-10-31 | 杭州全视软件有限公司 | Smart lock system |
CN112116738A (en) * | 2020-08-13 | 2020-12-22 | 中国电力科学研究院有限公司 | Parameter issuing method and system for electric power intelligent Internet of things safety lock |
-
2021
- 2021-01-29 CN CN202110125277.7A patent/CN112910886A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109564598A (en) * | 2017-03-13 | 2019-04-02 | 华为技术有限公司 | A kind of endpoint detection methods and terminal |
WO2019204954A1 (en) * | 2018-04-23 | 2019-10-31 | 杭州全视软件有限公司 | Smart lock system |
CN109712278A (en) * | 2018-11-27 | 2019-05-03 | 深圳市小石安防科技有限公司 | Intelligent door lock identity identifying method, system, readable storage medium storing program for executing and mobile terminal |
CN112116738A (en) * | 2020-08-13 | 2020-12-22 | 中国电力科学研究院有限公司 | Parameter issuing method and system for electric power intelligent Internet of things safety lock |
Non-Patent Citations (1)
Title |
---|
廖杰 阮忠海: ""基于手机蓝牙开锁的 门禁系统"", 《中国公共安全》, pages 44 - 46 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113645198A (en) * | 2021-07-23 | 2021-11-12 | 谭静 | Computer network information safety monitoring method |
CN113645198B (en) * | 2021-07-23 | 2023-12-26 | 天津航远信息技术有限公司 | Computer network information safety monitoring method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10841102B2 (en) | Method and system for creating and checking the validity of device certificates | |
CN104778141B (en) | A kind of TPCM modules based on control system trusted infrastructure and credible detection method | |
US9729322B2 (en) | Method and system for smart card chip personalization | |
KR101659110B1 (en) | Method for authenticating access to a secured chip by a test device | |
CN107430658B (en) | Security software certification and verifying | |
CN105162797B (en) | A kind of mutual authentication method based on video monitoring system | |
CN107948155A (en) | Cryptographic check method, apparatus, computer equipment and computer-readable recording medium | |
CN110443925A (en) | Generation method, device, storage medium and the computer equipment of temporary password | |
CN111475828B (en) | Encryption method and device, decryption method and device of block chain account book data | |
CN104636444B (en) | A kind of encryption and decryption method and device of database | |
CN112994893B (en) | Secret key burning method in chip production test stage | |
CN114267100B (en) | Unlocking authentication method and device, security chip and electronic key management system | |
CN108848064A (en) | authorization management method and system | |
CN103970540B (en) | Key Functions secure calling method and device | |
CN104881595B (en) | The self-help remote unlocking method managed based on PIN code | |
CN112910886A (en) | Method and system for verifying identity of lock | |
CN113518071B (en) | Robot sensor information security enhancing device and method | |
CN113963464A (en) | Bank safe deposit box unlocking system and method based on block chain | |
CN103414567B (en) | Information monitoring method and system | |
CN110601854B (en) | Authorization client, power distribution terminal equipment and authorization method thereof | |
CN105897730A (en) | User name and password information encryption and verification method | |
CN108595974B (en) | Quick verification system for electronic product code | |
CN103378966A (en) | Secret key programming on safety dynamic piece | |
CN106027256A (en) | Identity card reading response system | |
CN112904182B (en) | Test mode entry control method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |