CN112910886A - Method and system for verifying identity of lock - Google Patents

Method and system for verifying identity of lock Download PDF

Info

Publication number
CN112910886A
CN112910886A CN202110125277.7A CN202110125277A CN112910886A CN 112910886 A CN112910886 A CN 112910886A CN 202110125277 A CN202110125277 A CN 202110125277A CN 112910886 A CN112910886 A CN 112910886A
Authority
CN
China
Prior art keywords
lock
information
identity
plaintext
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110125277.7A
Other languages
Chinese (zh)
Inventor
朱子旭
祝恩国
邹和平
巫钟兴
刘兴奇
张宇鹏
韩月
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
China Electric Power Research Institute Co Ltd CEPRI
Original Assignee
State Grid Corp of China SGCC
China Electric Power Research Institute Co Ltd CEPRI
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, China Electric Power Research Institute Co Ltd CEPRI filed Critical State Grid Corp of China SGCC
Priority to CN202110125277.7A priority Critical patent/CN112910886A/en
Publication of CN112910886A publication Critical patent/CN112910886A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a method and a system for verifying the identity of a lockset. Wherein, the method comprises the following steps: the lock registration information generation module generates a lock registration code corresponding to the asset number of the to-be-tested lock by using an AES-256 symmetric encryption method based on the lock information, wherein the lock information comprises the asset number of the to-be-tested lock, serial number information of an embedded safety control module chip, a manufacturer name, a supply province, a supply type and a product quantity; the lock testing equipment imports the lock registration code through upper computer testing software, reads the lock information when the lock identity is verified, determines the corresponding lock registration code by using the lock asset number, and obtains plaintext information corresponding to the lock registration code through an AES-256 symmetric decryption method; and the lock testing equipment compares the plaintext information with the lock information and determines that the identity verification is passed under the condition that the plaintext information is consistent with the lock information.

Description

Method and system for verifying identity of lock
Technical Field
The application relates to the technical field of electric power internet of things, in particular to a method and a system for verifying the identity of a lock.
Background
At present, traditional mechanical locks are widely installed in customer side end batch box equipment. The work of using traditional mechanical tool to lock to give the field operation personnel brings great burden, can't discover in time simultaneously the nature of tool to lock or artificial damage, illegal unlocking etc. abnormal conditions, bring risks such as stealing electricity. For satisfying the demand of electric power thing networking construction, electric power intelligence thing allies oneself with safety lock and promotes traditional tool to lock from perception, innovation, safe three aspect comprehensively, improves the security that the tool to lock used and the convenience of management. Meanwhile, the state of the lock is monitored, the abnormal condition of the lock is reported in time, and the adverse effect caused by damage of the lock is reduced.
Aiming at the technical problems that the traditional mechanical lockset in the prior art brings great burden to the work of field operation personnel and can not find the abnormal condition of the lockset in time, an effective solution is not provided at present.
Disclosure of Invention
The embodiment of the disclosure provides a method and a system for verifying the identity of a lock, which at least solve the technical problems that the traditional mechanical lock in the prior art brings great burden to the work of field operation personnel and can not find the abnormal condition of the lock in time.
According to an aspect of the embodiments of the present disclosure, there is provided a method for verifying an identity of a lock, including: the lock registration information generation module generates a lock registration code corresponding to the asset number of the to-be-tested lock by using an AES-256 symmetric encryption method based on the lock information, wherein the lock information comprises the asset number of the to-be-tested lock, serial number information of an embedded safety control module chip, a manufacturer name, a supply province, a supply type and a product quantity; the lock testing equipment imports the lock registration code through upper computer testing software; when the identity of the lock is checked, the lock testing equipment reads the asset number of the lock to be tested and the serial number of the embedded safety control module chip, determines the corresponding lock registration code by using the lock asset number, and obtains plaintext information corresponding to the lock registration code by an AES-256 symmetric decryption method; and the lock testing equipment compares the plaintext information with the lock information and determines that the identity verification is passed under the condition that the plaintext information is consistent with the lock information.
According to another aspect of the embodiments of the present disclosure, there is also provided a system for verifying an identity of a lock, including: the lock registration code generation module is used for generating a lock registration code corresponding to the asset number of the to-be-tested lock by using an AES-256 symmetric encryption method based on lock information by the lock registration information generation module, wherein the lock information comprises the asset number of the to-be-tested lock, serial number information of an embedded safety control module chip, a manufacturer name, a goods supply province, a goods supply type and the product quantity; the lock identity verification module is used for acquiring a lock identity code of a lock, and acquiring plaintext information corresponding to the lock registration code by using an AES-256 symmetric decryption method; and the identity verification determining module is used for comparing the plaintext information with the lockset information by the lockset testing equipment and determining that the identity verification is passed under the condition that the plaintext information is consistent with the lockset information.
In the present invention, a method of verifying the identity of a lock is provided. The identity and the legality of the lockset are identified in the links of arrival acceptance and formal operation, so that the illegal lockset is avoided. The lock can be guaranteed to normally, safely, stably and effectively operate on site, timeliness of abnormal operation and maintenance of the lock is improved, legal rights and interests of lock purchasers are guaranteed, and meanwhile benign competitive environment of the whole market is maintained. And then solved the traditional mechanical lock that exists among the prior art and brought great burden for field operation personnel's work, can't in time discover the technical problem of the abnormal conditions of tool to lock simultaneously.
Drawings
The accompanying drawings, which are included to provide a further understanding of the disclosure and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the disclosure and together with the description serve to explain the disclosure and not to limit the disclosure. In the drawings:
fig. 1 is a schematic flow chart of a method for verifying an identity of a lock according to an embodiment of the present disclosure;
fig. 2 is a schematic flow chart of a system for verifying an identity of a lock according to an embodiment of the present disclosure.
Detailed Description
The exemplary embodiments of the present invention will now be described with reference to the accompanying drawings, however, the present invention may be embodied in many different forms and is not limited to the embodiments described herein, which are provided for complete and complete disclosure of the present invention and to fully convey the scope of the present invention to those skilled in the art. The terminology used in the exemplary embodiments illustrated in the accompanying drawings is not intended to be limiting of the invention. In the drawings, the same units/elements are denoted by the same reference numerals.
Unless otherwise defined, terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Further, it will be understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense.
According to a first aspect of the present embodiment, a method of verifying an identity of a lock is provided. Fig. 1 shows a schematic flow diagram of the method, which, with reference to fig. 1, comprises:
s102: the lock registration information generation module generates a lock registration code corresponding to the asset number of the to-be-tested lock by using an AES-256 symmetric encryption method based on the lock information, wherein the lock information comprises the asset number of the to-be-tested lock, serial number information of an embedded safety control module chip, a manufacturer name, a supply province, a supply type and a product quantity;
s104: the lock testing equipment imports the lock registration code through upper computer testing software, reads the asset number of the to-be-tested lock and the serial number of the embedded safety control module chip when the lock identity is verified, determines the corresponding lock registration code by using the lock asset number, and obtains plaintext information corresponding to the lock registration code through an AES-256 symmetric decryption method;
s106: and the lock testing equipment compares the plaintext information with the lock information and determines that the identity verification is passed under the condition that the plaintext information is consistent with the lock information.
Specifically, in this embodiment, the method for verifying the identity of the lock mainly includes three steps. Firstly, before the formal supply, a lock manufacturer obtains the asset number of the lock to be produced and the serial number of the ESAM chip from provincial companies and related organizations respectively. The manufacturer determines the one-to-one corresponding relation of the two according to the actual production condition, and forms the lock filing information table with the information of the manufacturer name, the supply province, the supply type, the product quantity and the like. The information such as the asset number of the lockset to be tested and the serial number of the embedded safety control module chip comprises the name of a manufacturer, the province of goods supply, the type of goods supply and the quantity of products. In addition, the manufacturer needs to fill in the lock filing application form of the batch of products, and submits the two documents together. To the receiving unit. And after the acceptance unit passes the verification, carrying out AES-256 symmetric encryption on the lock information in the information table to form a corresponding unique lock registration code, and providing the registration code for provincial companies for subsequent detection.
And secondly, in the link of receiving and accepting the goods by the provincial company, detecting the goods-receiving lock by using electric intelligent Internet of things safety lock testing equipment and issuing information such as an ESAM chip key, an asset number and the like. At the moment, the legality of the identity of the lockset needs to be identified by utilizing the lockset registration code, so that the illegal lockset is prevented from passing the test. A detection person introduces a lock registration code through upper computer test software, when the step of issuing an ESAM chip key and an asset number of the lock is executed, the upper computer software obtains the asset number and the ESAM chip serial number of the lock through test equipment, the same encryption key and algorithm as the previous step are used for encrypting the lock information, the encryption result is compared with the introduced lock registration code, the failed lock immediately stops testing and judges that the test result is unqualified, the unqualified lock cannot be put into use on site without information such as the ESAM chip key and the asset number, and the illegal lock is avoided. And continuously sending information through the compared lock, and encrypting the unlocking code plaintext, the key state and the ESAM serial number by the key server to form an unlocking code and storing the unlocking code in the lock. And after all the locks are tested, the unlocking codes are derived and provided for the lock management module.
Finally, in the formal operation link of the lock, when a field worker performs operations such as opening and closing the lock, the information such as the ESAM serial number and the asset number of the lock is read through a field operation terminal, the ESAM serial number and the asset number are connected with the lock in a safety application mode, and the acquired lock information is sent to a lock management module. The module checks the information, and subsequent operation cannot be performed if the information is not checked, so that illegal locks are avoided. If the unlocking code is verified, the corresponding unlocking code is sent to the lockset through the field operation terminal by the module, and the lockset can execute corresponding operation after being compared, so that the lockset is prevented from being cracked and the like.
Thus, a method of verifying the identity of a lock is provided. The identity and the legality of the lockset are identified in the links of arrival acceptance and formal operation, so that the illegal lockset is avoided. The lock can be guaranteed to normally, safely, stably and effectively operate on site, timeliness of abnormal operation and maintenance of the lock is improved, legal rights and interests of lock purchasers are guaranteed, and meanwhile benign competitive environment of the whole market is maintained. And then solved the traditional mechanical lock that exists among the prior art and brought great burden for field operation personnel's work, can't in time discover the technical problem of the abnormal conditions of tool to lock simultaneously.
Optionally, in a case that the plaintext information is consistent with the lock information, determining that the identity check passes includes: under the condition that the plaintext information is consistent with the lockset information, the lockset testing equipment encrypts a unlocking code plaintext, a secret key state and a serial number of the embedded type safety control module chip through a secret key server to generate a secret key unlocking code; and the lock testing equipment sends the key unlocking code to the lock for storage.
Optionally, determining that the identity verification passes under the condition that the plaintext information is consistent with the lock information, further comprising: under the condition that the plaintext information is consistent with the lockset information, the lockset testing equipment sends the plaintext information and the key unlocking code to a lockset management module; when the lock management module operates, lock information of a lock to be unlocked is acquired through unlocking equipment, a lock registration code corresponding to the lock information is acquired through the lock management module, and plaintext information is acquired through AES decryption.
Optionally, determining that the identity verification passes under the condition that the plaintext information is consistent with the lock information, further comprising: comparing the plaintext information with prestored plaintext information; under the condition that the plaintext information is consistent with prestored plaintext information, the unlocking equipment sends the key unlocking code to the lockset and compares the key unlocking code with the prestored unlocking code; and under the condition that the key unlocking code is consistent with the pre-stored unlocking code, the lock management module determines that the identity of the lock passes the verification. .
Optionally, the method further comprises: determining that the identity of the lock is unqualified under the condition that the plaintext information is inconsistent with the lock information; and locks with unqualified identities are not put into use.
Thus, a method of verifying the identity of a lock is provided. The identity and the legality of the lockset are identified in the links of arrival acceptance and formal operation, so that the illegal lockset is avoided. The lock can be guaranteed to normally, safely, stably and effectively operate on site, timeliness of abnormal operation and maintenance of the lock is improved, legal rights and interests of lock purchasers are guaranteed, and meanwhile benign competitive environment of the whole market is maintained. And then solved the traditional mechanical lock that exists among the prior art and brought great burden for field operation personnel's work, can't in time discover the technical problem of the abnormal conditions of tool to lock simultaneously.
According to another aspect of the present embodiment, a system 200 for verifying the identity of a lock is also provided. Referring to fig. 2, the system includes: a lock registration code generation module 210, configured to generate, by using an AES-256 symmetric encryption method, a lock registration code corresponding to an asset number of a to-be-tested lock based on lock information by the lock registration information generation module, where the lock information includes the asset number of the to-be-tested lock, serial number information of the embedded security control module chip, a manufacturer name, a supply province, a supply type, and a product quantity; the plaintext information obtaining module 220 is used for leading in the lock registration code by the lock testing equipment through the upper computer testing software, reading the lock information by the lock testing equipment when the lock identity is verified, determining the corresponding lock registration code by using the lock asset number, and obtaining plaintext information corresponding to the lock registration code by an AES-256 symmetric decryption method; an identity verification determining module 230, configured to compare the plaintext information with the lock information, and determine that the identity verification passes when the plaintext information is consistent with the lock information.
Optionally, the identity verification module 230 includes: the key unlocking code generation submodule is used for encrypting the unlocking code plaintext, the key state and the serial number of the embedded type safety control module chip by the lock testing equipment through a key server under the condition that the plaintext information is consistent with the lock information to generate a key unlocking code; and the key unlocking code storage submodule is used for sending the key unlocking code to the lock for storage by the lock testing equipment.
Optionally, the identity verification module 230 further includes: the unlocking code sending submodule is used for sending the plaintext information and the secret key unlocking code to the lock management module by the lock testing equipment under the condition that the plaintext information is consistent with the lock information; and the clear text information obtaining submodule is used for obtaining the lock information of the lock to be unlocked through unlocking equipment when the lock management module operates, and the lock management module obtains a lock registration code corresponding to the lock information and obtains clear text information through AES decryption.
Optionally, the identity verification module 230 further includes: the plaintext information comparison submodule is used for comparing the plaintext information with prestored plaintext information; the unlocking code comparison submodule is used for sending the key unlocking code to the lockset by the unlocking equipment under the condition that the plaintext information is consistent with prestored plaintext information, and comparing the key unlocking code with the prestored unlocking code; and the lock identity passing submodule is used for determining that the identity of the lock passes the verification by the lock management module under the condition that the key unlocking code is consistent with the pre-stored unlocking code.
Optionally, the method further comprises: the identity unqualified determining module is used for determining that the identity of the lock is unqualified under the condition that the plaintext information is inconsistent with the lock information; and the unused module is used for not putting into use the lockset with unqualified identity.
The system 200 for verifying the identity of a lock in the embodiment of the present invention corresponds to a method for verifying the identity of a lock in another embodiment of the present invention, and is not described herein again.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein. The scheme in the embodiment of the application can be implemented by adopting various computer languages, such as object-oriented programming language Java and transliterated scripting language JavaScript.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (10)

1. A method of verifying an identity of a lock, comprising:
the lock registration information generation module generates a lock registration code corresponding to the asset number of the to-be-tested lock by using an AES-256 symmetric encryption method based on the lock information, wherein the lock information comprises the asset number of the to-be-tested lock, serial number information of an embedded safety control module chip, a manufacturer name, a supply province, a supply type and a product quantity;
the lock testing equipment imports the lock registration code through upper computer testing software, reads the lock information when the lock identity is verified, determines the corresponding lock registration code by using the lock asset number, and obtains plaintext information corresponding to the lock registration code through an AES-256 symmetric decryption method;
and the lock testing equipment compares the plaintext information with the lock information and determines that the identity verification is passed under the condition that the plaintext information is consistent with the lock information.
2. The method of claim 1, wherein determining that the identity check passes if the plaintext information matches the lockset information comprises:
under the condition that the plaintext information is consistent with the lockset information, the lockset testing equipment encrypts a unlocking code plaintext, a secret key state and a serial number of the embedded type safety control module chip through a secret key server to generate a secret key unlocking code;
and the lock testing equipment sends the key unlocking code to the lock for storage.
3. The method of claim 2, wherein determining that the identity check passes if the plaintext information matches the lockset information, further comprises:
under the condition that the plaintext information is consistent with the lockset information, the lockset testing equipment sends the plaintext information and the key unlocking code to a lockset management module;
when the lock management module operates, lock information of a lock to be unlocked is acquired through unlocking equipment, a lock registration code corresponding to the lock information is acquired through the lock management module, and plaintext information is acquired through AES decryption.
4. The method of claim 3, wherein determining that the identity check passes if the plaintext information matches the lockset information, further comprises:
comparing the plaintext information with prestored plaintext information;
under the condition that the plaintext information is consistent with prestored plaintext information, the unlocking equipment sends the key unlocking code to the lockset and compares the key unlocking code with the prestored unlocking code;
and under the condition that the key unlocking code is consistent with the pre-stored unlocking code, the lock management module determines that the identity of the lock passes the verification.
5. The method of claim 1, further comprising:
determining that the identity of the lock is unqualified under the condition that the plaintext information is inconsistent with the lock information; and
the lock with unqualified identity is not put into use.
6. A system for verifying an identity of a lock, comprising:
the lock registration code generation module is used for generating a lock registration code corresponding to the asset number of the to-be-tested lock by using an AES-256 symmetric encryption method based on lock information by the lock registration information generation module, wherein the lock information comprises the asset number of the to-be-tested lock, serial number information of an embedded safety control module chip, a manufacturer name, a goods supply province, a goods supply type and the product quantity;
the lock identity verification module is used for acquiring a lock identity code of a lock, and acquiring plaintext information corresponding to the lock registration code by using an AES-256 symmetric decryption method;
and the identity verification determining module is used for comparing the plaintext information with the lockset information by the lockset testing equipment and determining that the identity verification is passed under the condition that the plaintext information is consistent with the lockset information.
7. The system of claim 6, wherein determining an identity check module comprises:
the key unlocking code generation submodule is used for encrypting the unlocking code plaintext, the key state and the serial number of the embedded type safety control module chip by the lock testing equipment through a key server under the condition that the plaintext information is consistent with the lock information to generate a key unlocking code;
and the key unlocking code storage submodule is used for sending the key unlocking code to the lock for storage by the lock testing equipment.
8. The system of claim 7, wherein determining an identity check module further comprises:
the unlocking code sending submodule is used for sending the plaintext information and the secret key unlocking code to the lock management module by the lock testing equipment under the condition that the plaintext information is consistent with the lock information;
and the clear text information obtaining submodule is used for obtaining the lock information of the lock to be unlocked through unlocking equipment when the lock management module operates, and the lock management module obtains a lock registration code corresponding to the lock information and obtains clear text information through AES decryption.
9. The system of claim 8, wherein determining an identity check module further comprises:
the plaintext information comparison submodule is used for comparing the plaintext information with prestored plaintext information;
the unlocking code comparison submodule is used for sending the key unlocking code to the lockset by the unlocking equipment under the condition that the plaintext information is consistent with prestored plaintext information, and comparing the key unlocking code with the prestored unlocking code;
and the lock identity passing submodule is used for determining that the identity of the lock passes the verification by the lock management module under the condition that the key unlocking code is consistent with the pre-stored unlocking code.
10. The system of claim 6, further comprising:
the identity unqualified determining module is used for determining that the identity of the lock is unqualified under the condition that the plaintext information is inconsistent with the lock information; and
and the unused module is used for not putting the lock with unqualified identity into use.
CN202110125277.7A 2021-01-29 2021-01-29 Method and system for verifying identity of lock Pending CN112910886A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110125277.7A CN112910886A (en) 2021-01-29 2021-01-29 Method and system for verifying identity of lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110125277.7A CN112910886A (en) 2021-01-29 2021-01-29 Method and system for verifying identity of lock

Publications (1)

Publication Number Publication Date
CN112910886A true CN112910886A (en) 2021-06-04

Family

ID=76120804

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110125277.7A Pending CN112910886A (en) 2021-01-29 2021-01-29 Method and system for verifying identity of lock

Country Status (1)

Country Link
CN (1) CN112910886A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113645198A (en) * 2021-07-23 2021-11-12 谭静 Computer network information safety monitoring method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109564598A (en) * 2017-03-13 2019-04-02 华为技术有限公司 A kind of endpoint detection methods and terminal
CN109712278A (en) * 2018-11-27 2019-05-03 深圳市小石安防科技有限公司 Intelligent door lock identity identifying method, system, readable storage medium storing program for executing and mobile terminal
WO2019204954A1 (en) * 2018-04-23 2019-10-31 杭州全视软件有限公司 Smart lock system
CN112116738A (en) * 2020-08-13 2020-12-22 中国电力科学研究院有限公司 Parameter issuing method and system for electric power intelligent Internet of things safety lock

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109564598A (en) * 2017-03-13 2019-04-02 华为技术有限公司 A kind of endpoint detection methods and terminal
WO2019204954A1 (en) * 2018-04-23 2019-10-31 杭州全视软件有限公司 Smart lock system
CN109712278A (en) * 2018-11-27 2019-05-03 深圳市小石安防科技有限公司 Intelligent door lock identity identifying method, system, readable storage medium storing program for executing and mobile terminal
CN112116738A (en) * 2020-08-13 2020-12-22 中国电力科学研究院有限公司 Parameter issuing method and system for electric power intelligent Internet of things safety lock

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
廖杰 阮忠海: ""基于手机蓝牙开锁的 门禁系统"", 《中国公共安全》, pages 44 - 46 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113645198A (en) * 2021-07-23 2021-11-12 谭静 Computer network information safety monitoring method
CN113645198B (en) * 2021-07-23 2023-12-26 天津航远信息技术有限公司 Computer network information safety monitoring method

Similar Documents

Publication Publication Date Title
US10841102B2 (en) Method and system for creating and checking the validity of device certificates
CN104778141B (en) A kind of TPCM modules based on control system trusted infrastructure and credible detection method
US9729322B2 (en) Method and system for smart card chip personalization
KR101659110B1 (en) Method for authenticating access to a secured chip by a test device
CN107430658B (en) Security software certification and verifying
CN105162797B (en) A kind of mutual authentication method based on video monitoring system
CN107948155A (en) Cryptographic check method, apparatus, computer equipment and computer-readable recording medium
CN110443925A (en) Generation method, device, storage medium and the computer equipment of temporary password
CN111475828B (en) Encryption method and device, decryption method and device of block chain account book data
CN104636444B (en) A kind of encryption and decryption method and device of database
CN112994893B (en) Secret key burning method in chip production test stage
CN114267100B (en) Unlocking authentication method and device, security chip and electronic key management system
CN108848064A (en) authorization management method and system
CN103970540B (en) Key Functions secure calling method and device
CN104881595B (en) The self-help remote unlocking method managed based on PIN code
CN112910886A (en) Method and system for verifying identity of lock
CN113518071B (en) Robot sensor information security enhancing device and method
CN113963464A (en) Bank safe deposit box unlocking system and method based on block chain
CN103414567B (en) Information monitoring method and system
CN110601854B (en) Authorization client, power distribution terminal equipment and authorization method thereof
CN105897730A (en) User name and password information encryption and verification method
CN108595974B (en) Quick verification system for electronic product code
CN103378966A (en) Secret key programming on safety dynamic piece
CN106027256A (en) Identity card reading response system
CN112904182B (en) Test mode entry control method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination