CN113538752A - Offline dynamic two-dimensional code verification method for access control terminal equipment - Google Patents

Offline dynamic two-dimensional code verification method for access control terminal equipment Download PDF

Info

Publication number
CN113538752A
CN113538752A CN202110816856.6A CN202110816856A CN113538752A CN 113538752 A CN113538752 A CN 113538752A CN 202110816856 A CN202110816856 A CN 202110816856A CN 113538752 A CN113538752 A CN 113538752A
Authority
CN
China
Prior art keywords
terminal equipment
cloud
access control
code
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110816856.6A
Other languages
Chinese (zh)
Inventor
李祥云
任佳慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huiguan Shanghai Information Technology Co ltd
Original Assignee
Huiguan Shanghai Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huiguan Shanghai Information Technology Co ltd filed Critical Huiguan Shanghai Information Technology Co ltd
Priority to CN202110816856.6A priority Critical patent/CN113538752A/en
Publication of CN113538752A publication Critical patent/CN113538752A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0025Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Abstract

The invention provides an off-line dynamic two-dimensional code verification method for access control terminal equipment, which comprises the steps of obtaining verification information; generating a cloud security pass code SecCode according to the verification information; the entrance guard terminal equipment reads the information in the dynamic two-dimensional code, and generates a local safe pass code according to the abstract algorithm of the cloud system by combining the enterprise entrance guard secret key as an AcKey; the cloud system compares the local security pass code with the cloud security pass code, if the local security pass code is consistent with the cloud security pass code, the verification is passed, otherwise, the verification is not passed, the dependence of the access control terminal device on the connection with the internet is reduced, the validity of the dynamic two-dimensional code source can be verified in an off-line mode according to the verification method of the invention under the condition that the access control terminal device cannot access the internet, and the safe and quick door opening can be realized on the non-networked access control terminal device through a mobile phone or a PAD.

Description

Offline dynamic two-dimensional code verification method for access control terminal equipment
Technical Field
The invention relates to the field of access control systems, in particular to an offline dynamic two-dimensional code verification method for access control terminal equipment.
Background
The verification of the two-dimensional code by the existing entrance guard terminal equipment needs networking verification, the entrance guard terminal equipment reads the dynamic two-dimensional code generated by the mobile phone terminal, and in order to verify the validity, the validity of the two-dimensional code needs to be verified to the cloud networking. On one hand, the access control terminal equipment has networking requirements, the network operation cost of the access control terminal equipment is increased, on the other hand, the concurrent pressure of the cloud verification server is higher, meanwhile, the verification efficiency of the access control terminal equipment is also reduced, and finally, the speed of pedestrian passing is reduced.
Disclosure of Invention
In view of the above, the present invention is proposed to provide an offline dynamic two-dimensional code verification method for an access terminal device that overcomes or at least partially solves the above-mentioned problems.
According to one aspect of the invention, an offline dynamic two-dimensional code verification method for an access control terminal device is provided, and the verification method comprises the following steps:
the identity authenticator logs in a cloud system, and after the identity of the cloud system authenticates the person, the identity authenticator initiates a request for generating a passing two-dimensional code;
acquiring verification information, wherein the verification information comprises that an enterprise ID to which access control terminal equipment belongs is CustId, the ID of an identity authenticator is HuId, the building number of a residence of the identity authenticator is BuildId, the effective time of a passing two-dimensional code is ExpTime, an access control key of an enterprise is AcKey, and the access control key of the enterprise is simultaneously stored in the cloud system and the access control terminal equipment;
generating a cloud security pass code SecCode according to the verification information;
the cloud system generates a dynamic two-dimensional code by packaging and combining an enterprise ID (identity) to which the access control terminal equipment belongs, an ID of an identity authenticator, a building number of a residence of the identity authenticator, and a valid time of the passing two-dimensional code, namely ExpTime and the cloud security pass code, and sends the dynamic two-dimensional code to a mobile terminal;
the entrance guard terminal equipment reads the information in the dynamic two-dimensional code, and generates a local safe pass code according to the abstract algorithm of the cloud system by combining the enterprise entrance guard secret key as an AcKey;
and the cloud system compares the local safe pass code with the cloud safe pass code, if the local safe pass code is consistent with the cloud safe pass code, the verification is passed, otherwise, the verification is not passed.
Optionally, the generating the cloud security pass code SecCode according to the verification information specifically includes: splicing CustId + HuId + BuildId + ExpTime according to the sequence to obtain a long character string LongStr; using a data summarization algorithm for the long character string LongStr to obtain a summarized value HashStr; splicing the HashStr + AcKey again, and obtaining the secure passcode SecCode by using the data summarization algorithm for the second time.
Optionally, the verification method further includes:
the mechanism for filling and updating the secret key of the access control terminal equipment comprises the following steps:
the length of the secret key is 32 bits long, the front 16 bits and the rear 16 bits are generated by different people and are simultaneously input into a cloud end and the access control terminal equipment, and after the input of 2 people is finished, the manual filling of the secret key is finished;
placing the access control terminal equipment in a network environment, and starting a secret key updating mechanism;
the access control terminal equipment randomly generates a 32-bit-length temporary secret key, 3DES encryption is carried out on the temporary secret key by using a local secret key to generate a ciphertext and a check code, the ciphertext and the check code are sent to the cloud, the cloud firstly uses the cloud secret key to check the check code, and after the check is successful, the secret key ciphertext is decrypted and then the cloud secret key is replaced;
and after receiving the response of the synchronous updating of the cloud secret key, the access control terminal equipment immediately starts the temporary secret key to finish the updating of the secret key.
Optionally, the verification method further includes:
the identity card person white list mechanism comprises the following steps:
if the access control terminal equipment only needs to release the passage for partial personnel, a white list mechanism is set;
and (3) identifying the white list of the people: and if the entrance guard terminal equipment is only partially opened, putting the HuId of the person who is opened and passed into a white list of the entrance guard terminal equipment.
Optionally, the verification method further includes:
the clock synchronization mechanism of the access control terminal equipment comprises the following steps:
the access control terminal equipment needs to verify the validity period of the two-dimensional code, so that the synchronization of a clock and a cloud of the terminal needs to be ensured, and the time error cannot exceed a certain time;
the clock synchronization request is initiated by the entrance guard terminal equipment, signature verification is carried out by using a local secret key of the entrance guard terminal equipment, cloud time is issued after cloud verification is passed, and the local clock is synchronously updated after the terminal receives the cloud time.
Optionally, the verification method further includes:
mechanism to prevent one code from multiple use:
the entrance guard terminal equipment establishes a safe pass code queue locally;
the length of the safe pass code queue is determined according to the storage performance of the access control terminal equipment and the building requirement;
after passing verification is successful, inserting a secure pass code SecCode into the head of the local queue; before passing verification, a safe pass code queue is searched, if the same codes exist, the fact that one code is multi-purpose is determined, and verification fails.
The offline dynamic two-dimension code verification method for the access control terminal equipment reduces the dependence of the access control terminal equipment on the connection with the Internet, so that the validity of the source of the dynamic two-dimension code can be verified offline according to the verification method of the invention under the condition that the access control terminal equipment cannot access the Internet, and the safe and quick door opening can be realized on the non-networked access control terminal equipment through a mobile phone or a PAD.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a flowchart of an offline dynamic two-dimensional code verification method for an access control terminal device according to an embodiment of the present invention;
FIG. 2 is a block diagram of an algorithm for generating a cloud security passcode according to the present invention;
fig. 3 is a block diagram of the flow of the manual irrigation and subsequent system update mechanism of the key of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
The terms "comprises" and "comprising," and any variations thereof, in the present description and claims and drawings are intended to cover a non-exclusive inclusion, such as a list of steps or elements.
The technical solution of the present invention is further described in detail with reference to the accompanying drawings and embodiments.
As shown in fig. 1, an offline dynamic two-dimensional code verification method for access control terminal equipment includes:
the identity authenticator logs in the cloud system, and after the cloud system verifies the identity of the person, the identity authenticator initiates a request for generating a passing two-dimensional code;
acquiring verification information, wherein the verification information comprises that the ID of an enterprise to which the access control terminal equipment belongs is CustId, the ID of an identity authenticator is HuId, the building number of a residence of the identity authenticator is BuildId, the effective time of a passing two-dimensional code is ExpTime, the access control key of the enterprise is AcKey, and the access control key of the enterprise is stored in a cloud system and the access control terminal equipment at the same time;
generating a cloud security pass code SecCode according to the verification information;
the ID of an enterprise to which the access terminal equipment belongs is CustId, the ID of an identity authenticator is HuId, the building number of a residence of the identity authenticator is BuildId, the effective time of the passing two-dimensional code is ExpTime and the cloud security passing code SecCode are packaged and combined to generate a dynamic two-dimensional code, and the dynamic two-dimensional code is sent to the mobile terminal;
the entrance guard terminal equipment reads the information in the dynamic two-dimensional code, and generates a local safe pass code according to an abstract algorithm of a cloud system by combining an enterprise entrance guard secret key as an AcKey;
and the cloud system compares the local security pass code with the cloud security pass code, if the local security pass code is consistent with the cloud security pass code, the verification is passed, otherwise, the verification is not passed.
As shown in fig. 2, the generating of the cloud security pass code SecCode according to the verification information specifically includes: splicing CustId + HuId + BuildId + ExpTime according to the sequence to obtain a long character string LongStr; using a data summarization algorithm for the long character string LongStr to obtain a summarized value HashStr; splicing the HashStr + AcKey again, and obtaining the secure passcode SecCode by using the data summarization algorithm for the second time. A data summarization algorithm is selected, so that fingerprint information is extracted from all data to realize functions of data signature, data integrity check and the like, and irreversibility is required.
After more than 10000 times of blasting tests are carried out on the access control site traffic data, the best two data summarization algorithms, Md5 and SHA1, are selected.
The digest value HashStr is obtained by using a data digest algorithm on LongStr.
Splicing the HashStr + AcKey again, and obtaining the abstract value by using the data abstract algorithm for the second time, wherein the abstract value is the secure passcode SecCode.
Since the algorithm for generating the abstract consumes cpu, one-time data abstract can be selected according to the actual performance of the terminal device, namely, CustId + HuId + BuildId + ExpTime + AcKey are spliced, and the overall data is subjected to one-time abstract, but the safety of the one-point algorithm is slightly reduced.
In practical application, primary or secondary data summarization is selected according to the condition of a building and the performance of equipment.
As shown in fig. 3, the mechanism for filling and updating the key of the access control terminal device:
the length of the secret key is 32 bits long, the front 16 bits and the rear 16 bits are generated by different people and are simultaneously input into the cloud terminal and the entrance guard terminal equipment, and after the input of 2 people is finished, the manual filling of the secret key is finished;
placing the access control terminal equipment in a network environment, and starting a secret key updating mechanism;
the access control terminal equipment randomly generates a 32-bit-length temporary secret key, 3DES encryption is carried out on the temporary secret key by using a local secret key to generate a ciphertext and a check code, the ciphertext and the check code are sent to the cloud, the cloud firstly uses the cloud secret key to check the check code, and after the check is successful, the secret key ciphertext is decrypted and then the cloud secret key is replaced;
and after receiving the response of the synchronous updating of the cloud secret key, the access control terminal equipment immediately starts the temporary secret key to finish the updating of the secret key.
The length of the secret key is 32 bits long, the first 16 bits and the second 16 bits are generated by different people, the secret key is simultaneously input into the cloud terminal and the entrance guard terminal equipment, and after the input of 2 people is completed, the manual filling of the secret key is completed.
And placing the access control terminal equipment in a network environment, and starting a secret key updating mechanism.
The access control terminal equipment randomly generates a 32-bit-length temporary secret key, 3DES encryption is carried out on the temporary secret key by using a local secret key to generate a ciphertext and a check code, the ciphertext and the check code are sent to the cloud, the cloud firstly uses the cloud secret key to check the check code, and after the check is successful, the secret key ciphertext is decrypted and then the cloud secret key is replaced;
and after receiving the response of the synchronous updating of the cloud secret key, the equipment immediately starts the temporary secret key, and the secret key updating is completed.
Since the updating process is not manually involved, the risk of the key being leaked is extremely low.
To further increase security, it may be institutionally specified that the key must be backed up for updating.
The identity card person white list mechanism comprises the following steps:
if the access control terminal equipment only needs to release the passage for partial personnel, a white list mechanism is set;
and (3) identifying the white list of the people: and if the entrance guard terminal equipment is only partially opened, putting the HuId of the person who is opened and passed into a white list of the entrance guard terminal equipment.
The authentication method further comprises:
the clock synchronization mechanism of the access control terminal equipment comprises the following steps:
the access control terminal equipment needs to verify the validity period of the two-dimensional code, so that the clock and the cloud of the terminal need to be kept synchronous, and the time error cannot exceed a certain time, such as 30 seconds;
the clock synchronization request is initiated by the entrance guard terminal equipment, signature verification is carried out by using a local secret key of the entrance guard terminal equipment, cloud time is issued after cloud verification is passed, and the local clock is synchronously updated after the terminal receives the cloud time. The entrance guard terminal can be set to request clock synchronization from the server periodically every month (or every week or every day).
The clock synchronization request is initiated by the terminal, signature verification is carried out by using a local terminal secret key (a signature algorithm can adopt Md5), the cloud terminal time is issued after the cloud terminal verification is passed, and the local clock is synchronously updated after the terminal receives the cloud terminal time.
The authentication method further comprises:
mechanism to prevent one code from multiple use:
the entrance guard terminal equipment establishes a safe pass code queue locally;
the length of the safe pass code queue is determined according to the storage performance of the access control terminal equipment and building requirements, and is recommended to be 1000;
after passing verification is successful, inserting a secure pass code SecCode into the head of the local queue; before passing verification, a safe pass code queue is searched, if the same codes exist, the fact that one code is multi-purpose is determined, and verification fails.
The core point of the invention lies in an off-line verification mechanism of the two-dimension code, namely, the cloud generates a data summary by using an irreversible data summary algorithm to the business plaintext data and the secret key data, and the access control terminal also generates a data summary by using the same algorithm and then compares the cloud summary with the terminal summary to realize the off-line verification mechanism.
Has the advantages that:
1. the dependence on the network environment is reduced, so that the access control terminal equipment can also verify the identity in the network-free environment.
2. The passing efficiency is improved, and compared with the off-line verification and the networking verification, the verification speed is greatly reduced, and the passing efficiency is improved.
3. The equipment cost is reduced, and the entrance guard terminal equipment can be configured without a network module, so that the hardware cost is reduced.
4. The network operation cost is reduced, and the network operation expense is not required to be considered for an operator.
5. When the personnel pass the peak, the server and the network pressure of the cloud system are greatly reduced, so that the operation and maintenance cost of the whole system is reduced.
The above embodiments are provided to further explain the objects, technical solutions and advantages of the present invention in detail, it should be understood that the above embodiments are merely exemplary embodiments of the present invention and are not intended to limit the scope of the present invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (6)

1. An offline dynamic two-dimension code verification method for access control terminal equipment is characterized by comprising the following steps:
the identity authenticator logs in a cloud system, and after the identity of the cloud system authenticates the person, the identity authenticator initiates a request for generating a passing two-dimensional code;
acquiring verification information, wherein the verification information comprises that an enterprise ID to which access control terminal equipment belongs is CustId, the ID of an identity authenticator is HuId, the building number of a residence of the identity authenticator is BuildId, the effective time of a passing two-dimensional code is ExpTime, an access control key of an enterprise is AcKey, and the access control key of the enterprise is simultaneously stored in the cloud system and the access control terminal equipment;
generating a cloud security pass code SecCode according to the verification information;
the cloud system generates a dynamic two-dimensional code by packaging and combining an enterprise ID (identity) to which the access control terminal equipment belongs, an ID of an identity authenticator, a building number of a residence of the identity authenticator, and a valid time of the passing two-dimensional code, namely ExpTime and the cloud security pass code, and sends the dynamic two-dimensional code to a mobile terminal;
the entrance guard terminal equipment reads the information in the dynamic two-dimensional code, and generates a local safe pass code according to the abstract algorithm of the cloud system by combining the enterprise entrance guard secret key as an AcKey;
and the cloud system compares the local safe pass code with the cloud safe pass code, if the local safe pass code is consistent with the cloud safe pass code, the verification is passed, otherwise, the verification is not passed.
2. The offline dynamic two-dimensional code verification method for the access terminal device according to claim 1, wherein the generating of the cloud security pass code SecCode according to the verification information specifically includes: splicing CustId + HuId + BuildId + ExpTime according to the sequence to obtain a long character string LongStr; using a data summarization algorithm for the long character string LongStr to obtain a summarized value HashStr; splicing the HashStr + AcKey again, and obtaining the secure passcode SecCode by using the data summarization algorithm for the second time.
3. The offline dynamic two-dimensional code verification method for the access terminal device as claimed in claim 1, wherein the verification method further comprises:
the mechanism for filling and updating the secret key of the access control terminal equipment comprises the following steps:
the length of the secret key is 32 bits long, the front 16 bits and the rear 16 bits are generated by different people and are simultaneously input into a cloud end and the access control terminal equipment, and after the input of 2 people is finished, the manual filling of the secret key is finished;
placing the access control terminal equipment in a network environment, and starting a secret key updating mechanism;
the access control terminal equipment randomly generates a 32-bit-length temporary secret key, 3DES encryption is carried out on the temporary secret key by using a local secret key to generate a ciphertext and a check code, the ciphertext and the check code are sent to the cloud, the cloud firstly uses the cloud secret key to check the check code, and after the check is successful, the secret key ciphertext is decrypted and then the cloud secret key is replaced;
and after receiving the response of the synchronous updating of the cloud secret key, the access control terminal equipment immediately starts the temporary secret key to finish the updating of the secret key.
4. The offline dynamic two-dimensional code verification method for the access terminal device as claimed in claim 1, wherein the verification method further comprises:
the identity card person white list mechanism comprises the following steps:
if the access control terminal equipment only needs to release the passage for partial personnel, a white list mechanism is set;
and (3) identifying the white list of the people: and if the entrance guard terminal equipment is only partially opened, putting the HuId of the person who is opened and passed into a white list of the entrance guard terminal equipment.
5. The offline dynamic two-dimensional code verification method for the access terminal device as claimed in claim 1, wherein the verification method further comprises:
the clock synchronization mechanism of the access control terminal equipment comprises the following steps:
the access control terminal equipment needs to verify the validity period of the two-dimensional code, so that the synchronization of a clock and a cloud of the terminal needs to be ensured, and the time error cannot exceed a certain time;
the clock synchronization request is initiated by the entrance guard terminal equipment, signature verification is carried out by using a local secret key of the entrance guard terminal equipment, cloud time is issued after cloud verification is passed, and the local clock is synchronously updated after the terminal receives the cloud time.
6. The offline dynamic two-dimensional code verification method for the access terminal device as claimed in claim 1, wherein the verification method further comprises:
mechanism to prevent one code from multiple use:
the entrance guard terminal equipment establishes a safe pass code queue locally;
the length of the safe pass code queue is determined according to the storage performance of the access control terminal equipment and the building requirement;
after passing verification is successful, inserting a secure pass code SecCode into the head of the local queue; before passing verification, a safe pass code queue is searched, if the same codes exist, the fact that one code is multi-purpose is determined, and verification fails.
CN202110816856.6A 2021-07-20 2021-07-20 Offline dynamic two-dimensional code verification method for access control terminal equipment Pending CN113538752A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110816856.6A CN113538752A (en) 2021-07-20 2021-07-20 Offline dynamic two-dimensional code verification method for access control terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110816856.6A CN113538752A (en) 2021-07-20 2021-07-20 Offline dynamic two-dimensional code verification method for access control terminal equipment

Publications (1)

Publication Number Publication Date
CN113538752A true CN113538752A (en) 2021-10-22

Family

ID=78128836

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110816856.6A Pending CN113538752A (en) 2021-07-20 2021-07-20 Offline dynamic two-dimensional code verification method for access control terminal equipment

Country Status (1)

Country Link
CN (1) CN113538752A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2073433A1 (en) * 2007-12-18 2009-06-24 Systemes Et Technologies Identification Remote securing of control and identification UHF radio transactions
CN104639561A (en) * 2015-02-27 2015-05-20 飞天诚信科技股份有限公司 Method for safely obtaining secret key
CN105551117A (en) * 2014-11-04 2016-05-04 广东中星电子有限公司 Two-dimension code generation/verification method used in access control environment, and apparatus thereof
CN105989643A (en) * 2015-02-03 2016-10-05 吉林省施泰信息技术股份有限公司 Communication encryption method used for electronic lock, electronic lock apparatus and system thereof
CN106952378A (en) * 2017-04-11 2017-07-14 徐士兰 Method for unlocking and device, electronic lock
CN106992850A (en) * 2017-03-16 2017-07-28 武汉世纪金桥安全技术有限公司 A kind of secret key verification method of blue-tooth intelligence lock controller
CN108234458A (en) * 2017-12-21 2018-06-29 广东汇泰龙科技有限公司 Method, the system of encryption storage and the decryption extraction of a kind of cloud lock cipher
CN108683706A (en) * 2018-04-12 2018-10-19 广东汇泰龙科技有限公司 A kind of Encryption Algorithm and its verification method based on the lock communication of NB-IOT clouds

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2073433A1 (en) * 2007-12-18 2009-06-24 Systemes Et Technologies Identification Remote securing of control and identification UHF radio transactions
CN105551117A (en) * 2014-11-04 2016-05-04 广东中星电子有限公司 Two-dimension code generation/verification method used in access control environment, and apparatus thereof
CN105989643A (en) * 2015-02-03 2016-10-05 吉林省施泰信息技术股份有限公司 Communication encryption method used for electronic lock, electronic lock apparatus and system thereof
CN104639561A (en) * 2015-02-27 2015-05-20 飞天诚信科技股份有限公司 Method for safely obtaining secret key
CN106992850A (en) * 2017-03-16 2017-07-28 武汉世纪金桥安全技术有限公司 A kind of secret key verification method of blue-tooth intelligence lock controller
CN106952378A (en) * 2017-04-11 2017-07-14 徐士兰 Method for unlocking and device, electronic lock
CN108234458A (en) * 2017-12-21 2018-06-29 广东汇泰龙科技有限公司 Method, the system of encryption storage and the decryption extraction of a kind of cloud lock cipher
CN108683706A (en) * 2018-04-12 2018-10-19 广东汇泰龙科技有限公司 A kind of Encryption Algorithm and its verification method based on the lock communication of NB-IOT clouds

Similar Documents

Publication Publication Date Title
CN110493202B (en) Login token generation and verification method and device and server
EP3557831B1 (en) System for processing two-dimensional barcodes in connection with mobile payment transactions
EP3435591B1 (en) 1:n biometric authentication, encryption, signature system
US6748530B1 (en) Certification apparatus and method
CN108833114A (en) A kind of decentralization identity authorization system and method based on block chain
AU2019204723C1 (en) Cryptographic key management based on identity information
CN108734018B (en) Authentication method, device, system and computer readable storage medium
US20110113241A1 (en) Ic card, ic card system, and method thereof
EP3206329B1 (en) Security check method, device, terminal and server
CN106779705B (en) Dynamic payment method and system
AU2019204711B2 (en) Securely performing cryptographic operations
CN109905384B (en) Data migration method and system
CN111884811A (en) Block chain-based data evidence storing method and data evidence storing platform
CN106961329A (en) A kind of solution for being directed to ADS B agreements confidentiality and integrality
US20200372507A1 (en) Identification code pulling method, storage medium, terminal device, and server
CN113872932A (en) Method, system, terminal and storage medium for authenticating interface between micro services
US11251941B2 (en) Managing cryptographic keys based on identity information
CN109726578A (en) A kind of anti-fake solution of novel dynamic two-dimension code
CN113538752A (en) Offline dynamic two-dimensional code verification method for access control terminal equipment
Campbell Supporting digital signatures in mobile environments
CN112580109B (en) Software business process legality design method by using block chain signature technology
CN115633362B (en) NFC function control method based on security element and mobile terminal equipment
CN114615075B (en) Software tamper-proof system and method of controller and storage medium
JP2002006739A (en) Authentication information generating device and data verifying device
CN113715670A (en) Charging method of storage battery car charging pile equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20211022

RJ01 Rejection of invention patent application after publication