CN114170709A - Money box management method and system based on Internet of things - Google Patents

Money box management method and system based on Internet of things Download PDF

Info

Publication number
CN114170709A
CN114170709A CN202111487517.4A CN202111487517A CN114170709A CN 114170709 A CN114170709 A CN 114170709A CN 202111487517 A CN202111487517 A CN 202111487517A CN 114170709 A CN114170709 A CN 114170709A
Authority
CN
China
Prior art keywords
unlocking
lock
internet
management platform
business system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111487517.4A
Other languages
Chinese (zh)
Inventor
张扬
吴迪
吴渊
管正国
任玉栋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
Original Assignee
China Construction Bank Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp filed Critical China Construction Bank Corp
Priority to CN202111487517.4A priority Critical patent/CN114170709A/en
Publication of CN114170709A publication Critical patent/CN114170709A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C9/00912Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for safes, strong-rooms, vaults or the like

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The utility model provides a money case management method based on the Internet of things, which can be applied to the technical field of the Internet of things. The money box management method comprises the following steps: the business system acquires identity information of a requester from the unlocking device based on the management platform of the Internet of things; the service system authenticates the identity information of the requester; the business system sends an identity authentication result to the unlocking device based on the Internet of things management platform; when the identity authentication passes, the unlocking device sends an unlocking request to the service system based on the Internet of things management platform; the business system generates an unlocking factor based on the unlocking request; the lockset acquires the unlocking factor based on an Internet of things management platform; the lock verifies the unlocking factor and realizes unlocking. The present disclosure also provides a money box management system.

Description

Money box management method and system based on Internet of things
Technical Field
The disclosure relates to the field of internet of things, in particular to money box management based on the internet of things, and more particularly to a money box management method and system based on the internet of things.
Background
At present, financial institutions or other institutions mostly adopt a mechanical offline management mode when carrying out entity money bag/box management, and the mechanical key management mainly depends on internal regulation and system constraints, for example, for a teller cash box at a bank outlet, when the cash box is required to be opened and closed, the box body needs to be doubly locked, namely, the cash box is opened and closed at the same time, and the cash box is locked at the same time, so that two keys are separately managed and managed at the same time, and are jointly responsible for management; the business network can manage two keys for two persons separately, and can not manage the keys simultaneously. However, these regulations present a number of risks and inconveniences to the implementation. Although the prior art has a method for realizing electronic unpacking and sealing based on an encryption and decryption technology, the method usually manages only specific money boxes, and lacks a method capable of synchronously monitoring a plurality of money boxes in real time and maintaining connectivity of the money boxes and a service system.
Disclosure of Invention
In view of the above, the present disclosure provides a money box management method and system based on the internet of things, which improve money box management efficiency.
According to a first aspect of the present disclosure, a money box management method based on the internet of things is provided, which is characterized by comprising: the business system acquires identity information of a requester from the unlocking device based on the management platform of the Internet of things; the service system authenticates the identity information of the requester; the business system sends an identity authentication result to the unlocking device based on the Internet of things management platform; when the identity authentication passes, the unlocking device sends an unlocking request to the service system based on the Internet of things management platform; the business system generates an unlocking factor based on the unlocking request; the lockset acquires the unlocking factor based on an Internet of things management platform; the lockset checks the unlocking factor and realizes unlocking, wherein the lockset is matched with a money box, and the Internet of things management platform is respectively in communication connection with the business system, the lockset and the unlocking device; the unlocking device is also in communication connection with the lock.
According to the embodiment of the present disclosure, the service system authenticating the identity information of the requestor includes: the service system calls an identity recognition device, and the identity recognition device stores administrator identity information in advance; and the service system compares the identity information of the requester with the identity information of the manager, wherein the identity recognition device is in communication connection with the service system.
According to the embodiment of the present disclosure, the generating, by the service system, the unlocking factor based on the unlocking request includes: the business system judges whether unlocking authority is established or not based on the unlocking request, wherein the unlocking request comprises a lock identification; if the unlocking authority is established, unlocking safety data are sent to an encryption device, wherein the unlocking safety data comprise the lock identification and a locking code corresponding to the lock identification; the encryption device generates an unlocking code ciphertext based on the unlocking safety data; and the business system acquires the unlocking code ciphertext and generates an unlocking factor based on the unlocking code ciphertext, wherein the encryption device is in communication connection with the business system.
According to the embodiment of the present disclosure, the lock verifying the unlocking factor and realizing unlocking includes: the lockset acquires unlocking factors from the business system based on the Internet of things management platform; the lock verifies the unlocking factor based on the stored locking code and the lock identification; and when the verification is successful, unlocking the lockset.
According to an embodiment of the present disclosure, the service system and the lock have an initial lock code stored therein, and the initial lock code is generated by: the business system acquires a lock list based on the Internet of things management platform, the lock list is matched with the money box, and the lock list comprises a lock identification corresponding to a lock; the lockset acquires first encrypted data from the business system based on the Internet of things management platform to generate a first communication key and second encrypted data; the business system acquires second encrypted data from the lock based on the Internet of things management platform; the encryption device generates a second communication key and a lock working key based on second encrypted data from the service system, wherein the first communication key and the second communication key are the same; the encryption device encrypts the lock working key based on the second communication key to generate a working key ciphertext and sends the working key ciphertext to the service system; the lockset acquires a work key ciphertext from the business system based on the Internet of things management platform; and the lockset decrypts the work key ciphertext based on the first communication key to generate an initial locking code, wherein the business system is respectively in communication connection with the encryption equipment and the Internet of things management platform, and the lockset is in communication connection with the Internet of things management platform. According to an embodiment of the disclosure, the acquiring, by the lock, first encrypted data from the service system based on the internet of things management platform to generate a first communication key and second encrypted data includes: the business system acquires first encrypted data from the encryption device, wherein the first encrypted data comprises public key data containing a signature; the lockset acquires first encrypted data from the business system based on an Internet of things management platform; the lockset analyzes the first encrypted data and generates the first communication key and the second encrypted data based on the analyzed data, wherein the analysis comprises signature verification of public key data containing a signature.
According to an embodiment of the disclosure, the acquiring, by the lock, first encrypted data from the service system based on the internet of things management platform to generate a first communication key and second encrypted data includes: the business system acquires first encrypted data from the encryption device, wherein the first encrypted data comprises public key data containing a signature; the lockset acquires first encrypted data from the business system based on an Internet of things management platform; the lockset analyzes the first encrypted data and generates the first communication key and the second encrypted data based on the analyzed data, wherein the analysis comprises signature verification of public key data containing a signature.
According to an embodiment of the present disclosure, the generating, by the encryption device, a second communication key and a lock operation key based on second encrypted data from the business system includes: and the business system acquires second encrypted data from the lock based on the Internet of things management platform. And the business system generates a lock encryption factor based on the second encryption data. Wherein the lock encryption factor comprises the lock identification. And the encryption device generates a second communication key and a lock working key based on the lock encryption factor from the business system.
According to an embodiment of the present disclosure, when the lock list is empty, the method further includes: the business system automatically generates a lock identification; the business system sends the lock identification and the first encrypted data to the lock together based on an Internet of things management platform; the lockset stores the lockset identification.
According to an embodiment of the present disclosure, after unlocking, the method further comprises: the lockset updates a locking code and generates third encrypted data based on the locking code; the business system acquires the third encrypted data from the lock based on the internet of things management platform; and the service system acquires and stores the updated locking code based on the third encrypted data.
According to the embodiment of the disclosure, the lockset, the unlocking device and the money box are connected into the Internet of things management platform through the gateway.
A second aspect of the present disclosure provides a money box management system based on the internet of things, including: the system comprises a lockset, a money box, a business system, an unlocking device and an Internet of things management platform, wherein the business system is configured to acquire identity information of a requester from the unlocking device based on the Internet of things management platform; authenticating the identity information of the applicant; sending an identity authentication result to the unlocking device through the Internet of things management platform; receiving an unlocking request from the unlocking device; and transmitting an unlocking factor based on the unlocking request; the unlocking device is configured to send an unlocking request to the service system based on the Internet of things management platform when identity authentication passes; the lockset is configured to acquire the unlocking factor based on an Internet of things management platform; the unlocking factor is verified and unlocking is realized, wherein the lock is matched with the money box, and the Internet of things management platform is in communication connection with the business system, the lock and the unlocking device respectively; the lockset is also in communication connection with the unlocking device.
According to an embodiment of the present disclosure, the money box management system further includes: and the encryption device is configured to receive unlocking safety data from the business system and generate unlocking code ciphertext data based on the unlocking safety data, wherein the encryption device is in communication connection with the business system.
According to an embodiment of the present disclosure, the money box management system further includes: the identity recognition device is configured to store administrator identity information in advance, and the administrator identity information is used for being compared with identity information of a requester to verify the identity of the requester.
According to an embodiment of the present disclosure, the money box management system further includes: and the gateway is configured to connect the lockset, the unlocking device and the money box into the Internet of things management platform.
Drawings
The foregoing and other objects, features and advantages of the disclosure will be apparent from the following description of embodiments of the disclosure, which proceeds with reference to the accompanying drawings, in which:
fig. 1 schematically shows an application scenario diagram of money box management according to an embodiment of the present disclosure.
FIG. 2 schematically illustrates a flow chart of a cash box management method according to an embodiment of the disclosure.
Fig. 3 schematically shows a flowchart of a business system generating an unlocking factor based on the unlocking request according to an embodiment of the present disclosure.
Fig. 4 schematically shows a flowchart of a business system generating an unlocking factor based on the unlocking request according to an embodiment of the present disclosure.
Fig. 5 schematically illustrates a flow chart of a method that may also be included after unlocking, according to an embodiment of the disclosure.
Fig. 6 schematically illustrates a flow chart of a method of generating an initial lock code according to an embodiment of the present disclosure.
Fig. 7 schematically shows a block diagram of the construction of a money box management system according to an embodiment of the present disclosure.
Fig. 8 schematically shows a block diagram of a cash box management system according to another embodiment of the present disclosure.
Fig. 9 schematically shows a block diagram of a cash box management system according to another embodiment of the present disclosure.
Fig. 10 schematically shows a block diagram of a cash box management system according to another embodiment of the present disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
It should be noted that the money box management method, system, device, medium, and program product provided in the embodiments of the present disclosure may be used in the internet of things technology in the aspects related to device management, and may also be used in various fields other than the internet of things technology, such as the financial field. The application fields of the money box management method, the money box management system and the electronic equipment provided by the embodiment of the disclosure are not limited.
The embodiment of the disclosure provides a money box management method based on the Internet of things.
Fig. 1 schematically shows an application scenario diagram of money box management according to an embodiment of the present disclosure.
As shown in fig. 1, the application scenario 100 according to this embodiment may include terminal devices 101, 102, 103. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have installed thereon various communication client applications, such as shopping-like applications, web browser applications, search-like applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only).
The terminal devices 101, 102, 103 are various electronic devices that can send unlocking request data and perform authentication, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 105 may be a server providing various services, such as a background management server (for example only) that processes an unlocking request signal transmitted by the user using the terminal devices 101, 102, and 103 and manages opening and closing of the money box. The background management server can analyze and process the received data such as the user request and feed back the processing result (such as the authentication result, the data information required for unlocking and the like) to the terminal equipment.
It should be noted that the cash box management method provided in the embodiment of the present disclosure may be mainly executed by the server 105. Accordingly, the cash box management system provided by embodiments of the present disclosure may generally include a device, such as a business system, that includes a server 105. The money box management method provided by the embodiment of the disclosure may also be executed by a server or a server cluster different from the server 105 and capable of communicating with the terminal devices 101, 102, 103 and/or the server 105. Accordingly, the money box management system provided by the embodiment of the present disclosure may also include a device including a server or a server cluster different from the server 105 and capable of communicating with the terminal devices 101, 102, 103 and/or the server 105.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
The money box management method of the disclosed embodiment will be described in detail below with reference to fig. 2 to 6 based on the scenario described in fig. 1.
FIG. 2 schematically illustrates a flow chart of a cash box management method according to an embodiment of the disclosure.
As shown in fig. 2, the money box management method of this embodiment includes operations S210 to S260.
In operation S210, the service system obtains identity information of a requester from the unlocking apparatus based on the internet of things management platform.
In operation S220, the service system authenticates the identity information of the requestor.
In operation S230, the service system sends an identity authentication result to the unlocking device based on the internet of things management platform.
In operation S240, when the identity authentication passes, the unlocking device sends an unlocking request to the service system based on the internet of things management platform.
In operation S250, the business system generates an unlocking factor based on the unlocking request.
In operation S260, the lock verifies the unlocking factor and realizes unlocking.
According to the embodiment of the disclosure, in order to realize key removal of money box management, and enable the money box to achieve the goal of keeping real-time interaction and real-time with a core system such as a business system, and realize fine management of the money box, an internet of things management platform is introduced into the embodiment of the disclosure. Establish money case, tool to lock, unlocking device and business system's connection through thing networking management platform, particularly, the tool to lock can be active lock, and the money case can be active money case, and unlocking device can be for the equipment that is equipped with the radio frequency identification function, for example be equipped with RFID, NFC recognition function's PDA. The lock is matched with the money box, and the Internet of things management platform is respectively in communication connection with the business system, the lock and the unlocking device; the unlocking device is also in communication connection with the lockset. The interaction of the lockset, the unlocking device and the business system needs to be carried out through the Internet of things platform, so that the connectivity of the cash box and the business system can be kept under the conditions of limited battery capacity, small communication quantity and mobility, the cash box management efficiency is improved, the human input cost is reduced, and the intelligent operation of the cash box is realized.
In the embodiment of the disclosure, in order to ensure the security of money box management, an identity authentication process between the unlocking device and the service system can be established, and the unlocking device can execute the next unlocking process after the identity authentication of the unlocking requester is passed, for example, the unlocking request is sent. Correspondingly, the unlocking device can be provided with an identity identification module, including but not limited to an identification module with biological identification functions such as fingerprint identification, face identification, finger vein identification and the like. The unlocking factor can be data which is generated based on encryption and decryption technology and is necessary for realizing unlocking and can be verified with the lock. Based on the dual security authentication of identity authentication and unlocking factor, the security of cash box management is further improved.
According to the embodiment of the disclosure, the method for the service system to authenticate the identity information of the requester can comprise the following steps: and the service system calls an identity recognition device, and the identity recognition device stores administrator identity information in advance. And the service system compares the identity information of the requester with the identity information of the manager. According to the embodiment of the disclosure, the identity recognition device may be in communication connection with the service system. In the embodiment of the disclosure, the identity recognition device may correspond to an identity recognition module provided in the unlocking device, and may include, for example, functional components such as fingerprint comparison, face comparison, finger vein comparison, and the like.
In some specific embodiments, the unlocking device collects identity authentication information of a requester, and after the identity authentication information is sent to the service system through the internet of things management platform, the service system calls an identity recognition device which stores identity information of a manager with money box management authority to recognize the identity authentication information, for example, a UASS component is dropped to perform fingerprint comparison, the service system pushes a comparison result to the unlocking device through the internet of things management platform, and if the comparison is successful, an unlocking request is initiated.
It can be understood that if the identity authentication of the applicant fails, it indicates that the applicant does not have the money box management right, and the comparison fails, at this time, after the business system can push the result of the comparison failure to the unlocking device through the internet of things management platform, the unlocking device displays the prompt information of the comparison failure, and the subsequent unlocking process is not performed any more.
Fig. 3 schematically shows a flowchart of a business system generating an unlocking factor based on the unlocking request according to an embodiment of the present disclosure.
As shown in fig. 3, the money box management method of this embodiment includes operations S310 to S340.
In operation S310, the business system determines whether an unlocking authority is satisfied based on the unlocking request, where the unlocking request includes a lock identifier.
According to the embodiment of the disclosure, in order to further guarantee unlocking security, whether the current unlocking requester has the unlocking authority or not can be verified, for example, whether the current requester is consistent with corresponding data pre-stored by a business system or not can be judged through a money box bound by a lockset so as to judge whether the current unlocking requester has the unlocking authority or not. Wherein, unlocking means can be through acquireing present tool to lock sign with the tool to lock interaction, for example can be tool to lock ID. Thus, the unlocking request may include, for example, an upper lock identification. Further, the unlocking request may also contain a person identification. If the unlocking authority is not established, the service system can send prompt information to the unlocking device through the Internet of things management platform. And when the unlocking authority is satisfied, executing the next unlocking process.
In operation S320, if the unlocking authority is satisfied, sending unlocking security data to an encryption device, where the unlocking security data includes the lock identifier and a locking code corresponding to the lock identifier.
According to the embodiment of the disclosure, a lock identification and a locking code corresponding to the lock identification are prestored in a business system, wherein the lock identification may include one or more lock identifications, each lock stores the locking code uniquely corresponding to the lock, and the business system also stores the locking code corresponding to the lock. The locking code can be generated based on encrypted data, and after each unlocking and locking, a new locking code can be generated based on an encryption algorithm, so that the safety of money box management is improved. The adopted encryption algorithm may include a symmetric encryption algorithm, an asymmetric encryption algorithm, and a hash algorithm, and may be, for example, cryptographic algorithms SM3 and SM 4. Through setting up the safe data of unblanking, can utilize encryption and decryption technique to realize tool to lock and business system's intercommunication, promote the security of money case management.
In operation S330, the encryption device generates an unlock code ciphertext based on the unlock security data.
According to the embodiment of the disclosure, the encryption device is in communication connection with the service system. After receiving the unlocking safety data from the business system, the encryption device can generate unlocking code ciphertext data by utilizing the unlocking safety data based on an encryption algorithm, and the unlocking code ciphertext data can include a check value based on the selected encryption algorithm.
In operation S340, the service system obtains the unlock code ciphertext and generates an unlock factor based on the unlock code ciphertext.
According to the embodiment of the disclosure, after the encryption device generates the unlock code ciphertext, the unlock code ciphertext can be sent to the business system, and the business system can generate the unlock factor used for being transmitted to the lock based on the unlock code ciphertext, wherein the unlock factor can include the unlock code ciphertext, the unlock code ciphertext containing the check value, and the digital signature, for example, a timestamp can be included. The safety protection of money box management can be further improved through the unlocking factor.
Fig. 4 schematically shows a flowchart of a business system generating an unlocking factor based on the unlocking request according to an embodiment of the present disclosure.
As shown in fig. 4, the money box management method of this embodiment includes operations S410 to S430.
In operation S410, the lock acquires an unlocking factor from the service system based on the internet of things management platform.
In operation S420, the lock verifies the unlocking factor based on the saved lock code and the lock identification.
In operation S430, when the verification is successful, the lock is unlocked.
According to an embodiment of the present disclosure, in each unlocking turn, the lock holds the same locking code as the business system. The locking code may be a random number generated based on a preset algorithm. After the business system generates the unlocking factor, the unlocking factor can be transmitted to the lockset through the Internet of things management platform, and the lockset can verify the unlocking factor according to the locking code. The locking codes in different unlocking rounds can be the same or different, so that money box management scenes with different safety requirements can be met.
In some embodiments, the method for verifying the unlocking factor may include: when the lock receives the unlocking factor, the unlocking code ciphertext is decrypted to obtain a plaintext unlocking code. The lock may derive a new unlock code based on a convention algorithm based on the saved lock code that is the same as the business system, the current lock identification, and a digital signature (e.g., timestamp). And comparing the plaintext unlocking code from the business system with the new unlocking code generated by the lock, and if the plaintext unlocking code is consistent with the new unlocking code generated by the lock, the verification is successful, and the lock can be opened. If the verification information is inconsistent with the verification information, the lock can send the verification failure information to the unlocking device.
According to the embodiment of the disclosure, in a cash box management scene with safety requirement, after unlocking, the lockset can also update the locking code and transmit the locking code to a business system for storage.
Fig. 5 schematically illustrates a flow chart of a method that may also be included after unlocking, according to an embodiment of the disclosure.
As shown in fig. 5, the money box management method of this embodiment includes operations S510 to S530.
In operation S510, the lockset updates a lock code and generates third encrypted data based on the lock code.
In operation S520, the service system obtains the third encrypted data from the lock based on the internet of things management platform.
In operation S530, the service system obtains and saves the updated locking code based on the third encrypted data.
In embodiments of the present disclosure, the lockset may update the lock code, such as generating a new random number based on a preset algorithm. And then, encrypting the new random number by using a preset encryption algorithm based on the working key to generate third encrypted data. The adopted preset encryption algorithm may include a symmetric encryption algorithm, an asymmetric encryption algorithm, and a hash algorithm, and may be, for example, the cryptographic algorithms SM3 and SM 4. The third encrypted data may include a lock code ciphertext and may further include a check value according to a type of a preset encryption algorithm. The service system can obtain third encrypted data through the internet of things management platform, then the third encrypted data are transmitted to the encryption device, and the encryption device can obtain an updated locking code after obtaining the third encrypted data and then decrypting the third encrypted data based on an agreed algorithm. After the encryption device transmits the updated locking code to the service system, the service system can store the updated locking code as the composition of unlocking safety data in the next round of unlocking. It can be appreciated that the business system can transmit the corresponding lock identification for decryption by the encryption device while transmitting the third encrypted data to maintain the correspondence between the lock code and the business system lock code. The working key may be generated by the service system based on a preset algorithm and transmitted to the lock for storage, for example, may be stored in an encryption chip of the active lock. After each unlocking, a new locking code can be generated based on the working key stored in the lockset and based on an agreed generation algorithm, and the dynamic updating of the locking code is realized under the condition that the working key is not changed. The generation rule of the working key can be uniquely stored for the service system, so that the safe connection and dynamic control of the service system and the lock are realized.
According to an embodiment of the present disclosure, the money box management method may further include a method of initializing the device, for example, including the step of generating an initial lock code, which is stored in the business system and the lock.
Fig. 6 schematically illustrates a flow chart of a method of generating an initial lock code according to an embodiment of the present disclosure.
As shown in fig. 6, the money box management method of this embodiment includes operations S610 to S670.
In operation S610, the business system obtains a lock list based on the internet of things management platform, where the lock list is matched with the money box, and the lock list includes a lock identifier corresponding to a lock.
According to the embodiment of the disclosure, before the business system obtains the lock list, a step of money box registration can be further included. The cash box may be an active cash box, which may contain a unique device identification at the time of shipment, e.g., may contain a device SN number. When a money box is newly added, whether the money box is registered to the Internet of things management platform or not can be selected in the service system, and a registration application is initiated to the Internet of things management platform based on the equipment identifier. The management platform of the internet of things can feed back the registration result to the service system. It can be understood that one or more internet of things management platforms can be connected based on the complexity requirement of the service system device management, and correspondingly, the registration result can include an internet of things management platform identifier, so that the online state of the money box can be updated in real time by the service system after registration.
According to the embodiment of the disclosure, after the money box is registered, a money box activation step may be included, specifically, a manager may perform an activation operation on the money box, for example, continuously pressing an on-off key three times, the money box initiates an activation request like an internet of things management platform, so that the money box is activated on the internet of things management platform. It can be understood that the activation request may include a money box identifier and a service system identifier, so that a unique mapping relationship among the service system, the internet of things management platform, and the money box may be established, and the fine management of the money box may be realized. The management platform of the internet of things can feed back the money box activation result to the money box. In some specific embodiments, the money box may be a money box that has been registered in the management platform of the internet of things, for example, when the money box is returned to a factory for maintenance, and the money box is called inside an organization, and the lock matched with the money box may be a lock that has been assigned with a lock identifier (for example, a lock ID) by the business system, and when the money box is managed by the business system again, the money box registration and activation need to be performed again for safety reasons, but the lock identifier may not need to be changed. Therefore, after the money box receives the activation result feedback, the lock interface can be automatically called to acquire the lock identification. One cash box can be matched with one or more locksets, and correspondingly, one or more lockset identifications can be obtained and a lockset list can be generated. Further, the money box can send the lock list to the business system through the internet of things management platform, and therefore connectivity of the lock and the business system is established. It can be understood that, in order to ensure acquisition of a lock list and prevent a failure of an automatic lock calling interface of a cash box, a business system may initiate a lock list acquisition request after successful activation of a device, the request may be sent to the cash box through an internet of things management platform, and the cash box may initiate a call to a lock.
In operation S620, the lock acquires first encrypted data from the service system based on the internet of things management platform to generate a first communication key and second encrypted data.
According to the embodiment of the disclosure, in order to separate the authority of the money box, the lock manufacturer and the service system, the manufacturer technology is used for unlocking, the safety of money box management is improved, a communication key and a working key are introduced in the process of generating the initial locking code, the working key is encrypted by using the communication key, and the working key is used as a generation factor of the locking code. The tool key can be written into the lockset encryption chip. The generation rule of the communication key can be simpler and is disposable so as to reduce the load of the computer.
In embodiments of the present disclosure, the encryption device may generate the first encrypted data based on a preset encryption algorithm, for example, an asymmetric encryption algorithm, and in some specific embodiments, the first encrypted data may include public key data including a signature. After the service system acquires the public key data containing the signature, the public key data containing the signature can be issued to the lockset through the internet of things management platform. The lockset can analyze the first encrypted data and generate a first communication key and second encrypted data based on the analyzed data. And analyzing the public key data containing the signature, wherein the analyzing comprises verifying the signature of the public key data containing the signature. Correspondingly, the analytic data can be public key data obtained after signature verification. The generating of the first communication key may include generating security data, such as a random number, that the lock generates based on a cryptographic technique and that can be used to communicate with the business system. The lockset can utilize a random number to generate a first communication key according to an agreed algorithm, wherein the agreed algorithm can be a common algorithm for generating the communication key agreed by a lockset manufacturer and an organization, and the same communication key can be generated at a lockset end and a business system end through the agreed algorithm so as to establish the connectivity of the lockset and the business system. The type of the contract algorithm may include a symmetric encryption algorithm, an asymmetric encryption algorithm, and a hash algorithm, and may be, for example, the cryptographic algorithms SM2, SM3, and SM 4. The second encrypted data may be data obtained by encrypting the security data by using the analysis data after the lock generates the security data that can be used for communicating with the service system based on a cryptographic technique. For example, the second encrypted data may be obtained by encrypting a random number generated by the lock with a public key obtained after the signature verification.
According to an embodiment of the present disclosure, when the lock list is empty, the method further includes: the business system automatically generates a lock identification. And the business system sends the lock identification and the first encrypted data to the lock together based on an Internet of things management platform. The lockset stores the lockset identification.
In the embodiment of the disclosure, when the money box and the lock matched with the money box are not registered in the internet of things management platform and are connected with the business system, the lock identification obtained by calling the lock interface by the money box can be null, so that an empty lock list is obtained. At this moment, a lock identification can be automatically generated by the business system, and the lock identification and the first encrypted data are jointly sent to the lock through the internet of things management platform. The lockset stores the lockset identification, for example, the lockset identification can be written into an encryption chip carried by the lockset to be used as the unique identification of the lockset.
In operation S630, the service system obtains second encrypted data from the lock based on the internet of things management platform.
In operation S640, the encryption device generates a second communication key and a lock operation key based on second encryption data from the service system, wherein the first communication key and the second communication key are the same.
According to the embodiment of the disclosure, after the business system acquires the second encrypted data from the lock based on the internet of things management platform, the business system can further generate a lock encryption factor based on the second encrypted data. The lock encryption factor can be stored for the business system and used as a calculation factor for generating the working key. In some specific embodiments, the lock encryption factor may include the second encrypted data, further may include a lock identifier, and further may include a security factor such as a current system timestamp. Further, the encryption device may generate a second communication key and a lock operation key based on the lock encryption factor from the business system. The algorithm of the second communication key is the same as that of the first communication key, and the generated first communication key is the same as that of the second communication key, so that the connectivity of the lockset and the service system can be established. For example, the encryption device may decrypt the second encrypted data to obtain the secure data, e.g., a random number, and then generate the second communication key based on the random number. Further, the encryption device may generate a lock operation key based on the lock identification in the lock encryption factor and a security factor (e.g., a timestamp). Based on the requirement of data storage overhead, the business system can save the lock encryption factor without saving the lock working key.
In operation S650, the encryption device encrypts the lock working key based on the second communication key, generates a working key ciphertext, and sends the working key ciphertext to the service system.
In operation S660, the lock acquires a work key ciphertext from the service system based on the internet of things management platform.
According to the embodiment of the disclosure, based on a preset algorithm, the second communication key is used for encrypting the lock working key to obtain a working key ciphertext so as to safely transmit the working key to the lock through the internet of things management platform.
In operation S670, the lock decrypts the work key ciphertext based on the first communication key, and generates an initial locking code.
According to the embodiment of the disclosure, after the lock receives the work key ciphertext, the ciphertext can be decrypted by the first communication key which is the same as the second communication key to obtain a plaintext work key, and the plaintext work key is written into the lock encryption chip for storage. The lockset can generate an initial locking code based on a preset encryption algorithm. After the initial locking code is generated, the lockset can also encrypt the initial locking code by using a working key based on a preset encryption algorithm, and the encrypted data of the initial locking code is transmitted back to a service system through the Internet of things management platform. Further, the service system may send the initial lock code encrypted data to the encryption device for decryption. Further, the service system can also save the initial locking code based on the decryption result for unlocking verification.
According to the embodiment of the disclosure, the lockset, the unlocking device and the money box can be accessed into the Internet of things management platform through a gateway. For example, the lock, the unlocking device and the money box can be accessed into the edge computing gateway device through the Zigbee module, and then accessed into the internet of things management platform through the edge computing gateway device, so as to form a link between the lock, the unlocking device and the money box and the internet of things management platform.
According to the money box management method provided by the embodiment of the disclosure, the active money box and the lock are managed by introducing the internet of things management platform in money box management, so that the key management difficulty is reduced, the authority is accurately controlled, the actual switching condition is mastered, the management effect is improved, and the risk management and control level is improved.
Based on the money box management method, the invention also provides a money box management system based on the Internet of things. The apparatus will be described in detail below with reference to fig. 7.
Fig. 7 schematically shows a block diagram of the construction of a money box management system according to an embodiment of the present disclosure.
As shown in fig. 7, the money box management system 700 of this embodiment includes a lock 710, a money box 720, a business system 730, an unlocking device 740, and an internet of things management platform 750.
The business system is configured to acquire requester identity information from the unlocking device based on an Internet of things management platform. And authenticating the identity information of the requester. And sending an identity authentication result to the unlocking device through the Internet of things management platform. And receiving an unlocking request from the unlocking device. And transmitting an unlocking factor based on the unlocking request.
The unlocking device is configured to send an unlocking request to the business system based on the Internet of things management platform when identity authentication is passed.
The lock configuration is configured to obtain the unlocking factor based on an internet of things management platform; and verifying the unlocking factor and realizing unlocking.
The lock is matched with the money box, and the Internet of things management platform is in communication connection with the business system, the lock and the unlocking device respectively; the lockset is also in communication connection with the unlocking device.
Fig. 8 schematically shows a block diagram of a cash box management system according to another embodiment of the present disclosure.
As shown in fig. 8, the money box management system 700 of this embodiment may further include an encryption apparatus 760.
Wherein the encryption device 760 is configured to receive unlocking security data from the business system and generate unlocking code ciphertext data based on the unlocking security data. And the encryption device is in communication connection with the service system.
Fig. 9 schematically shows a block diagram of a cash box management system according to another embodiment of the present disclosure.
As shown in fig. 9, the money box management system 700 of this embodiment may further include an identification device 770.
The identity recognition device 770 is configured to store administrator identity information in advance, and the administrator identity information is used for comparing with the applicant identity information to verify the applicant identity.
Fig. 10 schematically shows a block diagram of a cash box management system according to another embodiment of the present disclosure.
As shown in fig. 10, the money box management system 700 of this embodiment may also include a gateway 780.
Wherein the gateway 780 is configured to connect the lock, the unlocking device, and the money box to the internet of things management platform.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of methods and systems according to various embodiments of the present disclosure. It should be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that various combinations and/or combinations of features recited in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not expressly recited in the present disclosure. In particular, various combinations and/or combinations of the features recited in the various embodiments and/or claims of the present disclosure may be made without departing from the spirit or teaching of the present disclosure. All such combinations and/or associations are within the scope of the present disclosure.
The embodiments of the present disclosure have been described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described separately above, this does not mean that the measures in the embodiments cannot be used in advantageous combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be devised by those skilled in the art without departing from the scope of the present disclosure, and such alternatives and modifications are intended to be within the scope of the present disclosure.

Claims (14)

1. A money box management method based on the Internet of things is characterized by comprising the following steps:
the business system acquires identity information of a requester from the unlocking device based on the management platform of the Internet of things;
the service system authenticates the identity information of the requester;
the business system sends an identity authentication result to the unlocking device based on the Internet of things management platform;
when the identity authentication passes, the unlocking device sends an unlocking request to the service system based on the Internet of things management platform;
the business system generates an unlocking factor based on the unlocking request;
the lockset acquires the unlocking factor based on an Internet of things management platform;
the lock verifies the unlocking factor and realizes unlocking,
the lock is matched with the money box, and the Internet of things management platform is in communication connection with the business system, the lock and the unlocking device respectively; the unlocking device is also in communication connection with the lock.
2. The method of claim 1, wherein the business system authenticating the requestor identity information comprises:
the service system calls an identity recognition device, and the identity recognition device stores administrator identity information in advance; and
the service system compares the identity information of the requester with the identity information of the manager,
and the identity recognition device is in communication connection with the service system.
3. The method of claim 1, wherein the business system generating an unlocking factor based on the unlocking request comprises:
the business system judges whether unlocking authority is established or not based on the unlocking request, wherein the unlocking request comprises a lock identification;
if the unlocking authority is established, unlocking safety data are sent to an encryption device, wherein the unlocking safety data comprise the lock identification and a locking code corresponding to the lock identification;
the encryption device generates an unlocking code ciphertext based on the unlocking safety data; and
the business system acquires the unlocking code ciphertext and generates an unlocking factor based on the unlocking code ciphertext,
and the encryption device is in communication connection with the service system.
4. The method of claim 3, the lock verifying the unlocking factor and enabling unlocking comprising:
the lockset acquires unlocking factors from the business system based on the Internet of things management platform;
the lock verifies the unlocking factor based on the stored locking code and the lock identification;
and when the verification is successful, unlocking the lockset.
5. The method of claim 3, wherein the business system and the lockset store an initial lock code, the initial lock code generated by:
the business system acquires a lock list based on the Internet of things management platform, the lock list is matched with the money box, and the lock list comprises a lock identification corresponding to a lock;
the lockset acquires first encrypted data from the business system based on the Internet of things management platform to generate a first communication key and second encrypted data;
the business system acquires second encrypted data from the lock based on the Internet of things management platform;
the encryption device generates a second communication key and a lock working key based on second encrypted data from the service system, wherein the first communication key and the second communication key are the same;
the encryption device encrypts the lock working key based on the second communication key to generate a working key ciphertext and sends the working key ciphertext to the service system;
the lockset acquires a work key ciphertext from the business system based on the Internet of things management platform; and
the lockset decrypts the work key ciphertext based on the first communication key to generate an initial locking code,
the business system is respectively in communication connection with the encryption equipment and the Internet of things management platform, and the lock is in communication connection with the Internet of things management platform.
6. The method of claim 5, wherein the lock acquiring first encrypted data from the business system based on the IOT management platform to generate a first communication key and second encrypted data comprises:
the business system acquires first encrypted data from the encryption device, wherein the first encrypted data comprises public key data containing a signature;
the lockset acquires first encrypted data from the business system based on an Internet of things management platform;
the lockset analyzes the first encrypted data and generates the first communication key and the second encrypted data based on the analyzed data, wherein the analysis comprises signature verification of public key data containing a signature.
7. The method of claim 6, wherein the encryption device generating a second communication key and a lock operation key based on second encryption data from the business system comprises:
the business system acquires second encrypted data from the lock based on the Internet of things management platform;
the business system generates a lock encryption factor based on the second encryption data, wherein the lock encryption factor comprises the lock identification;
and the encryption device generates a second communication key and a lock working key based on the lock encryption factor from the business system.
8. The method of claim 5, wherein when the lock list is empty, the method further comprises:
the business system automatically generates a lock identification;
the business system sends the lock identification and the first encrypted data to the lock together based on an Internet of things management platform;
the lockset stores the lockset identification.
9. The method of claim 1, wherein after unlocking, the method further comprises:
the lockset updates a locking code and generates third encrypted data based on the locking code;
the business system acquires the third encrypted data from the lock based on the internet of things management platform; and
and the service system acquires and stores the updated locking code based on the third encrypted data.
10. The method according to any one of claims 1 to 9, wherein the lock, the unlocking device and the money box access the internet of things management platform through a gateway.
11. The utility model provides a money case management system based on thing networking which characterized in that includes:
a lockset, a money box, a business system, an unlocking device and an Internet of things management platform,
the service system is configured to acquire requester identity information from the unlocking device based on an Internet of things management platform; authenticating the identity information of the applicant; sending an identity authentication result to the unlocking device through the Internet of things management platform; receiving an unlocking request from the unlocking device; and transmitting an unlocking factor based on the unlocking request;
the unlocking device is configured to send an unlocking request to the service system based on the Internet of things management platform when identity authentication passes;
the lockset is configured to acquire the unlocking factor based on an Internet of things management platform; and verifying the unlocking factor and realizing unlocking,
the lock is matched with the money box, and the Internet of things management platform is in communication connection with the business system, the lock and the unlocking device respectively; the lockset is also in communication connection with the unlocking device.
12. A cash box management system according to claim 9, further comprising:
and the encryption device is configured to receive unlocking safety data from the business system and generate unlocking code ciphertext data based on the unlocking safety data, wherein the encryption device is in communication connection with the business system.
13. A cash box management system according to claim 10, further comprising:
the identity recognition device is configured to store administrator identity information in advance, and the administrator identity information is used for being compared with identity information of a requester to verify the identity of the requester.
14. A cash box management system according to claim 11, wherein the cash box management system further comprises:
and the gateway is configured to connect the lockset, the unlocking device and the money box into the Internet of things management platform.
CN202111487517.4A 2021-12-07 2021-12-07 Money box management method and system based on Internet of things Pending CN114170709A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111487517.4A CN114170709A (en) 2021-12-07 2021-12-07 Money box management method and system based on Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111487517.4A CN114170709A (en) 2021-12-07 2021-12-07 Money box management method and system based on Internet of things

Publications (1)

Publication Number Publication Date
CN114170709A true CN114170709A (en) 2022-03-11

Family

ID=80484075

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111487517.4A Pending CN114170709A (en) 2021-12-07 2021-12-07 Money box management method and system based on Internet of things

Country Status (1)

Country Link
CN (1) CN114170709A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117593817A (en) * 2024-01-18 2024-02-23 昆山佰奥智能装备股份有限公司 Switch control method and system of intelligent money box electronic lock

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104464048A (en) * 2014-11-14 2015-03-25 中国建设银行股份有限公司 Electronic coded lock unlocking method and electronic coded lock unlocking device
CN107038777A (en) * 2017-03-29 2017-08-11 云丁网络技术(北京)有限公司 A kind of safety communicating method and its intelligent door lock system based on intelligent door lock system
CN109801407A (en) * 2017-11-16 2019-05-24 珠海汇金科技股份有限公司 Unlocking control system, method, mobile terminal and the server of intelligent money case
CN110086864A (en) * 2019-04-23 2019-08-02 厦门中锐电力科技有限公司 A method of it is managed offline using lockset dual key
US20190333016A1 (en) * 2018-04-25 2019-10-31 Capital One Services, Llc Facilitating delivery of a product
CN112714059A (en) * 2020-12-24 2021-04-27 浪潮金融信息技术有限公司 Method, device and medium for controlling client-side coded lock based on WeChat public number
CN113506388A (en) * 2021-06-09 2021-10-15 广东纬德信息科技股份有限公司 Lockset safety control method and device and storage medium
CN113612605A (en) * 2021-08-02 2021-11-05 中电信量子科技有限公司 Method, system and equipment for enhancing MQTT protocol identity authentication by using symmetric cryptographic technology
CN113674456A (en) * 2021-08-19 2021-11-19 中国建设银行股份有限公司 Unlocking method, unlocking device, electronic equipment and storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104464048A (en) * 2014-11-14 2015-03-25 中国建设银行股份有限公司 Electronic coded lock unlocking method and electronic coded lock unlocking device
CN107038777A (en) * 2017-03-29 2017-08-11 云丁网络技术(北京)有限公司 A kind of safety communicating method and its intelligent door lock system based on intelligent door lock system
CN109801407A (en) * 2017-11-16 2019-05-24 珠海汇金科技股份有限公司 Unlocking control system, method, mobile terminal and the server of intelligent money case
US20190333016A1 (en) * 2018-04-25 2019-10-31 Capital One Services, Llc Facilitating delivery of a product
CN110086864A (en) * 2019-04-23 2019-08-02 厦门中锐电力科技有限公司 A method of it is managed offline using lockset dual key
CN112714059A (en) * 2020-12-24 2021-04-27 浪潮金融信息技术有限公司 Method, device and medium for controlling client-side coded lock based on WeChat public number
CN113506388A (en) * 2021-06-09 2021-10-15 广东纬德信息科技股份有限公司 Lockset safety control method and device and storage medium
CN113612605A (en) * 2021-08-02 2021-11-05 中电信量子科技有限公司 Method, system and equipment for enhancing MQTT protocol identity authentication by using symmetric cryptographic technology
CN113674456A (en) * 2021-08-19 2021-11-19 中国建设银行股份有限公司 Unlocking method, unlocking device, electronic equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117593817A (en) * 2024-01-18 2024-02-23 昆山佰奥智能装备股份有限公司 Switch control method and system of intelligent money box electronic lock

Similar Documents

Publication Publication Date Title
CN111478917B (en) Background system for providing network service for access control device and user terminal
US8171527B2 (en) Method and apparatus for securing unlock password generation and distribution
CN1323538C (en) A dynamic identity certification method and system
CN105847247A (en) Authentication system and working method thereof
CN104283688B (en) A kind of USBKey security certification systems and safety certifying method
US20100235638A1 (en) Identification and authentication of devices in a network
US9154304B1 (en) Using a token code to control access to data and applications in a mobile platform
CN102215221A (en) Methods and systems for secure remote wake, boot, and login to a computer from a mobile device
EP2579221A1 (en) Template delivery type cancelable biometric authentication system and method therefor
CN108809633B (en) Identity authentication method, device and system
CN108319857B (en) Trusted application locking and unlocking method and system
CN113674456B (en) Unlocking method, unlocking device, electronic equipment and storage medium
CN109035515A (en) The control method and door-locking system of smart lock
CN111243133A (en) Bluetooth door lock system based on dynamic password generation and matching and unlocking method
CN106357679B (en) Method, system and the client of cipher authentication, server and smart machine
CN106650372B (en) The activating method and device of administrator right
CN109587100A (en) A kind of cloud computing platform user authentication process method and system
WO2005107146A1 (en) Trusted signature with key access permissions
CN111415445A (en) Logistics box management method and device, computer equipment and storage medium
US20020018570A1 (en) System and method for secure comparison of a common secret of communicating devices
CN110635894B (en) Quantum key output method and system based on frame protocol format
US9602284B1 (en) Secure offline authentication
CN112966287A (en) Method, system, device and computer readable medium for acquiring user data
CN104753886B (en) It is a kind of to the locking method of remote user, unlocking method and device
CN107888376B (en) NFC authentication system based on quantum communication network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination