CN113240836A - Bluetooth lock connection method adopting two-dimensional code and related configuration system - Google Patents

Bluetooth lock connection method adopting two-dimensional code and related configuration system Download PDF

Info

Publication number
CN113240836A
CN113240836A CN202110544592.3A CN202110544592A CN113240836A CN 113240836 A CN113240836 A CN 113240836A CN 202110544592 A CN202110544592 A CN 202110544592A CN 113240836 A CN113240836 A CN 113240836A
Authority
CN
China
Prior art keywords
dimensional code
lock
information
bluetooth lock
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110544592.3A
Other languages
Chinese (zh)
Inventor
杨淼特
乔国坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xinjiang Aiwinn Information Technology Co Ltd
Original Assignee
Xinjiang Aiwinn Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xinjiang Aiwinn Information Technology Co Ltd filed Critical Xinjiang Aiwinn Information Technology Co Ltd
Priority to CN202110544592.3A priority Critical patent/CN113240836A/en
Publication of CN113240836A publication Critical patent/CN113240836A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Electromagnetism (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Selective Calling Equipment (AREA)

Abstract

The application discloses a Bluetooth lock connection method adopting two-dimension codes and a related configuration system, wherein a comprehensive control device receives information to be configured of a Bluetooth lock to be configured, generates a target two-dimension code according to the information to be configured, and issues the target two-dimension code to a handheld terminal of a user; the lock control device reads the target two-dimensional code provided by the handheld terminal, extracts the MAC address of the Bluetooth lock to be configured from the target two-dimensional code to connect the Bluetooth lock to be configured, and correspondingly configures and/or controls the connected Bluetooth lock to be configured, wherein the lock control device can still receive and execute management information such as information to be configured without depending on communication connection between the lock control device and the comprehensive control device, and the lock control device can effectively improve the flexibility in the corresponding Bluetooth lock configuration process under the condition that the comprehensive control device and/or the lock control device do not communicate with external devices.

Description

Bluetooth lock connection method adopting two-dimensional code and related configuration system
Technical Field
The application relates to the technical field of intelligent locks, in particular to a Bluetooth lock connection method adopting a two-dimensional code and a related configuration system.
Background
In recent years, the bluetooth lock is widely popularized with the advantages of convenient unlocking, easy management and the like. A management system for a bluetooth lock generally includes a lock device for managing a control lock and an integrated control device for managing the lock device. The lock control equipment needs to be in communication connection with the comprehensive control equipment through a network, so that the comprehensive control equipment can issue management information such as Bluetooth lock pairing information to the lock control equipment to realize management of the lock control equipment, the lock control equipment can realize control over Bluetooth under the management of the comprehensive control equipment, and the Bluetooth lock can accurately respond to instructions of unlocking and the like of a user. Under the condition that no network is used for communication connection between the lock control equipment and the comprehensive control equipment, the comprehensive control equipment cannot issue related management information to the lock control equipment, and at the moment, the lock control equipment is difficult to accurately pair the Bluetooth lock and the like, so that the traditional Bluetooth lock management scheme has limitation.
Disclosure of Invention
In view of this, the present application provides a bluetooth lock connection method and a related configuration system using two-dimensional codes, so that a lock control device does not need to rely on a network to receive management information issued by a comprehensive control device.
One aspect of the present application provides a bluetooth lock connection method using a two-dimensional code, including:
s100, the comprehensive control equipment receives information to be configured of a Bluetooth lock to be configured; the information to be configured at least comprises an MAC address of the Bluetooth lock to be configured;
s200, generating a target two-dimensional code by the comprehensive control equipment according to the information to be configured, and issuing the target two-dimensional code to a handheld terminal of a user;
s300, the lock control equipment reads the target two-dimensional code provided by the handheld terminal, extracts the MAC address of the Bluetooth lock to be configured from the target two-dimensional code, and identifies the Bluetooth lock to be configured according to the MAC address so as to connect the Bluetooth lock to be configured.
In one embodiment, the lock control device prestores a two-dimensional code key of the comprehensive control device;
the generating of the target two-dimensional code according to the information to be configured comprises: encrypting the information to be configured by adopting the two-dimension code key to obtain encrypted data, and generating a target two-dimension code according to the encrypted data;
the extracting the MAC address of the Bluetooth lock to be configured from the target two-dimensional code comprises the following steps: and decrypting the target two-dimensional code by adopting a prestored two-dimensional code key, and extracting the MAC address of the Bluetooth lock to be configured from a decryption result.
Specifically, the encrypting the information to be configured by using the two-dimensional code key includes:
and determining a zone bit, an encryption protocol name and a plurality of encryption parameters of encryption operation according to the information to be configured to obtain an encryption initial value, and performing encryption operation on the encryption initial value by adopting a symmetric encryption algorithm and the two-dimension code key.
Specifically, the performing of the encryption operation on the encrypted initial value by using the symmetric encryption algorithm and the two-dimensional code key includes:
and generating an initial value matrix according to the encrypted initial value, performing row-column transformation on a plurality of initial value matrices for a plurality of times, performing exclusive OR operation on matrix elements subjected to row-column transformation by adopting the two-dimensional code key, and determining the encrypted data according to the result of the exclusive OR operation.
Specifically, the performing, by using the two-dimensional code key, an exclusive or operation on the matrix elements subjected to the row-column transformation includes:
and generating a plurality of unit keys corresponding to the two-dimensional code key according to a preset key decomposition rule, and performing exclusive OR operation on each matrix element after the row-column transformation by respectively adopting one unit key.
Specifically, the decrypting the target two-dimensional code by using the pre-stored two-dimensional code key includes:
and acquiring the reverse operation process of encryption processing, and executing the reverse operation process on the target two-dimensional code by adopting the two-dimensional code key so as to decrypt the target two-dimensional code.
In one embodiment, the information to be configured further includes an unlocking instruction, an instruction verification condition and/or an information output condition; after the lock control device is connected with the bluetooth lock to be configured, the method further comprises the following steps:
after the lock control device reads an unlocking instruction from the information to be configured or receives an unlocking instruction input by a user in real time, judging whether the unlocking instruction meets an instruction verification condition, if so, executing unlocking operation, and if not, judging that unlocking fails;
and/or the lock control equipment acquires the current environmental condition of the detection area when controlling the Bluetooth lock to be configured to execute the unlocking operation, and outputs unlocking information according to the unlocking information output rule after the environmental condition meets the information output condition.
In one embodiment, the receiving, by the integrated control device, the configuration information of the bluetooth lock to be configured includes:
the integrated control equipment receives an identifier of a Bluetooth lock to be configured, and searches information to be configured corresponding to the identifier to be configured in a prestored identifier-configuration information relationship; the identifier to be configured is an identifier of the Bluetooth lock to be configured; and the identifier-configuration information relation records the configuration information corresponding to each identifier.
In one embodiment, after the integrated control device receives the configuration information of the bluetooth lock to be configured, the integrated control device further includes:
and the comprehensive control equipment reads a communication account of the handheld terminal so as to send the target two-dimensional code to the handheld terminal through the communication account after the target two-dimensional code is obtained.
Another aspect of the application provides a bluetooth lock configuration system using two-dimensional codes, which includes a comprehensive control device and a lock control device;
the comprehensive control equipment receives information to be configured of the Bluetooth lock to be configured; generating a target two-dimensional code according to the information to be configured, and issuing the target two-dimensional code to a handheld terminal of a user; the information to be configured comprises an MAC address of the Bluetooth lock to be configured;
the lock control equipment reads the target two-dimensional code provided by the handheld terminal, extracts the MAC address of the Bluetooth lock to be configured from the target two-dimensional code, and identifies the Bluetooth lock to be configured according to the MAC address so as to connect the Bluetooth lock to be configured.
The Bluetooth lock connection method adopting the two-dimension code and the related configuration system provided by the application have the advantages that the comprehensive control equipment receives the information to be configured of the Bluetooth lock to be configured, generating a target two-dimensional code according to the information to be configured, issuing the target two-dimensional code to a handheld terminal of a user, enabling the lock control equipment to read the target two-dimensional code provided by the handheld terminal, extracting the MAC address of the Bluetooth lock to be configured from the target two-dimensional code, identifying the Bluetooth lock to be configured according to the MAC address so as to connect the Bluetooth lock to be configured and correspondingly configure and/or control the connected Bluetooth lock to be configured, the lock control device can still receive and execute management information such as information to be configured under the condition that the integrated control device and/or the lock control device do not communicate with external equipment without depending on communication connection between the lock control device and the integrated control device, and flexibility in the corresponding Bluetooth lock configuration and application process is effectively improved. In addition, the comprehensive control equipment can also encrypt the information to be configured by adopting a two-dimension code key, so that the generated target two-dimension code is not easy to read and/or adopt by other equipment, and the connection process of the Bluetooth lock and the corresponding configuration process have higher safety.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flowchart of a bluetooth lock connection method using a two-dimensional code in an embodiment of the present application;
FIG. 2 is a schematic structural diagram of a Bluetooth lock configuration system using two-dimensional codes according to an embodiment of the present application
Fig. 3 is a schematic structural diagram of a bluetooth lock connection system using a two-dimensional code in an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application are clearly and completely described below with reference to the accompanying drawings, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application. The following embodiments and their technical features may be combined with each other without conflict.
In a first aspect of the present application, a bluetooth lock connection method using a two-dimensional code is provided, and as shown in fig. 1, the bluetooth lock connection method using a two-dimensional code includes:
s100, the comprehensive control equipment receives information to be configured of a Bluetooth lock to be configured; the information to be configured at least includes a Media Access Control Address (MAC) Address of the bluetooth lock to be configured.
The relationship among the integrated control device, the lock control device and the bluetooth lock can be shown in fig. 2, the integrated control device can manage and control one or more lock control devices at the same time, the lock control device and the bluetooth lock are controlled in a one-to-one manner, that is, one lock control device controls one bluetooth lock within a period of time, each lock control device can obtain an MAC address issued by the integrated control device, and bind the bluetooth lock corresponding to the MAC address to realize the control of the bluetooth lock. In general, when a bluetooth lock is installed or a related configuration system is updated, a corresponding bluetooth lock is connected to a lock control device in time to configure and/or control the connected bluetooth lock. The to-be-configured Bluetooth lock is the Bluetooth lock which needs to be configured in the configuration process, and the to-be-configured information is the configuration information of the to-be-configured Bluetooth lock.
The information to be configured may be set according to information such as a specific bluetooth lock, a corresponding lock control device, and daily requirements of a user on the bluetooth lock, and generally includes at least an MAC address of the bluetooth lock to be configured, so that a subsequent lock control device can connect a corresponding bluetooth lock (the bluetooth lock to be configured) according to the MAC address; in addition, if the user has other application requirements for the to-be-configured bluetooth lock, for example, what form of unlocking information needs to be output, and/or an unlocking prompt is given at several points every day, and the like, the user can input the application requirements into the comprehensive control device at this time, so that the comprehensive control device generates the to-be-configured information according to the MAC address of the to-be-configured bluetooth lock and the other requirement information input by the user, and the integrity of the generated to-be-configured information is ensured.
S200, generating a target two-dimensional code by the comprehensive control equipment according to the information to be configured, and issuing the target two-dimensional code to a handheld terminal of a user; the target two-dimensional code is a two-dimensional code carrying information to be configured, namely a two-dimensional code used for configuring a Bluetooth lock to be configured.
After the target two-dimensional code is generated in the steps, the target two-dimensional code can be issued to the handheld terminal of the user by selecting a corresponding lower mode according to the local communication condition of the integrated control equipment. If the integrated control device can communicate with an external communication terminal, after the integrated control device receives the configuration information of the bluetooth lock to be configured, the method further includes: and the comprehensive control equipment reads the communication account of the handheld terminal so as to send the target two-dimensional code to the handheld terminal through the communication account after the target two-dimensional code is obtained. The communication account may be an account (e.g., a mobile phone number) of a communication card carried by the handheld terminal, or an account (e.g., a micro signal or a QQ number) of software installed in the handheld terminal. If the comprehensive control equipment cannot communicate with an external communication terminal at present, and after the target two-dimensional code is generated, the target two-dimensional code can be displayed, so that the handheld terminal can shoot the target two-dimensional code displayed by the comprehensive control equipment, and the acquisition of the target two-dimensional code by the handheld terminal is realized.
S300, the lock control equipment reads the target two-dimensional code provided by the handheld terminal, extracts the MAC address of the Bluetooth lock to be configured from the target two-dimensional code, and identifies the Bluetooth lock to be configured according to the MAC address so as to connect the Bluetooth lock to be configured.
The lock control device identifies the bluetooth lock to be configured according to the MAC address, and the process of connecting the bluetooth lock to be configured may include: the lock control equipment searches a local current accessible Bluetooth equipment list, selects Bluetooth equipment corresponding to the MAC address of the Bluetooth lock to be configured, namely the Bluetooth lock to be configured, from the Bluetooth equipment list, and sends connection request information to the Bluetooth lock to be configured; after receiving the connection request information fed back by the lock control equipment, the Bluetooth lock to be configured feeds back connection confirmation information to the lock control equipment; and after receiving the connection confirmation information, the lock control equipment establishes a communication link with the Bluetooth lock to be configured.
The lock control equipment can be provided with a two-dimensional code scanning module, and the two-dimensional code scanning module comprises a two-dimensional code scanning area so as to scan a two-dimensional code provided by external equipment. Specifically, after the external device places the displayed two-dimensional code in the two-dimensional code scanning area, the lock control device can read the two-dimensional code.
In the above steps, after receiving the target two-dimensional code, the handheld terminal may place the displayed target two-dimensional code in the two-dimensional code scanning area of the lock control device, so that the lock control device reads the target two-dimensional code provided by the handheld terminal, and extracts the MAC address of the bluetooth lock to be configured from the target two-dimensional code to connect the bluetooth lock to be configured corresponding to the MAC address. Therefore, the connection process of the lock control equipment and the corresponding Bluetooth lock does not need to depend on the communication connection between the lock control equipment and the comprehensive control equipment, and the lock control equipment can still receive and execute management information such as information to be configured under the condition that the comprehensive control equipment and/or the lock control equipment do not communicate with external equipment, so that the flexibility in the configuration and application process of the corresponding Bluetooth lock is effectively improved.
Furthermore, after the lock control device is connected with the Bluetooth lock to be configured, other configuration information carried by the target two-dimensional code can be read, and the Bluetooth lock to be configured can be configured according to the configuration information. In some examples, if the information to be configured further includes unlocking information output rules; after the lock control device is connected with the Bluetooth lock to be configured, the following operations can be executed: and the lock control equipment reads the unlocking information output rule in the target two-dimensional code so as to output the unlocking information according to the unlocking information output rule when controlling the to-be-configured Bluetooth lock to execute the unlocking operation, so that the unlocking information output mode is matched with the requirements and/or preferences of a user. The unlocking information output rule may include an output form (e.g., image output and/or audio output, etc.), attribute parameters corresponding to each output form (e.g., brightness corresponding to an image and/or loudness corresponding to an audio, etc.); for example, some bluetooth locks have unlocking information output rules including: displaying an image within a certain brightness range; other bluetooth lock unlock information output rules include: audio playback within a certain volume range; some unlocking information output rules of bluetooth locks include: displaying images and playing audio; and so on. Further, the unlocking information output by the lock control device may include multiple types of unlocking information, such as unlocking success information and unlocking failure information, and one type of unlocking information may be set with one output rule correspondingly, for example, the output rule corresponding to the unlocking success information includes: playing audio with a first volume; the output rule corresponding to the unlocking failure information comprises the following steps: and displaying the image at the first two points and playing the audio at the first volume. The unlocking success information can also comprise at least one of a plurality of pieces of sub information such as the unlocking time information and the unlocking instruction source (such as a real-time instruction or a background management end instruction). The unlocking failure information may also include at least one of a plurality of sub information such as the unlocking time, the unlocking instruction source (e.g., a real-time instruction or a background management end instruction), the failure reason, and the like. At the moment, after the lock control device reads an unlocking instruction from the information to be configured or receives an unlocking instruction input by a user in real time, the lock control device identifies the unlocking instruction, if the unlocking instruction passes the identification, unlocking is executed, and the output unlocking success information or the corresponding sub information is output according to the output rule corresponding to the unlocking success information; if the unlocking instruction identification is not passed, the unlocking failure is judged, and the unlocking failure information or the corresponding sub information is output according to the output rule corresponding to the unlocking failure information.
In some examples, the information to be configured may further include other information such as instruction verification conditions and/or information output conditions; at this moment, the lock control device can also execute the following process when being connected with the Bluetooth lock to be configured: after the lock control device reads an unlocking instruction from the information to be configured or receives an unlocking instruction input by a user in real time, judging whether the unlocking instruction meets an instruction verification condition, if so, executing unlocking operation, and if not, judging that unlocking fails; and/or the lock control equipment acquires the current environmental condition of the detection area when controlling the Bluetooth lock to be configured to execute the unlocking operation, and outputs unlocking information according to the unlocking information output rule after the environmental condition meets the information output condition.
The instruction verification condition may include at least one of a permitted unlocking time period of the bluetooth lock to be configured and/or a condition of limiting unlocking items (such as limiting certain users or prohibiting unlocking for a certain time period). Specifically, if the instruction verification condition includes an allowed unlocking time period of the bluetooth lock to be configured, after the lock control device acquires the unlocking instruction, whether the current time is in the allowed unlocking time period or not can be judged, if yes, the unlocking operation is executed, and if not, the unlocking failure is judged; if the instruction verification condition includes the unlocking limitation items of the Bluetooth lock to be configured, after the lock control device acquires the unlocking instruction, whether each currently detected implementation includes at least one of the unlocking limitation items can be judged, if not, the unlocking operation is executed, and if not, the unlocking failure is judged.
The information output condition may depend on an application scenario and/or a related user feature device to be configured with the bluetooth lock, and may include: the number of people in the detection area is not more than n (positive integer such as 3 or 4), the volume of the detection area is not more than a certain volume threshold, and/or a certain face image is detected, etc. If the door where the bluetooth lock installed in the lock control device is located, the detection area can be a moving area inside and/or outside the door, when the bluetooth lock to be configured is controlled to execute unlocking operation, the current number of people, volume and/or detection parameters such as the appeared human face images of the detection area are obtained, and unlocking information is output after the detection parameters are detected to accord with corresponding information output conditions, so that the safety of an unlocking information output environment is ensured.
In other examples, if the information to be configured further includes an unlock time; after the lock control device is connected with the Bluetooth lock to be configured, the following operations can be executed: reading the unlocking time in the target two-dimensional code, controlling the unlocking time to execute the unlocking operation of the Bluetooth lock to be configured so as to respond to the unlocking requirement of the user at the unlocking time, and effectively improving the unlocking experience of the user. The unlocking time can be set according to the specific requirements of the user, such as 6 am every day, 3 pm every monday, and/or 10 pm every month No. 3, and so on. Further, the integrated control device can set the unlocking time according to user characteristics such as the type of the Bluetooth lock, the age of the user and/or the sex of the user. For example, if there are multiple types of bluetooth locks, each type of bluetooth lock provides personalized access control service for one type of user, a background management end of a certain type of bluetooth lock can preset the unlocking time of the bluetooth lock for users of all ages, and when the user age input by a user is read, the corresponding unlocking time can be read according to the user age, the unlocking time is written into configuration information, and information to be configured of the bluetooth lock in the binding process is generated.
In one embodiment, the lock control device prestores a two-dimensional code key of the comprehensive control device; the generating of the target two-dimensional code according to the information to be configured comprises: encrypting the information to be configured by adopting the two-dimension code key to obtain encrypted data, and generating a target two-dimension code according to the encrypted data;
the extracting the MAC address of the Bluetooth lock to be configured from the target two-dimensional code comprises the following steps: and decrypting the target two-dimensional code by adopting a prestored two-dimensional code key, and extracting the MAC address of the Bluetooth lock to be configured from a decryption result.
In this embodiment, the integrated control device may pre-store the corresponding relationship between the lock control device and the bluetooth lock, record each group of the lock control device and the bluetooth lock, set a corresponding two-dimensional code key for each group of the lock control device and the bluetooth lock, and pre-store the two-dimensional code key to the corresponding lock control device. After the comprehensive control equipment sets the two-dimensional code key corresponding to each group of locking control equipment and the Bluetooth lock, the two-dimensional code key can be sent to a management terminal of a related manager, so that the manager can receive the two-dimensional code key in time through the management terminal. The manager can pre-store the two-dimension code key to the lock control device by manually inputting the two-dimension code key or uploading the two-dimension code key through the management terminal.
Specifically, a group of lock control devices corresponds to the bluetooth lock of the group, and the two-dimensional code keys set by the integrated control device for each group of lock control devices and the bluetooth lock are different from each other, that is, the two-dimensional code keys pre-stored by each lock control device are different from each other, so as to ensure the orderliness and the security of the subsequent decryption process. Specifically, after receiving information to be configured of a bluetooth lock to be configured, the integrated control device may obtain a two-dimensional code key corresponding to the bluetooth lock to be configured, encrypt the information to be configured by using the two-dimensional code key to obtain encrypted data, and generate a target two-dimensional code according to the encrypted data. Furthermore, the comprehensive control device can set an encryption rule in advance according to the characteristics of the information to be configured and the configuration characteristics of the lock control device, and then sets a corresponding two-dimensional code key for each group of the lock control devices and the Bluetooth lock. The encryption rules are set according to encryption algorithms with high stability and good security, such as symmetric encryption algorithms suitable for internal systems and the like.
In one example, the encrypting the information to be configured by using the two-dimensional code key includes: and determining a zone bit, an encryption protocol name and a plurality of encryption parameters of encryption operation according to the information to be configured to obtain an encryption initial value, and performing encryption operation on the encryption initial value by adopting a symmetric encryption algorithm such as an AES-128ECB algorithm and the two-dimensional code key.
Specifically, the performing of the encryption operation on the encrypted initial value by using the symmetric encryption algorithm and the two-dimensional code key includes: and generating an initial value matrix according to the encrypted initial value, performing row-column transformation on a plurality of initial value matrices for a plurality of times, performing exclusive OR operation on matrix elements subjected to row-column transformation by adopting the two-dimensional code key, and determining the encrypted data according to the result of the exclusive OR operation.
Wherein the performing the exclusive or operation on the matrix elements after the row-column transformation by using the two-dimensional code key comprises: and generating a plurality of unit keys corresponding to the two-dimensional code key according to a preset key decomposition rule, and performing exclusive OR operation on each matrix element after the row-column transformation by respectively adopting one unit key.
Correspondingly, the decrypting the target two-dimensional code by using the pre-stored two-dimensional code key comprises the following steps: and acquiring the reverse operation process of encryption processing, and executing the reverse operation process on the target two-dimensional code by adopting the two-dimensional code key so as to decrypt the target two-dimensional code.
The example adopts the symmetric encryption algorithm to encrypt the information to be configured, is suitable for encrypting the information to be configured corresponding to a plurality of groups of lock control devices and Bluetooth locks respectively at the same time, and has the advantages of high processing speed and high safety performance.
In one embodiment, the receiving, by the integrated control device, the configuration information of the bluetooth lock to be configured includes: the integrated control equipment receives an identifier of a Bluetooth lock to be configured, and searches information to be configured corresponding to the identifier to be configured in a prestored identifier-configuration information relationship; the identifier to be configured is an identifier of the Bluetooth lock to be configured; and the identifier-configuration information relation records the configuration information corresponding to each identifier.
The identifier is a serial number which uniquely represents the identity information of the corresponding Bluetooth lock, such as a serial number. In this embodiment, when a large number of lock control devices and corresponding bluetooth locks need to be configured, identifiers and configuration information of each bluetooth lock that needs to be configured may be collected, and the identifiers, the configuration information, and a corresponding relationship between the identifiers and the configuration information are uploaded to the integrated control device, so that the integrated control device prestores the identifier-configuration information, so that after receiving an identifier to be configured of a bluetooth lock to be configured, the information to be configured corresponding to the identifier to be configured may be efficiently obtained, the obtaining efficiency of the information to be configured is improved, the process of inputting the information to be configured by a user may also be simplified, and the corresponding configuration efficiency is further improved.
Further, in this embodiment, lock control devices corresponding to each identifier-configuration information may be further configured, and two-dimensional code keys of each lock control device are respectively set, so that after the information to be configured is obtained, the information to be configured can be accurately encrypted by using the corresponding two-dimensional code key.
In the above method for connecting a bluetooth lock using two-dimensional codes, the integrated control device receives the information to be configured of the bluetooth lock to be configured, generating a target two-dimensional code according to the information to be configured, issuing the target two-dimensional code to a handheld terminal of a user, enabling the lock control equipment to read the target two-dimensional code provided by the handheld terminal, extracting the MAC address of the Bluetooth lock to be configured from the target two-dimensional code, identifying the Bluetooth lock to be configured according to the MAC address so as to connect the Bluetooth lock to be configured and correspondingly configure and/or control the connected Bluetooth lock to be configured, the lock control device can still receive and execute management information such as information to be configured without relying on communication connection between the lock control device and the comprehensive control device, and under the condition that the comprehensive control device and/or the lock control device do not communicate with external devices, the lock control device can effectively improve the flexibility of the corresponding Bluetooth lock in the application process. In addition, the comprehensive control equipment can also encrypt the information to be configured by adopting a two-dimension code key, so that the generated target two-dimension code is not easy to read and/or adopt by other equipment, and the connection process of the Bluetooth lock and the corresponding configuration process have higher safety.
In a second aspect, the present application provides a bluetooth lock connection system using two-dimensional codes, as shown in fig. 3, the bluetooth lock connection system using two-dimensional codes includes a receiving module 100 and a generating module 200 which are disposed on a comprehensive control device, and a reading module 300 which is disposed on a lock control device;
the receiving module 100 is configured to receive information to be configured of a bluetooth lock to be configured; the information to be configured at least comprises an MAC address of the Bluetooth lock to be configured;
the generating module 200 is configured to generate a target two-dimensional code according to the information to be configured, and issue the target two-dimensional code to a handheld terminal of a user;
the reading module 300 reads a target two-dimensional code provided by the handheld terminal, extracts an MAC address of the bluetooth lock to be configured from the target two-dimensional code, and identifies the bluetooth lock to be configured according to the MAC address to connect the bluetooth lock to be configured.
For specific limitation of the bluetooth lock connection system using the two-dimensional code, reference may be made to the above limitation on the bluetooth lock connection method using the two-dimensional code, and details are not described herein again. All modules in the Bluetooth lock connection system adopting the two-dimensional code can be completely or partially realized through software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
The division of each module in the bluetooth lock connection system using the two-dimensional code is only used for illustration, and in other embodiments, the bluetooth lock connection system using the two-dimensional code may be divided into different modules as needed to complete all or part of the functions of the bluetooth lock connection system using the two-dimensional code.
The application provides a bluetooth lock configuration system adopting two-dimensional codes in a third aspect, which comprises a comprehensive control device and a lock control device;
the comprehensive control equipment receives information to be configured of the Bluetooth lock to be configured; generating a target two-dimensional code according to the information to be configured, and issuing the target two-dimensional code to a handheld terminal of a user; the information to be configured comprises an MAC address of the Bluetooth lock to be configured;
the lock control equipment reads the target two-dimensional code provided by the handheld terminal, extracts the MAC address of the Bluetooth lock to be configured from the target two-dimensional code, and identifies the Bluetooth lock to be configured according to the MAC address so as to connect the Bluetooth lock to be configured.
In one embodiment, the lock control device prestores a two-dimensional code key of the comprehensive control device; the process that the comprehensive control equipment generates the target two-dimensional code according to the information to be configured comprises the following steps: encrypting the information to be configured by adopting the two-dimension code key to obtain encrypted data, and generating a target two-dimension code according to the encrypted data;
the process that the lock control equipment reads the MAC address of the Bluetooth lock to be configured from the target two-dimensional code comprises the following steps: and decrypting the target two-dimensional code by adopting a prestored two-dimensional code key, and extracting the MAC address of the Bluetooth lock to be configured from a decryption result.
Specifically, the encrypting the information to be configured by using the two-dimensional code key includes: and determining a zone bit, an encryption protocol name and a plurality of encryption parameters of encryption operation according to the information to be configured to obtain an encryption initial value, and performing encryption operation on the encryption initial value by adopting a symmetric encryption algorithm and the two-dimension code key. Wherein the symmetric encryption algorithm comprises an AES-128ECB algorithm.
Wherein the executing of the encryption operation on the encrypted initial value by adopting the symmetric encryption algorithm and the two-dimension code key comprises the following steps: and generating an initial value matrix according to the encrypted initial value, performing row-column transformation on a plurality of initial value matrices for a plurality of times, performing exclusive OR operation on matrix elements subjected to row-column transformation by adopting the two-dimensional code key, and determining the encrypted data according to the result of the exclusive OR operation.
Wherein the performing the exclusive or operation on the matrix elements after the row-column transformation by using the two-dimensional code key comprises: and generating a plurality of unit keys corresponding to the two-dimensional code key according to a preset key decomposition rule, and performing exclusive OR operation on each matrix element after the row-column transformation by respectively adopting one unit key.
Further, the decryption processing of the target two-dimensional code by the lock control device by using the pre-stored two-dimensional code key comprises the following steps: and acquiring the reverse operation process of encryption processing, and executing the reverse operation process on the target two-dimensional code by adopting the two-dimensional code key so as to decrypt the target two-dimensional code.
In one embodiment, the integrated control device receives an identifier of a bluetooth lock to be configured, and searches for information to be configured corresponding to the identifier to be configured in a pre-stored identifier-configuration information relationship; the identifier to be configured is an identifier of the Bluetooth lock to be configured; and the identifier-configuration information relation records the configuration information corresponding to each identifier.
In one embodiment, the comprehensive control device reads a communication account of the handheld terminal, so that after the target two-dimensional code is obtained, the target two-dimensional code is sent to the handheld terminal through the communication account.
For the specific description of the bluetooth lock configuration system using the two-dimensional code provided in each embodiment, reference may be made to the corresponding description of the bluetooth lock connection method using the two-dimensional code in each embodiment, and the bluetooth lock configuration system using the two-dimensional code provided in this embodiment has all the beneficial effects of the bluetooth lock connection method using the two-dimensional code, which are not described herein again.
Although the application has been shown and described with respect to one or more implementations, equivalent alterations and modifications will occur to others skilled in the art based upon a reading and understanding of this specification and the annexed drawings. This application is intended to embrace all such modifications and variations and is limited only by the scope of the appended claims. In particular regard to the various functions performed by the above described components, the terms used to describe such components are intended to correspond, unless otherwise indicated, to any component which performs the specified function of the described component (e.g., that is functionally equivalent), even though not structurally equivalent to the disclosed structure which performs the function in the herein illustrated exemplary implementations of the specification.
That is, the above description is only an embodiment of the present application, and not intended to limit the scope of the present application, and all equivalent structures or equivalent flow transformations made by using the contents of the specification and the drawings, such as mutual combination of technical features between various embodiments, or direct or indirect application to other related technical fields, are included in the scope of the present application.
In addition, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more features. In the description of the present application, "a plurality" means two or more unless specifically limited otherwise.
The previous description is provided to enable any person skilled in the art to make and use the present application. In the foregoing description, various details have been set forth for the purpose of explanation. It will be apparent to one of ordinary skill in the art that the present application may be practiced without these specific details. In other instances, well-known processes have not been described in detail so as not to obscure the description of the present application with unnecessary detail. Thus, the present application is not intended to be limited to the embodiments shown, but is to be accorded the widest scope consistent with the principles and features disclosed herein.

Claims (10)

1. A Bluetooth lock connection method adopting a two-dimensional code is characterized by comprising the following steps:
s100, the comprehensive control equipment receives information to be configured of a Bluetooth lock to be configured; the information to be configured at least comprises an MAC address of the Bluetooth lock to be configured;
s200, generating a target two-dimensional code by the comprehensive control equipment according to the information to be configured, and issuing the target two-dimensional code to a handheld terminal of a user;
s300, the lock control equipment reads the target two-dimensional code provided by the handheld terminal, extracts the MAC address of the Bluetooth lock to be configured from the target two-dimensional code, and identifies the Bluetooth lock to be configured according to the MAC address so as to connect the Bluetooth lock to be configured.
2. The method for connecting the Bluetooth lock by using the two-dimensional code according to claim 1, wherein the lock control device prestores a two-dimensional code key of the comprehensive control device;
the generating of the target two-dimensional code according to the information to be configured comprises: encrypting the information to be configured by adopting the two-dimension code key to obtain encrypted data, and generating a target two-dimension code according to the encrypted data;
the extracting the MAC address of the Bluetooth lock to be configured from the target two-dimensional code comprises the following steps: and decrypting the target two-dimensional code by adopting a prestored two-dimensional code key, and extracting the MAC address of the Bluetooth lock to be configured from a decryption result.
3. The method for connecting the bluetooth lock by using the two-dimensional code according to claim 2, wherein the encrypting the information to be configured by using the two-dimensional code key comprises:
and determining a zone bit, an encryption protocol name and a plurality of encryption parameters of encryption operation according to the information to be configured to obtain an encryption initial value, and performing encryption operation on the encryption initial value by adopting a symmetric encryption algorithm and the two-dimension code key.
4. The method according to claim 3, wherein the performing of the encryption operation on the encrypted initial value by using the symmetric encryption algorithm and the two-dimension code key comprises:
and generating an initial value matrix according to the encrypted initial value, performing row-column transformation on a plurality of initial value matrices for a plurality of times, performing exclusive OR operation on matrix elements subjected to row-column transformation by adopting the two-dimensional code key, and determining the encrypted data according to the result of the exclusive OR operation.
5. The method for connecting a bluetooth lock using two-dimensional code according to claim 4, wherein the exclusive or operation of the matrix elements after the row-column transformation using the two-dimensional code key comprises:
and generating a plurality of unit keys corresponding to the two-dimensional code key according to a preset key decomposition rule, and performing exclusive OR operation on each matrix element after the row-column transformation by respectively adopting one unit key.
6. The method for connecting the Bluetooth lock by using the two-dimension code according to claim 5, wherein the decrypting the target two-dimension code by using the pre-stored two-dimension code key comprises:
and acquiring the reverse operation process of encryption processing, and executing the reverse operation process on the target two-dimensional code by adopting the two-dimensional code key so as to decrypt the target two-dimensional code.
7. The method for connecting the Bluetooth lock by using the two-dimensional code according to claim 1, wherein the information to be configured further includes an unlocking instruction, an instruction verification condition and/or an information output condition; after the lock control device is connected with the bluetooth lock to be configured, the method further comprises the following steps:
after the lock control device reads an unlocking instruction from the information to be configured or receives an unlocking instruction input by a user in real time, judging whether the unlocking instruction meets an instruction verification condition, if so, executing unlocking operation, and if not, judging that unlocking fails;
and/or the lock control equipment acquires the current environmental condition of the detection area when controlling the Bluetooth lock to be configured to execute the unlocking operation, and outputs unlocking information according to the unlocking information output rule after the environmental condition meets the information output condition.
8. The method for connecting the bluetooth lock by using the two-dimensional code according to claim 1, wherein the receiving, by the integrated control device, the configuration information of the bluetooth lock to be configured comprises:
the integrated control equipment receives an identifier of a Bluetooth lock to be configured, and searches information to be configured corresponding to the identifier to be configured in a prestored identifier-configuration information relationship; the identifier to be configured is an identifier of the Bluetooth lock to be configured; and the identifier-configuration information relation records the configuration information corresponding to each identifier.
9. The method for connecting the bluetooth lock using the two-dimensional code according to claim 1, wherein after the integrated control device receives the configuration information of the bluetooth lock to be configured, the method further comprises:
and the comprehensive control equipment reads a communication account of the handheld terminal so as to send the target two-dimensional code to the handheld terminal through the communication account after the target two-dimensional code is obtained.
10. A Bluetooth lock configuration system adopting two-dimensional codes is characterized by comprising comprehensive control equipment and lock control equipment;
the comprehensive control equipment receives information to be configured of the Bluetooth lock to be configured; generating a target two-dimensional code according to the information to be configured, and issuing the target two-dimensional code to a handheld terminal of a user; the information to be configured comprises an MAC address of the Bluetooth lock to be configured;
the lock control equipment reads the target two-dimensional code provided by the handheld terminal, extracts the MAC address of the Bluetooth lock to be configured from the target two-dimensional code, and identifies the Bluetooth lock to be configured according to the MAC address so as to connect the Bluetooth lock to be configured.
CN202110544592.3A 2021-05-18 2021-05-18 Bluetooth lock connection method adopting two-dimensional code and related configuration system Pending CN113240836A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110544592.3A CN113240836A (en) 2021-05-18 2021-05-18 Bluetooth lock connection method adopting two-dimensional code and related configuration system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110544592.3A CN113240836A (en) 2021-05-18 2021-05-18 Bluetooth lock connection method adopting two-dimensional code and related configuration system

Publications (1)

Publication Number Publication Date
CN113240836A true CN113240836A (en) 2021-08-10

Family

ID=77137626

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110544592.3A Pending CN113240836A (en) 2021-05-18 2021-05-18 Bluetooth lock connection method adopting two-dimensional code and related configuration system

Country Status (1)

Country Link
CN (1) CN113240836A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114025347A (en) * 2021-11-03 2022-02-08 苏州欧清电子有限公司 Encryption method, device, equipment and storage medium for Bluetooth equipment
CN116527409A (en) * 2023-07-05 2023-08-01 深圳市旭子科技有限公司 Internet of things lock-based network access identity recognition method and system

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104063817A (en) * 2014-05-29 2014-09-24 深圳市同创新佳科技有限公司 Hotel room management method and system based on electronic key management server
CN104683938A (en) * 2015-02-10 2015-06-03 小米科技有限责任公司 Configuration method and device for intelligent equipment
CN105046775A (en) * 2015-07-14 2015-11-11 黄育斌 Device for unlocking time domain two-dimension code
CN204926233U (en) * 2015-08-18 2015-12-30 杭州骑行科技有限公司 Bluetooth lock car ware device
CN105337733A (en) * 2015-11-25 2016-02-17 杭州晟元数据安全技术股份有限公司 Two-dimensional code locking control method based on combination of synchronous-asynchronous secret key verification
CN105718978A (en) * 2014-12-03 2016-06-29 航天信息股份有限公司 QR code generation method and apparatus, and decoding method and apparatus
CN106127885A (en) * 2016-05-30 2016-11-16 长园共创电力安全技术股份有限公司 Intelligent electric controlled lock managing and control system and method
CN107450955A (en) * 2017-08-04 2017-12-08 美的智慧家居科技有限公司 Radio configuration method, equipment, mobile terminal, system, lockset and the readable storage medium storing program for executing of equipment
CN107741841A (en) * 2017-09-26 2018-02-27 深圳市丰巢科技有限公司 A kind of method and system that express delivery cabinet volume is automatically adjusted according to ambient sound
CN108230503A (en) * 2017-12-29 2018-06-29 中国船舶重工集团公司第七八研究所 A kind of half network type apartment door-locking system based on Bluetooth door lock
CN109087417A (en) * 2018-07-23 2018-12-25 湖北工业大学 A kind of safe two dimensional code entrance guard authentication system and method
CN109472909A (en) * 2019-01-11 2019-03-15 常州科新永安电子锁有限公司 Blue-tooth intelligence lock, system and application method
CN210006113U (en) * 2019-07-23 2020-01-31 广东科徕尼智能科技有限公司 intelligent lock system using two-dimensional code for safe pairing
CN110992532A (en) * 2019-11-29 2020-04-10 深圳市云天智能终端有限公司 Temporary authorized unlocking method and system for intelligent door lock
CN111324328A (en) * 2018-12-14 2020-06-23 云丁网络技术(北京)有限公司 Volume adjusting method and device
CN111787516A (en) * 2020-07-20 2020-10-16 中富通集团股份有限公司 Method and system for information interaction between electronic doorplate and user terminal
CN112367230A (en) * 2020-11-12 2021-02-12 杭州九阳小家电有限公司 Household appliance control method, mobile terminal, household appliance and household appliance control system

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104063817A (en) * 2014-05-29 2014-09-24 深圳市同创新佳科技有限公司 Hotel room management method and system based on electronic key management server
CN105718978A (en) * 2014-12-03 2016-06-29 航天信息股份有限公司 QR code generation method and apparatus, and decoding method and apparatus
CN104683938A (en) * 2015-02-10 2015-06-03 小米科技有限责任公司 Configuration method and device for intelligent equipment
CN105046775A (en) * 2015-07-14 2015-11-11 黄育斌 Device for unlocking time domain two-dimension code
CN204926233U (en) * 2015-08-18 2015-12-30 杭州骑行科技有限公司 Bluetooth lock car ware device
CN105337733A (en) * 2015-11-25 2016-02-17 杭州晟元数据安全技术股份有限公司 Two-dimensional code locking control method based on combination of synchronous-asynchronous secret key verification
CN106127885A (en) * 2016-05-30 2016-11-16 长园共创电力安全技术股份有限公司 Intelligent electric controlled lock managing and control system and method
CN107450955A (en) * 2017-08-04 2017-12-08 美的智慧家居科技有限公司 Radio configuration method, equipment, mobile terminal, system, lockset and the readable storage medium storing program for executing of equipment
CN107741841A (en) * 2017-09-26 2018-02-27 深圳市丰巢科技有限公司 A kind of method and system that express delivery cabinet volume is automatically adjusted according to ambient sound
CN108230503A (en) * 2017-12-29 2018-06-29 中国船舶重工集团公司第七八研究所 A kind of half network type apartment door-locking system based on Bluetooth door lock
CN109087417A (en) * 2018-07-23 2018-12-25 湖北工业大学 A kind of safe two dimensional code entrance guard authentication system and method
CN111324328A (en) * 2018-12-14 2020-06-23 云丁网络技术(北京)有限公司 Volume adjusting method and device
CN109472909A (en) * 2019-01-11 2019-03-15 常州科新永安电子锁有限公司 Blue-tooth intelligence lock, system and application method
CN210006113U (en) * 2019-07-23 2020-01-31 广东科徕尼智能科技有限公司 intelligent lock system using two-dimensional code for safe pairing
CN110992532A (en) * 2019-11-29 2020-04-10 深圳市云天智能终端有限公司 Temporary authorized unlocking method and system for intelligent door lock
CN111787516A (en) * 2020-07-20 2020-10-16 中富通集团股份有限公司 Method and system for information interaction between electronic doorplate and user terminal
CN112367230A (en) * 2020-11-12 2021-02-12 杭州九阳小家电有限公司 Household appliance control method, mobile terminal, household appliance and household appliance control system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114025347A (en) * 2021-11-03 2022-02-08 苏州欧清电子有限公司 Encryption method, device, equipment and storage medium for Bluetooth equipment
CN114025347B (en) * 2021-11-03 2023-12-01 苏州欧清电子有限公司 Encryption method, device and equipment of Bluetooth equipment and storage medium
CN116527409A (en) * 2023-07-05 2023-08-01 深圳市旭子科技有限公司 Internet of things lock-based network access identity recognition method and system
CN116527409B (en) * 2023-07-05 2023-10-20 深圳市旭子科技有限公司 Internet of things lock-based network access identity recognition method and system

Similar Documents

Publication Publication Date Title
US11397829B2 (en) Method for handling privacy data
CN106603484B (en) Virtual key method, device applying same, background system and user terminal
CN106330442B (en) Identity authentication method, device and system
CN107103245B (en) File authority management method and device
US9256723B2 (en) Security key using multi-OTP, security service apparatus, security system
KR20050067396A (en) Image recognition
KR20150052261A (en) Method and system for verifying an access request
CN104424676A (en) Identity information sending method, identity information sending device, access control card reader and access control system
CN113240836A (en) Bluetooth lock connection method adopting two-dimensional code and related configuration system
US20180124029A1 (en) Device and Method for Providing User-Configured Trust Domains
CN110582986B (en) Security authentication method for generating security key by combining authentication factors of multiple users
US7962173B2 (en) Portable personal server device with biometric user authentication
KR102321405B1 (en) System and method for providing security service using blockchain and biometric information
JP2004013560A (en) Authentication system, communication terminal, and server
KR101745482B1 (en) Communication method and apparatus in smart-home system
CN110490561B (en) Distributed encryption management method, device and system for encryption currency wallet
US20220358243A1 (en) Method for handling privacy data
KR102481213B1 (en) System and method for login authentication processing
JP2002157223A (en) Service providing system
US20220188395A1 (en) Digital identity management device
CN115834051A (en) DID (digital information device) certificate data based secure storage method and device, authorization method and device, electronic equipment and storage medium
KR101900060B1 (en) Security element operating with wireless router, the wireless router, and method of forming internet network using the security element
CN113298982A (en) Bluetooth lock binding method and related control system
CN110545263B (en) Decryption method, encryption method, terminal device, server and readable storage medium
US20100279655A1 (en) Method of remote managing on-card generation of keys on sim cards

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210810