CN113034734A - Authorization method of electronic key, storage medium and computer device - Google Patents

Authorization method of electronic key, storage medium and computer device Download PDF

Info

Publication number
CN113034734A
CN113034734A CN201911244004.3A CN201911244004A CN113034734A CN 113034734 A CN113034734 A CN 113034734A CN 201911244004 A CN201911244004 A CN 201911244004A CN 113034734 A CN113034734 A CN 113034734A
Authority
CN
China
Prior art keywords
electronic key
electronic
control assembly
unlocking
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911244004.3A
Other languages
Chinese (zh)
Other versions
CN113034734B (en
Inventor
张君劼
杨靖
袁梁
马健
张韬
王睿
强志勇
郑朝新
王疆
邢珂铱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Petrochina Co Ltd
Original Assignee
Petrochina Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Petrochina Co Ltd filed Critical Petrochina Co Ltd
Priority to CN201911244004.3A priority Critical patent/CN113034734B/en
Publication of CN113034734A publication Critical patent/CN113034734A/en
Application granted granted Critical
Publication of CN113034734B publication Critical patent/CN113034734B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Abstract

The invention discloses an electronic key authorization method, a storage medium and computer equipment. Wherein, the method comprises the following steps: establishing a communication network of the electronic key and the electronic lock control assembly equipment; the electronic key sends an unlocking request based on the communication network, and the electronic lock control assembly equipment forwards the unlocking request to the server side; the server side authenticates according to the unlocking request to obtain an authentication result; and determining the unlocking operation or the locking operation of the electronic key on the electronic lock control assembly equipment according to the authentication result. The invention solves the technical problem of low safety caused by the fact that authorization information cannot be effectively detected by adopting off-line electronic key authorization in the related technology.

Description

Authorization method of electronic key, storage medium and computer device
Technical Field
The invention relates to the field of local area network equipment, in particular to an electronic key authorization method, a storage medium and computer equipment.
Background
At present, an electronic key used in cooperation with an explosion-proof passive intelligent electronic lock is mostly off-line in authorization and authentication modes. The method is characterized in that authorization information of the explosion-proof passive intelligent electronic lock is stored in the electronic key in advance, when the electronic key is used for unlocking, the key and the lock are communicated and authenticated, and the lock is unlocked after the authentication is passed. This mode has two problems: firstly, the method comprises the following steps: the authorization information is pre-stored in the electronic key, and no way for detecting whether the authorization information is expired is available. Secondly, the method comprises the following steps: this kind of mode requires that the electronic key need be in the power-on state for a long time, and the consumption is great, needs the user to charge frequently, influences the use and experiences.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the invention provides an authorization method of an electronic key, a storage medium and computer equipment, which are used for at least solving the technical problem of low safety caused by the fact that authorization information cannot be effectively detected due to the fact that offline electronic key authorization is adopted in the related technology.
According to an aspect of an embodiment of the present invention, there is provided an authorization method of an electronic key, including: establishing a communication network of the electronic key and the electronic lock control assembly equipment; the electronic key sends an unlocking request based on the communication network, and the electronic lock control assembly equipment forwards the unlocking request to a server side; the server side authenticates according to the unlocking request to obtain an authentication result; and determining the unlocking operation or the locking operation of the electronic key on the electronic lock control assembly equipment according to the authentication result.
Optionally, establishing a communication network between the electronic key and the electronic lock control assembly device includes: receiving a trigger instruction of a switch of the electronic key; determining the working state of the electronic key according to the trigger instruction; and generating the communication network based on the working state.
Optionally, according to the trigger instruction, determining the operating state of the electronic key includes: detecting whether the duration of the trigger instruction is greater than or equal to a predetermined time threshold; if the duration is greater than or equal to the preset time threshold, the electronic key is started; and if the duration is less than the preset time threshold, the electronic key is powered off.
Optionally, after the electronic key sends an unlocking request based on the communication network and the electronic lock control assembly device forwards the unlocking request to the server, the method further includes: judging whether the unlocking request is distributed or not to obtain a judgment result; and determining a processing mode corresponding to the unlocking request according to the judgment result.
Optionally, after determining that the processing manner is the first mode, the method further includes: acquiring key information of the electronic key and lock information of the electronic lock control assembly equipment; determining distribution information of the electronic key according to the key information and the lock information; and storing the distribution information to the electronic key and/or the server side.
Optionally, after determining that the processing manner is the second mode, the method further includes: obtaining a cached log record, wherein the log record is used for storing records of unlocking operation or locking operation; judging whether the log record meets a preset condition or not to obtain a judgment result; and processing the log record according to the judgment result.
Optionally, the authenticating, by the server, according to the unlocking request, and obtaining an authentication result includes: determining key information and/or lock information corresponding to the unlocking request; when the key information and/or the lock information are matched with prestored distribution information, a first instruction is sent, and the first instruction is an instruction for allowing unlocking or locking; and when the key information and/or the lock information are not matched with the distribution information, sending a second instruction, wherein the second instruction is an instruction which does not allow unlocking or locking.
Optionally, determining, according to the authentication result, that the unlocking or locking operation of the electronic lock control assembly device by the electronic key includes: and rotating the electronic key to carry out unlocking operation or locking operation on the electronic lock control assembly equipment.
Optionally, determining, according to the authentication result, an unlocking operation or a locking operation of the electronic lock control assembly device by the electronic key further includes: detecting the on-off state of the electronic lock control assembly equipment; and sending the switch state to the server side, and receiving the switch state and recording the switch state by the server side.
According to another aspect of the embodiments of the present invention, there is also provided a storage medium storing a program, wherein the program controls a processor to execute the method of authorizing an electronic key according to any one of the above when the program is executed by the processor.
According to another aspect of the embodiments of the present invention, there is also provided a computer device, including: a memory and a processor, the memory storing a computer program; the processor is configured to execute the computer program stored in the memory, and when the computer program runs, the processor is configured to execute the method for authorizing an electronic key according to any one of the above-mentioned methods.
In the embodiment of the invention, the communication networking of the electronic key and the electronic lock control assembly equipment is established; the electronic key sends an unlocking request based on the communication network, and the electronic lock control assembly equipment forwards the unlocking request to a server side; the server side authenticates according to the unlocking request to obtain an authentication result; according to the authentication result, the unlocking operation or locking operation mode of the electronic key on the electronic lock control assembly equipment is determined, the unlocking request sent by the electronic key is authenticated at the server side by establishing the communication network of the electronic key and the electronic lock control assembly equipment, so that the unlocking operation or locking operation corresponding to the authorized electronic key is determined, the purpose of real-time online authorization is achieved, the technical effect of improving the safety and reliability of the electronic key unlocking and locking operation is achieved, and the technical problem that the safety is low due to the fact that offline electronic key authorization is adopted in the related technology and authorization information cannot be effectively detected is solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
fig. 1 is a flowchart of an authorization method of an electronic key according to an embodiment of the present invention;
FIG. 2 is a flow chart of a method of authorizing an electronic key according to an alternate embodiment of the present invention;
FIG. 3 is a flow chart of a key distribution in a method of authorizing an electronic key according to an alternative embodiment of the present invention;
fig. 4 is a flowchart of reporting a lock status in an authorization method of an electronic key according to an alternative embodiment of the present invention;
fig. 5 is a logic flow diagram of the operation of a method of authorizing an electronic key in accordance with an alternative embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
ZigBee is a low power consumption local area network protocol based on IEEE802.15.4 standard. According to international standards, the ZigBee technology is a short-range, low-power consumption wireless communication technology. Its advantages are short distance, low complexity, self-organization, low power consumption and low data rate. The device is mainly suitable for the fields of automatic control and remote control, and can be embedded into various devices. In short, ZigBee is an inexpensive and low-power-consumption short-range wireless networking communication technology. ZigBee is a wireless network protocol for low-speed short-distance transmission. The ZigBee protocol is, from bottom to top, a physical layer (PHY), a media access control layer (MAC), a Transport Layer (TL), a network layer (NWK), an application layer (APL), and the like. Wherein the physical layer and the medium access control layer comply with the provisions of the IEEE802.15.4 standard.
Example 1
In accordance with an embodiment of the present invention, there is provided an embodiment of a method for authorization of an electronic key, it should be noted that the steps illustrated in the flowchart of the accompanying drawings may be executed in a computer system such as a set of computer executable instructions, and that while a logical order is illustrated in the flowchart, in some cases, the steps illustrated or described may be executed in an order different than that herein.
Fig. 1 is a flowchart of an authorization method of an electronic key according to an embodiment of the present invention, as shown in fig. 1, the method including the steps of:
step S102, establishing a communication network of the electronic key and the electronic lock control assembly equipment;
the communication networking is constructed based on a wireless network protocol, wherein the wireless network protocol comprises but is not limited to ZigBee. In addition, in the communication networking, the number of the electronic key and the electronic lock control assembly equipment is not limited at all, and may be one or more. The electronic key and the electronic lock control assembly equipment are provided with the ZigBee communication modules, so that the power consumption can be reduced while the communication requirement is met.
Step S104, the electronic key sends an unlocking request based on the communication network, and the electronic lock control assembly equipment forwards the unlocking request to a server side;
step S106, the server side authenticates according to the unlocking request to obtain an authentication result;
the server side can be a remote server or a cloud server. The unlocking request may be used to request authorization to unlock or close the lock.
And S108, determining the unlocking operation or the locking operation of the electronic key on the electronic lock control assembly equipment according to the authentication result.
The electronic lock control assembly equipment comprises an electronic lock and a corresponding communication module.
It should be noted that, in the implementation manner from step S102 to step S108, online real-time authorization and authentication may be implemented, where whether to unlock or lock depends on the authentication result, that is, according to the authentication result, the electronic key may be authorized to unlock or lock the electronic lock control assembly device, or the electronic key may not be authorized to unlock or lock the electronic lock control assembly device.
Through the steps, the communication networking of the electronic key and the electronic lock control assembly equipment can be established; the electronic key sends an unlocking request based on the communication network, and the electronic lock control assembly equipment forwards the unlocking request to the server side; the server side authenticates according to the unlocking request to obtain an authentication result; according to the authentication result, the unlocking operation or locking operation mode of the electronic key on the electronic lock control assembly equipment is determined, the unlocking request sent by the electronic key is authenticated at the server side by establishing a communication network of the electronic key and the electronic lock control assembly equipment, so that the unlocking operation or locking operation corresponding to the electronic key is determined, the purpose of real-time online authorization is achieved, the technical effect of improving the safety and reliability of the electronic key on-off locking operation is achieved, and the technical problem of low safety caused by the fact that offline electronic key authorization is adopted in the related technology and authorization information cannot be effectively detected is solved.
It should be noted that, as an optional embodiment, the method can be applied to supervision of an oil transportation process of an oil point, for example, the electronic lock control assembly equipment can be arranged at key positions of an oil well, an oil pulling vehicle, an oil tank, an oil suction port and the like, intelligent supervision of the whole oil transportation process can be realized, human factors are reduced, and the stealing phenomenon is reduced from the source, so that the method is very suitable for oil field areas which are wide in area, scattered in oil well distribution, inconvenient in laying of oil pipelines or high in crude oil transportation cost. The method can reduce or avoid the theft of crude oil, reduce the loss of crude oil as much as possible, and realize the effects of high safety, strong universality, high reliability and low cost.
Optionally, establishing a communication network between the electronic key and the electronic lock control assembly device includes: receiving a trigger instruction of a switch of the electronic key; determining the working state of the electronic key according to the trigger instruction; and generating a communication networking based on the working state.
Before receiving a trigger instruction of a switch of the electronic key, whether a trigger signal exists needs to be detected, wherein the trigger signal is realized by detecting the operation of an input device of the electronic key, and in the specific implementation process, the trigger signal can be realized by touching and pressing the switch of the electronic key. In addition, a switch of the electronic key may be triggered by biometric information recognition, such as fingerprint recognition, iris recognition, voice recognition, and the like.
The working states of the electronic key comprise power-on and power-off. When the working state of the electronic key is starting, the electronic key is in a power-on state; when the working state of the electronic key is shutdown, the electronic key is in a non-power-on state.
Further, when the working state of the electronic key is the starting state, the electronic key is in the power-on state, and communication networking between the electronic key and the electronic lock control assembly equipment is established.
It should be noted that, in the specific implementation, no limitation is made on the number of the electronic keys in the communication network and the number of the electronic lock control assembly devices.
In the specific implementation process, the power-on state of the electronic key can be controlled according to needs, and the consumption of the stored electric quantity of the electronic key due to the fact that the electronic key is in the power-on state for a long time is avoided.
Optionally, determining the operating state of the electronic key according to the trigger instruction includes: detecting whether the duration of the trigger instruction is greater than or equal to a predetermined time threshold; when the duration time is greater than or equal to the preset time threshold value, the electronic key is started; and when the duration is less than the preset time threshold, the electronic key is powered off.
As an alternative embodiment, the predetermined time threshold may be set according to the requirements of the application scenario. For example, the predetermined time threshold is 2 seconds, and it is necessary to detect whether the duration of the trigger instruction is greater than or equal to 2 seconds; if the duration is greater than or equal to 2 seconds, starting the electronic key; in the case where the duration is less than 2 seconds, the electronic key is turned off.
Further, after the electronic key is turned on, the method further comprises the following steps: determining the duration and the duration threshold value of the electronic key starting; when the duration is equal to the duration threshold, the electronic key is powered off. For example, after the electronic key is turned on, the electronic key may be automatically turned off by counting down.
By means of the mode, the defects that the electronic key is in a power-on state for a long time, power consumption is large, frequent charging is needed, use experience is affected and the like can be avoided. And after the electronic key works, when the starting time of the electronic key reaches a preset value, the electronic key can be shut down.
Optionally, after the electronic key sends the unlocking request based on the communication network and the electronic lock control assembly device forwards the unlocking request to the server, the method further includes: judging whether the unlocking request is distributed or not to obtain a judgment result; and determining a processing mode corresponding to the unlocking request according to the judgment result.
After receiving the unlocking request, the method can further judge whether the unlocking request is distributed, and select different processing modes according to different judging results.
It should be noted that the processing manner includes at least two modes, where the first mode may be a factory mode, and the second mode may be a normal operating mode.
Optionally, after determining that the processing manner is the first mode, the method further includes: acquiring key information of an electronic key and lock information of electronic lock control assembly equipment; determining distribution information of the electronic key according to the key information and the lock information; and storing the distribution information to the electronic key and/or the server side.
For more flexible implementation of remote authorization of the electronic key, the distribution information of the electronic key may be configured and stored in the above manner. Wherein determining the distribution information of the electronic key according to the key information and the lock information comprises: establishing a mapping relation between key information and lock information; and generating distribution information according to the mapping relation. In addition, the distribution information may be stored in the electronic key and the server, and the storage location is not limited in the specific implementation process.
Optionally, after determining that the processing manner is the second mode, the method further includes: obtaining a cached log record, wherein the log record is used for storing records of unlocking operation or locking operation; judging whether the log record meets a preset condition or not to obtain a judgment result; and processing the log record according to the judgment result.
As an alternative embodiment, the determining whether the log record meets the predetermined condition includes: detecting whether the log record is in the routing coverage; if the log record is in the route coverage, processing the log record; the processing of the log record according to the judgment result comprises: and judging whether logs and/or operations exist or not, and uploading the logs and/or the operations according to the preset time frequency under the condition that the judgment result is yes. Optionally, the preset time frequency includes, but is not limited to, 2 seconds/time.
By the method, effective log records can be uploaded in time, and subsequent unlocking or locking efficiency is improved.
Optionally, the server performs authentication according to the unlocking request, and obtaining an authentication result includes: determining key information and/or lock information corresponding to the unlocking request; when the key information and/or the lock information are matched with prestored distribution information, a first instruction is sent, and the first instruction is an instruction for allowing unlocking or locking; and when the key information and/or the lock information are not matched with the distribution information, sending a second instruction, wherein the second instruction is an instruction which does not allow unlocking or locking.
The distribution information is present in a mapping relationship list of the key information and lock information pair, wherein the correspondence relationship between the key information and the lock information in the mapping relationship list may be in any form of one-to-one, one-to-many, and many-to-one. The distribution information is used for expressing a mapping relationship between the key information and the lock information, and can be used for obtaining which electronic keys can open locks corresponding to which electronic lock control assembly equipment according to the mapping relationship.
In a specific implementation process, the unlocking request can contain at least one of key information and lock information, and the prestored distribution information comprises the key information and the lock information, so that the key information and/or the lock information corresponding to the unlocking request can be matched with the prestored distribution information, whether unlocking related operation can be performed or not is determined according to a matching result, and the operation is sent out in a command form. If the command is an instruction for allowing unlocking or locking, the electronic lock can be unlocked or locked; if the command is that unlocking or locking is not allowed, the electronic lock cannot be unlocked or locked.
Optionally, determining, according to the authentication result, an unlocking operation or a locking operation of the electronic lock control assembly device by the electronic key includes: and rotating the electronic key to carry out unlocking operation or locking operation on the electronic lock control assembly equipment.
The authentication result comprises authentication success and authentication failure, wherein after the authentication success, the electronic key can be rotated to carry out unlocking operation or locking operation on the electronic lock control assembly equipment, and after the authentication failure, the electronic key cannot be rotated to carry out unlocking operation or locking operation on the electronic lock control assembly equipment.
Optionally, determining, according to the authentication result, an unlocking operation or a locking operation of the electronic lock control assembly device by the electronic key further includes: detecting the on-off state of the electronic lock control assembly equipment; and sending the switch state to a server side, and receiving the switch state and recording the switch state by the server side.
As an alternative embodiment, when detecting the switch state of the electronic lock control assembly device, various manners may be adopted. For example, the on-off state of the electronic lock control assembly device may be detected according to a preset rule, where the preset rule includes, but is not limited to, a preset time period, a priority of the electronic lock control assembly device, and the like, and of course, the preset rule may be in a system default form, or may be set according to an actual requirement. In a specific implementation process, the switch state of the electronic lock control assembly equipment can be detected once every 2 seconds or 30 seconds. Therefore, the on-off state of the electronic lock control assembly equipment can be acquired in time.
Furthermore, the on-off state can be sent to the server side, the server side receives the on-off state and records the on-off state, and relevant records of the on-off state of the electronic lock control assembly equipment can be backed up and stored in the mode, so that the follow-up searching and using are facilitated.
An alternative embodiment of the present application is described in detail below.
The electronic key is connected and networked with external intelligent electronic lock control assembly equipment in an appointed place through a zigbee communication module in the electronic key, an authentication request is initiated by the electronic key end, the authentication request is forwarded to a background through the external intelligent electronic lock control assembly equipment, the background compares authentication information, an authentication result is returned, and the authorized electronic key can complete unlocking. And the data is reported to the background while unlocking, so that information such as unlocking equipment, unlocking time and the like is recorded while unlocking is achieved.
The electronic key adopts the zigbee ultra-low power consumption communication module, the working power consumption of the electronic key is in the Milliwatt (MW) level, and the power consumption is effectively reduced. And the electronic key is additionally provided with a switch button, the electronic key works only after the button is pressed down, and the electronic key is automatically turned off after the countdown is received, so that the power consumption is further reduced.
Fig. 2 is a flowchart of an authorization method of an electronic key according to an alternative embodiment of the present invention, and as shown in fig. 2, the unlocking process includes: requesting unlocking- > acquiring lock state- > unlocking- > storing unlocking state- > sending unlocking state.
The specific implementation process is as follows:
1) authentication for explosion-proof passive intelligent electronic lock and intelligent electronic lock control assembly equipment
Through the distribution of the electronic key, the list of currently allowed unlocking and under which intelligent electronic lock control assembly devices are allowed to unlock can be obtained, and fig. 3 is a flow chart of distributing the key in the authorization method of the electronic key according to an alternative embodiment of the invention, as shown in fig. 3.
It should be noted that, when the key is distributed, it is specified which specific locks can be opened in which intelligent electronic lock control assembly devices.
2) Unlocking and locking
Through the switch lock to the electronic key, after the electronic key received intelligent electronic lock system assembly equipment signal, the user opened and closed the operation to explosion-proof passive intelligent electronic lock through the direction of rotating the electronic key.
3) Reporting lock status
Fig. 4 is a flowchart of reporting a lock status in an authorization method of an electronic key according to an alternative embodiment of the present invention, as shown in fig. 4.
The method for remotely authorizing the electronic key is applied to corresponding software files, and finally, a binary file is generated and burnt in the electronic key and used for authenticating the explosion-proof passive intelligent electronic lock, unlocking and reporting an unlocking log to the intelligent electronic lock control assembly equipment. The software is developed on a single chip microcomputer with a ZigBee communication function, and when the system is connected with a battery, the system can automatically run the software. Fig. 5 is a logic flow diagram of the operation of a method of authorizing an electronic key according to an alternative embodiment of the present invention, as shown in fig. 5. The following functions may be implemented:
1) the key has the functions of being distributed, being configured, time synchronization, serial port upgrading and the like.
2) The lock ID is obtained by the key and the lock ID function is modified.
3) The method comprises the steps of judging the coverage of a located route, unlocking authorization, judging the switching authority of a current lock, reporting the unlocking operation result in real time, and storing and reporting an unlocking log.
Example 2
According to another aspect of the embodiments of the present invention, there is also provided a storage medium storing a program, wherein the program controls a processor to execute the method of authorizing an electronic key of any one of the above when the program is executed by the processor.
Example 3
According to another aspect of the embodiments of the present invention, there is also provided a computer device, including: a memory and a processor, the memory storing a computer program; a processor for executing a computer program stored in the memory, the computer program when executed causing the processor to perform the method of authorizing an electronic key of any of the above.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
In the above embodiments of the present invention, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed technology can be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units may be a logical division, and in actual implementation, there may be another division, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.

Claims (11)

1. An authorization method of an electronic key, comprising:
establishing a communication network of the electronic key and the electronic lock control assembly equipment;
the electronic key sends an unlocking request based on the communication network, and the electronic lock control assembly equipment forwards the unlocking request to a server side;
the server side authenticates according to the unlocking request to obtain an authentication result;
and determining the unlocking operation or the locking operation of the electronic key on the electronic lock control assembly equipment according to the authentication result.
2. The method of claim 1, wherein establishing a communication network between the electronic key and the electronic lock control assembly device comprises:
receiving a trigger instruction of a switch of the electronic key;
determining the working state of the electronic key according to the trigger instruction;
and generating the communication network based on the working state.
3. The method of claim 2, wherein determining the operational state of the electronic key based on the triggering command comprises:
detecting whether the duration of the trigger instruction is greater than or equal to a predetermined time threshold;
if the duration is greater than or equal to the preset time threshold, the electronic key is started;
and if the duration is less than the preset time threshold, the electronic key is powered off.
4. The method according to claim 1, wherein after the electronic key sends an unlocking request based on the communication network and the electronic lock control assembly device forwards the unlocking request to a server, the method further comprises:
judging whether the unlocking request is distributed or not to obtain a judgment result;
and determining a processing mode corresponding to the unlocking request according to the judgment result.
5. The method of claim 4, wherein after determining that the processing mode is the first mode, the method further comprises:
acquiring key information of the electronic key and lock information of the electronic lock control assembly equipment;
determining distribution information of the electronic key according to the key information and the lock information;
and storing the distribution information to the electronic key and/or the server side.
6. The method of claim 4, wherein after determining that the processing mode is the second mode, the method further comprises:
obtaining a cached log record, wherein the log record is used for storing records of unlocking operation or locking operation;
judging whether the log record meets a preset condition or not to obtain a judgment result;
and processing the log record according to the judgment result.
7. The method of claim 1, wherein the server performs authentication according to the unlocking request, and obtaining an authentication result comprises:
determining key information and/or lock information corresponding to the unlocking request;
when the key information and/or the lock information are matched with prestored distribution information, a first instruction is sent, and the first instruction is an instruction for allowing unlocking or locking;
and when the key information and/or the lock information are not matched with the distribution information, sending a second instruction, wherein the second instruction is an instruction which does not allow unlocking or locking.
8. The method according to claim 1, wherein determining, based on the authentication result, an unlocking operation or a locking operation of the electronic key to the electronic lock control assembly device comprises:
and rotating the electronic key to carry out unlocking operation or locking operation on the electronic lock control assembly equipment.
9. The method according to claim 1, wherein determining an unlocking operation or a locking operation of the electronic lock control assembly device by the electronic key based on the authentication result further comprises:
detecting the on-off state of the electronic lock control assembly equipment;
and sending the switch state to the server side, and receiving the switch state and recording the switch state by the server side.
10. A storage medium storing a program, wherein the program controls a processor to execute the method of authorizing an electronic key according to any one of claims 1 to 9 when the program is executed by the processor.
11. A computer device, comprising: a memory and a processor, wherein the processor is capable of,
the memory stores a computer program;
the processor is configured to execute a computer program stored in the memory, and the computer program causes the processor to execute the method for authorizing an electronic key according to any one of claims 1 to 9.
CN201911244004.3A 2019-12-06 2019-12-06 Authorization method of electronic key, storage medium and computer device Active CN113034734B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911244004.3A CN113034734B (en) 2019-12-06 2019-12-06 Authorization method of electronic key, storage medium and computer device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911244004.3A CN113034734B (en) 2019-12-06 2019-12-06 Authorization method of electronic key, storage medium and computer device

Publications (2)

Publication Number Publication Date
CN113034734A true CN113034734A (en) 2021-06-25
CN113034734B CN113034734B (en) 2023-02-10

Family

ID=76450760

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911244004.3A Active CN113034734B (en) 2019-12-06 2019-12-06 Authorization method of electronic key, storage medium and computer device

Country Status (1)

Country Link
CN (1) CN113034734B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114863593A (en) * 2022-04-29 2022-08-05 珠海优特电力科技股份有限公司 Control method and device for equipment operation authority, computer key and server

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1461995A (en) * 2002-05-31 2003-12-17 李存进 Method for rewriting key card for induction electronic door lock
JP2009002034A (en) * 2007-06-21 2009-01-08 Nec Fielding Ltd Electronic lock opening/closing system
CN101793115A (en) * 2009-12-20 2010-08-04 姜君凯 Electronic lock and key and workflow control
EP2348490A1 (en) * 2009-12-22 2011-07-27 9Solutions Oy Access control system
CN102654002A (en) * 2012-06-01 2012-09-05 杭州双华智能家居有限公司 Keyless entry intelligent lock capable of adding and deleting keys
CN106373228A (en) * 2016-08-29 2017-02-01 杭州巴玺电子科技有限公司 Intelligent safe passive lockset system and unlocking method thereof
CN107845167A (en) * 2017-10-11 2018-03-27 深圳市创维群欣安防科技股份有限公司 Daily record of work storage method, system and the intelligent electronic lock of a kind of intelligent electronic lock
CN108510635A (en) * 2018-07-04 2018-09-07 蒙建波 A kind of intelligent lock system and its method for unlocking based on light sensation identification
CN109493497A (en) * 2018-12-26 2019-03-19 无锡卓信信息科技股份有限公司 Electronics unlocking system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1461995A (en) * 2002-05-31 2003-12-17 李存进 Method for rewriting key card for induction electronic door lock
JP2009002034A (en) * 2007-06-21 2009-01-08 Nec Fielding Ltd Electronic lock opening/closing system
CN101793115A (en) * 2009-12-20 2010-08-04 姜君凯 Electronic lock and key and workflow control
EP2348490A1 (en) * 2009-12-22 2011-07-27 9Solutions Oy Access control system
CN102654002A (en) * 2012-06-01 2012-09-05 杭州双华智能家居有限公司 Keyless entry intelligent lock capable of adding and deleting keys
CN106373228A (en) * 2016-08-29 2017-02-01 杭州巴玺电子科技有限公司 Intelligent safe passive lockset system and unlocking method thereof
CN107845167A (en) * 2017-10-11 2018-03-27 深圳市创维群欣安防科技股份有限公司 Daily record of work storage method, system and the intelligent electronic lock of a kind of intelligent electronic lock
CN108510635A (en) * 2018-07-04 2018-09-07 蒙建波 A kind of intelligent lock system and its method for unlocking based on light sensation identification
CN109493497A (en) * 2018-12-26 2019-03-19 无锡卓信信息科技股份有限公司 Electronics unlocking system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114863593A (en) * 2022-04-29 2022-08-05 珠海优特电力科技股份有限公司 Control method and device for equipment operation authority, computer key and server
CN114863593B (en) * 2022-04-29 2023-01-31 珠海优特电力科技股份有限公司 Control method and device for operation authority of coal mine equipment, computer key and server

Also Published As

Publication number Publication date
CN113034734B (en) 2023-02-10

Similar Documents

Publication Publication Date Title
US11605275B2 (en) Gateway-based anti-theft security system and method
CN106373228B (en) A kind of passive lock system of intelligent and safe and its method for unlocking
US20160086400A1 (en) Wireless access control system including distance based lock assembly and remote access device enrollment and related methods
CN104123768B (en) A kind of safe and intelligent lock system and unlocking, shut control method
CN105336029A (en) IoT (Internet of Things) based intelligent lock system and method
CN106652106A (en) Door lock control method, device and terminal
CN204143429U (en) A kind of tele-control system of electronic lock
CN105303651A (en) Bluetooth based two-way communication automatic locking system and method
CN108460862A (en) The method and electric lockset, lock system having with palmprint authentication and Mobile phone control lock
CN105447936A (en) Offline intelligent lock monitoring system
CN106127906A (en) The unlocking method of a kind of door-control lock, Apparatus and system
CN106934903B (en) Bluetooth intelligent lock
CN107845167A (en) Daily record of work storage method, system and the intelligent electronic lock of a kind of intelligent electronic lock
CN109410379A (en) A kind of wireless method for unlocking, system
CN102606006B (en) Wireless cloud drawer lock and operating method thereof
CN108466598A (en) Vehicle safety starts method and device
CN103617660B (en) Wireless Lock-Picking Devices and method for unlocking
CN113034734B (en) Authorization method of electronic key, storage medium and computer device
CN111946163A (en) Method and system for remotely opening door by visual intelligent lock
AU2021328076B2 (en) Control circuitry for offline authentication in an aerosol-generating device
CN207123882U (en) A kind of antitheft cloud service door-locking system of multiple intelligent
CN109955934A (en) Electric vehicle identity authorization system and method
KR20190124377A (en) Method and system for smart key control for vehicle remote control
CN203773609U (en) Intelligent door lock management system
WO2016155242A1 (en) Main control board for electronic lock, and control circuit, system and method for electronic lock

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant