CN115171252A - BT and IOT based dynamic coded lock unlocking method and system - Google Patents

BT and IOT based dynamic coded lock unlocking method and system Download PDF

Info

Publication number
CN115171252A
CN115171252A CN202210803648.7A CN202210803648A CN115171252A CN 115171252 A CN115171252 A CN 115171252A CN 202210803648 A CN202210803648 A CN 202210803648A CN 115171252 A CN115171252 A CN 115171252A
Authority
CN
China
Prior art keywords
information
unlocking
lock
intelligent lock
dynamic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210803648.7A
Other languages
Chinese (zh)
Inventor
周桂洪
李天睿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GRG Banking Equipment Co Ltd
Original Assignee
GRG Banking Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GRG Banking Equipment Co Ltd filed Critical GRG Banking Equipment Co Ltd
Priority to CN202210803648.7A priority Critical patent/CN115171252A/en
Publication of CN115171252A publication Critical patent/CN115171252A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a dynamic coded lock unlocking method and a dynamic coded lock unlocking system based on BT and IOT, wherein the method comprises the steps of presetting unlocking permission information; the method comprises the steps of receiving an unlocking application sent by an intelligent lock and dynamic verification information related to the unlocking application, analyzing and compiling the dynamic verification information to obtain first identifier information, identity information and unlocking time information of the intelligent lock; and verifying according to the unlocking permission information, generating unlocking information after the verification is successful, sending the unlocking information to the intelligent lock, so that the intelligent lock analyzes the unlocking information, verifies the analyzed unlocking information according to the key of the intelligent lock, and executes unlocking action when the verification is successful. The invention realizes the direct interaction of the information codes between the intelligent lock and the server, and reduces the information interaction link in the unlocking process; moreover, the unlocking efficiency is improved; meanwhile, the operation cost of the lockset is saved.

Description

BT and IOT based dynamic coded lock unlocking method and system
Technical Field
The invention relates to the technical field of intelligent locks, in particular to a dynamic coded lock unlocking method and system based on BT and IOT, an electronic device and a medium.
Background
At present, a dynamic coded lock system generally comprises a lock disc, a lock body, an electronic lock management system (hereinafter, abbreviated as ELMS) and an SMS short message platform. The unlocking mode of the dynamic coded lock is as follows: the mobile phone is used as a medium, information interaction is carried out between the mobile phone and the ELMS system through sending and receiving short messages, and related dynamic passwords are input into the lock disc to realize unlocking and locking. In the traditional unlocking mode, information interaction comprises a personal code, a random code (namely a feature code), an unlocking code and a locking code.
Although the traditional unlocking mode can realize high safety, the following three defects are obviously existed: defect 1: the number of times of information interaction is large, interaction among various information codes needs to be realized by a third-party carrier (mobile phone), and certain information leakage risk exists; the defect 2 is that all the interactive passwords and the interactive information need to be manually input, so that the efficiency is low, input errors are easy to occur, and a punishment mechanism is triggered to take effect (if dynamic codes are continuously input by mistake, a lockset can automatically limit unlocking personnel to continue unlocking, and the unlocking personnel are allowed to unlock again after waiting for a corresponding specified time interval); defect 3: the locking system requires a matching SMS platform that requires annual payment to the local operator, adding to some extent to the operating costs.
Disclosure of Invention
In view of the above technical problems, an object of the present invention is to provide a BT and IOT based dynamic password lock unlocking method, system, electronic device, and medium, which solve the problems of multiple interaction times, low efficiency, and high cost in the conventional unlocking method.
The invention adopts the following technical scheme:
a dynamic coded lock unlocking method based on BT and IOT is applied to a server and comprises the following steps:
presetting unlocking permission information;
receiving an unlocking application sent by an intelligent lock and dynamic verification information associated with the unlocking application, and analyzing and compiling the dynamic verification information to obtain first identifier information, identity information and unlocking time information of the intelligent lock;
verifying the first identifier information, the identity information and the unlocking time information according to the unlocking permission information, generating unlocking information after the verification is successful, sending the unlocking information to the intelligent lock, so that the intelligent lock analyzes the unlocking information, verifies the analyzed unlocking information according to the key of the intelligent lock, and executes unlocking action when the verification is successful.
Preferably, the verifying the first identifier information, the identity information, and the unlocking time information according to the unlocking permission information includes:
the unlocking permission information comprises unlocking task information, unlocking plan information and unlocking authorization information; confirming whether the intelligent lock corresponding to the first identifier information stores unlocking task information, unlocking plan information and unlocking authorization information within the unlocking time; if yes, confirming whether the identity information is legal or not according to the unlocking authorization information; and if the user corresponding to the identity information is legal, whether the user has the unlocking authority of the intelligent lock corresponding to the first identifier information within the unlocking time is confirmed according to the unlocking task information, the unlocking plan information and the unlocking authorization information, and if the user has the unlocking authority of the intelligent lock corresponding to the first identifier information, the verification is judged to be passed.
Preferably, the verifying the first identifier information, the identity information, and the unlocking time information according to the unlocking permission information includes:
the unlocking permission information comprises second identifier information of the intelligent lock, and time range information and authorization information for allowing the intelligent lock to be unlocked; and verifying the first identifier information, the identity information and the unlocking time information by combining the second identifier information, and the time range information and the authorization information which allow the intelligent lock to be unlocked, and judging that the verification is passed when the first identifier information of the intelligent lock is confirmed to be correct according to the second identifier information, the identity information is confirmed to be legal according to the authorization information, and the unlocking time information is located in the time range.
Preferably, the dynamic verification information includes a dynamic random code, and the unlocking information includes a dynamic unlocking code for setting the time efficiency.
A BT and IOT based dynamic coded lock unlocking method is applied to an intelligent lock and comprises the following steps:
establishing connection with an intelligent terminal;
receiving identity information input by a user through an intelligent terminal, and generating dynamic verification information according to the identity information and first identifier information of the intelligent lock;
sending the dynamic verification information to a server, so that the server analyzes the dynamic verification information and compiles the dynamic verification information to obtain first identifier information, identity information and unlocking time information of the intelligent lock, and the server verifies the first identifier information, the identity information and the unlocking time information according to preset unlocking permission information;
receiving and analyzing unlocking information sent by the server after the verification is successful;
and verifying the analyzed unlocking information according to the key of the intelligent lock, and executing unlocking action when the verification is successful.
Preferably, after the step of performing the unlocking action when the verification is successful, the method further includes:
and executing locking action, generating dynamic locking information and sending the dynamic locking information to the server side so as to ensure that the server side confirms the dynamic locking information.
A dynamic coded lock unlocking system based on BT and IOT comprises an intelligent lock, a server and an intelligent terminal, wherein the intelligent lock is in communication connection with the server and the intelligent lock is in communication connection with the intelligent terminal;
the intelligent lock is used for establishing connection with an intelligent terminal; receiving identity information input by a user through an intelligent terminal, and generating dynamic verification information according to the identity information and first identifier information of the intelligent lock; sending the dynamic verification information to a server; receiving and analyzing unlocking information sent by the server after the verification is successful; verifying the analyzed unlocking information according to the key of the intelligent lock, and executing unlocking action when the verification is successful;
the intelligent terminal is used for presetting unlocking permission information, receiving an unlocking application sent by the intelligent lock and dynamic verification information associated with the unlocking application, and analyzing and compiling the dynamic verification information to obtain first identifier information, identity information and unlocking time information of the intelligent lock; and verifying the first identifier information, the identity information and the unlocking time information according to the unlocking permission information, and generating unlocking information and sending the unlocking information to the intelligent lock after the verification is successful.
Preferably, the intelligent lock comprises an intelligent lock body, an internet of things communication module and a Bluetooth module, the intelligent lock is in communication connection with the server side through the internet of things communication module, and the intelligent lock is in communication connection with the intelligent terminal through the Bluetooth module.
An electronic device, comprising: at least one processor, and a memory communicatively coupled to the at least one processor, wherein the memory stores instructions executable by the at least one processor, the instructions being executable by the at least one processor to enable the at least one processor to perform the BT and IOT based dynamic password lock unlocking method.
A computer storage medium having stored thereon a computer program which, when executed by a processor, implements the BT and IOT based dynamic combination lock unlocking method.
Compared with the prior art, the invention has the beneficial effects that:
the method comprises the steps that identity information input by a user through an intelligent terminal is received through an intelligent lock, and dynamic verification information is generated according to the identity information and first identifier information of the intelligent lock; the dynamic verification information is sent to the server side, the server side analyzes and compiles the dynamic verification information to obtain first identifier information, identity information and unlocking time information of the intelligent lock, and verifies the first identifier information, the identity information and the unlocking time information according to preset unlocking permission information, so that direct information code interaction between the intelligent lock and the server side (such as an ELMS system) is realized, information interaction links in an unlocking process are reduced, and for example, a link of generating personal codes in a traditional unlocking method is reduced; moreover, the intelligent lock performs unlocking after verifying the analyzed unlocking information according to the key of the intelligent lock after the verification is performed by the server, so that the complexity of manual input and input errors caused by manual input are avoided, and the unlocking efficiency is improved; meanwhile, the invention does not need to carry out information interaction with the handheld terminal through the short message platform, thereby saving the lease expense of the short message platform and the operation cost of the lockset.
Drawings
Fig. 1 is a schematic flowchart of a dynamic password lock unlocking method based on BT and IOT according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a dynamic password lock unlocking method based on BT and IOT according to an embodiment of the present invention;
fig. 3 is a schematic flowchart of a dynamic password lock unlocking method based on BT and IOT according to an embodiment of the present invention;
fig. 4 is a schematic diagram illustrating setting parameters of an internet of things communication module of a locker according to an embodiment of the present invention;
fig. 5 is a schematic diagram illustrating an ELMS system creating an unlocking task, an unlocking plan, or an unlocking authorization according to an embodiment of the present invention;
figure 6 shows a schematic view of an unlocking application provided by an embodiment of the present invention;
fig. 7 is a schematic diagram illustrating authentication of identity information according to an embodiment of the present invention;
fig. 8 is a schematic diagram illustrating a main interface of a handheld terminal unlocking application according to an embodiment of the present invention;
FIG. 9 illustrates a BT and IOT based dynamic combination lock unlocking system based on RFID and IOT of the present invention;
fig. 10 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
The present invention will be further described with reference to the accompanying drawings and specific embodiments, and it should be noted that, in the premise of no conflict, the following described embodiments or technical features may be arbitrarily combined to form a new embodiment:
the first embodiment is as follows:
referring to fig. 1 to 10, fig. 1 shows a BT and IOT based dynamic password lock unlocking method applied to a server, including the following steps:
step S1, presetting unlocking permission information;
in this embodiment, the unlocking permission information may specifically include unlocking task information, unlocking plan information, and unlocking authorization information, and the server may determine whether to permit an unlocking event of a specific unlocking person to a specific intelligent lock within a specific time through the unlocking permission information.
S2, receiving an unlocking application sent by the intelligent lock and dynamic verification information associated with the unlocking application, and analyzing and compiling the dynamic verification information to obtain first identifier information, identity information and unlocking time information of the intelligent lock;
in this embodiment, the first identifier information is lock information itself, such as lock ID, lock number, lock communication IP/port, and other necessary information.
In this embodiment, the identity information is identity information for authenticating a right, which is input by a user through an intelligent terminal, for example, information such as an input mailbox address and a password, a face image and a video acquired in face recognition, an employee job number and a password is input.
In this embodiment, the dynamic authentication information includes a dynamic random code. Specifically, the intelligent lock may encrypt the user's identity information and the lock's own information (such as lock ID, lock number, lock communication IP/port, and other necessary information) according to a preset password generation algorithm, so as to generate a dynamic Random Code.
And S3, verifying the first identifier information, the identity information and the unlocking time information according to the unlocking permission information, generating unlocking information after the verification is successful, sending the unlocking information to the intelligent lock, so that the intelligent lock analyzes the unlocking information, verifies the analyzed unlocking information according to the secret key of the intelligent lock, and executing unlocking action when the verification is successful.
In this embodiment, the unlocking information may be an unlocking code.
Preferably, the unlocking information includes a dynamic unlocking code for setting the time efficiency.
Preferably, in step S3, the verifying the first identifier information, the identity information, and the unlocking time information according to the unlocking permission information includes:
the unlocking permission information comprises unlocking task information, unlocking plan information and unlocking authorization information; confirming whether the intelligent lock corresponding to the first identifier information stores unlocking task information, unlocking plan information and unlocking authorization information within the unlocking time; if yes, confirming whether the identity information is legal or not according to the unlocking authorization information; and if the user corresponding to the identity information is legal, whether the user has the unlocking authority of the intelligent lock corresponding to the first identifier information within the unlocking time is confirmed according to the unlocking task information, the unlocking plan information and the unlocking authorization information, and if the user has the unlocking authority of the intelligent lock corresponding to the first identifier information, the verification is judged to be passed.
It should be noted that BT is shorthand for BlueTooth, also called BlueTooth; IOT, also known as the Internet of Things (IoT), is an information carrier of the Internet, traditional telecommunication networks, and the like.
As another embodiment, the step S3 of verifying the first identifier information, the identity information, and the unlocking time information according to the unlocking permission information includes:
the unlocking permission information comprises second identifier information of the intelligent lock, and time range information and authorization information for allowing the intelligent lock to be unlocked; and verifying the first identifier information, the identity information and the unlocking time information by combining the second identifier information, and the time range information and the authorization information which allow the intelligent lock to be unlocked, and judging that the verification is passed when the first identifier information of the intelligent lock is confirmed to be correct according to the second identifier information, the identity information is confirmed to be legal according to the authorization information, and the unlocking time information is located in the time range.
Referring to fig. 2, fig. 2 shows a BT and IOT based dynamic coded lock unlocking method according to another embodiment of the present invention, which is applied to an intelligent lock, and includes the following steps:
s11, establishing connection with an intelligent terminal;
s12, receiving identity information input by a user through an intelligent terminal, and generating dynamic verification information according to the identity information and first identifier information of the intelligent lock;
step S13, sending the dynamic verification information to a server side so that the server side can analyze and compile the dynamic verification information to obtain first identifier information, identity information and unlocking time information of the intelligent lock, and the server side can verify the first identifier information, the identity information and the unlocking time information according to preset unlocking permission information;
in this embodiment, the dynamic authentication information may be a random code.
S14, receiving and analyzing unlocking information sent by the server after the verification is successful;
and S15, verifying the analyzed unlocking information according to the secret key of the intelligent lock, and executing unlocking action when the verification is successful.
Preferably, after the step of performing the unlocking action when the verification is successful, the method further includes:
and S16, executing locking action, generating dynamic locking information and sending the dynamic locking information to the server so that the server confirms the dynamic locking information.
In the implementation process, the intelligent lock receives the identity information input by a user through the intelligent terminal, and generates dynamic verification information according to the identity information and the first identifier information of the intelligent lock; the dynamic verification information is sent to the server side, the server side analyzes and compiles the dynamic verification information to obtain first identifier information, identity information and unlocking time information of the intelligent lock, and verifies the first identifier information, the identity information and the unlocking time information according to preset unlocking permission information, so that direct information code interaction between the intelligent lock and the server side (such as an ELMS system) is realized, information interaction links in an unlocking process are reduced, and for example, a link of generating personal codes in a traditional unlocking method is reduced; moreover, the intelligent lock performs unlocking after verifying the analyzed unlocking information according to the key of the intelligent lock after the verification is performed by the server, so that the complexity of manual input and input errors caused by manual input are avoided, and the unlocking efficiency is improved; meanwhile, the invention does not need to carry out information interaction with the handheld terminal through a short message platform, thereby saving the lease expense of the short message platform and the operation cost for using the lockset.
The process according to the invention is illustrated below by means of specific examples:
as shown in fig. 3, fig. 3 is a schematic flowchart of a BT and IOT based dynamic coded lock unlocking method according to an embodiment of the present invention; in this embodiment, the server is an ELMS system, the intelligent terminal is a handheld terminal, and the intelligent lock may also be referred to as a lock.
Specifically, the method comprises the following steps:
(1) ELMS creates an unlocking task, an unlocking plan and unlocking authorization;
the ELMS of the system manager at the server side creates unlocking permission such as unlocking tasks, unlocking plans and unlocking authorization for related locks and unlocking personnel within a specific time.
(2) The lockset is matched with the handheld terminal through Bluetooth;
(3) Inputting and processing unlocking personnel identity information and an unlocking application;
(1) the unlocking personnel inputs identity information at the handheld terminal;
(2) after the identity information is input, after an unlocking person confirms the unlocking application, the identity information is automatically transmitted to the lockset by the handheld terminal in a Bluetooth mode;
(3) generating a Random Code (Random Code);
after receiving the user identity information transmitted by the handheld terminal, the lockset encrypts the user identity information and the lockset self information (such as ID, lock number, lockset communication IP/port and other necessary information) through a preset password generation algorithm of the lockset to generate a Random Code;
(4) application for unlocking
After the lockset generates a random code, the random code is automatically uploaded to an ELMS for unlocking application;
(4) Unlocking verification and unlocking codes;
after receiving an unlocking application from a lock end, the ELMS system decrypts and compiles a Random Code (Random Code) from the lock end by calling an internal password decryption algorithm (the compiled information is divided into three parts, namely lock information, user identity information and unlocking time) and performs the following processing:
(1) the ELMS system extracts the information of the lockset, and inquires, verifies and confirms whether the lockset has unlocking events of unlocking tasks, unlocking plans and unlocking authorization within the unlocking time range by combining the unlocking time;
if the lock is determined to be an illegal event, the ELMS directly rejects the unlocking application from the lock end, and if the lock is determined to be a legal event, the identity validity of the unlocking personnel is verified in the next step;
(2) the ELMS system extracts the user identity information, searches and confirms the legality of an unlocking applicant, and judges whether the unlocking applicant has unlocking permission or not;
if the unlocking event is an illegal unlocking person, the ELMS also refuses the unlocking application from the lock end, and if the unlocking event is a legal unlocking person, the relevance and the legality of the unlocking person to the unlocking event and the unlocking time are further verified;
(3) the ELMS system calls a built-in unlocking verification algorithm to verify the unlocking permission validity of a specific unlocking person to the unlocking event of the specific lock within a specific time.
If the verification result shows that the specific unlocking personnel does not have the unlocking permission for the specific lock in the specific time, the ELMS refuses the unlocking application from the lock end;
if the verification result shows that the specific unlocking person has the unlocking permission for the specific lock in the specific time, namely the unlocking person has the legality for the unlocking event, the ELMS calls a built-in encryption processing algorithm to generate a dynamic unlocking code (one-time combination code: OTC) with timeliness.
(5) Unlocking code processing;
the ELMS extracts the network communication address (IP and port) of the lock from the lock information from the lock end, and accurately sends the generated unlocking code (OTC) to the lock end according to the network communication address provided by the lock.
(6) Opening and locking treatment;
after receiving an unlocking code (OTC) from the ELMS, the lockset decrypts the unlocking code through a built-in decryption algorithm and matches a key, if the key matching verification is successful, the lockset is automatically unlocked, if the key matching fails, the lockset prompts illegal unlocking, and the unlocking process is stopped.
After the unlocking task is completed, the lockset can execute automatic lock falling, a dynamic locking code is generated through a built-in encryption algorithm, and the dynamic locking code is automatically transmitted back to the ELMS.
And the ELMS system decrypts and locks the locking code to confirm and ends the whole unlocking process.
In this embodiment, a method for opening and closing a coded lock is described by taking a single unlocking application with a "mailbox + mailbox password" as identification as a specific implementation case, and specifically includes:
1. setting parameters of an internet of things communication module arranged in the lockset;
specifically, when the lock is activated in the ELMS system, parameters of the internet of things communication module of the lock are set, please refer to fig. 4, where fig. 4 shows a schematic diagram of setting parameters of the internet of things communication module of the lock according to an embodiment of the present invention;
wherein, MAC is the physical address of the lock, and the set IP and port are the IP and port settings of the ELMS system server. The IP and the port of the ELMS are specified, so that the lock knows the system address of information interaction with the lock, the lock is limited to be in single communication with the ELMS, malicious network attack is avoided, and the safety of the lock is improved.
And the lock MAC address is set, so that the MAC addresses of all the dynamic coded locks activated on the ELMS are ensured to be different, and communication conflict is avoided.
2. The ELMS system creates an unlocking task, an unlocking plan, or an unlocking authorization.
Referring to fig. 5, fig. 5 is a schematic diagram illustrating an ELMS system creating an unlocking task, an unlocking plan, or an unlocking authorization according to an embodiment of the present invention;
the unlocking task, the unlocking plan or the unlocking authorization generally comprise information such as a lockset number to be unlocked, unlocking time, unlocking authorization personnel and the like.
3. The personnel of unblanking match handheld terminal and are connected with the Bluetooth of intelligence lock end.
4. And inputting unlocking personnel identity information and applying for unlocking.
As shown in fig. 6, fig. 6 is a schematic diagram illustrating an unlocking application provided by the specific embodiment of the present invention, where an unlocking person clicks an "unlocking identity information input" button of an unlocking interface at a handheld terminal to enter the unlocking person identity information input.
In this embodiment, the input identity authentication information is mailbox and password information, as shown in fig. 7, fig. 7 shows an identity information authentication schematic diagram provided in an embodiment of the present invention;
after the collection and input of the identity information of the unlocking personnel are finished, returning to the unlocking main interface according to 'confirmation', as shown in fig. 8, and fig. 8 shows a schematic view of the main interface of the unlocking application of the handheld terminal provided by the specific embodiment of the invention;
wherein, the person of unblanking clicks "application of unblanking" button, and handheld terminal will be transmitted the person's of unblanking information for the tool to lock through the Bluetooth mode, and the tool to lock transfers built-in encryption algorithm, carries out encryption processing to person's of unblanking information and tool to lock information (necessary information such as tool to lock ID, tool to lock IP), generates a dynamic random number.
After the dynamic random code is generated, the lockset automatically uploads the random code to an ELMS system through a network according to a preset server communication address to carry out unlocking application.
5. After receiving an unlocking application from a lock end, the ELMS system firstly calls a key decryption algorithm in the ELMS system to decrypt the lock information of the unlocking application, and then calls an unlocking verification algorithm to comprehensively verify and judge the legality of the unlocking event of the lock, the legality of the identity of an unlocking person and the legality of the unlocking event authority of the lock within a specific time.
If the unlocking application does not pass the unlocking verification, the ELMS system can judge that the unlocking application is illegal, automatically refuse the unlocking application and terminate the unlocking application process;
if the unlocking application passes the unlocking verification, the ELMS system calls a secret key encryption algorithm to generate a dynamic unlocking code (namely, a one-time combination code: OTC) for the unlocking application and automatically sends the unlocking code to the lockset.
Then, the lock calls a built-in key decryption algorithm to decrypt, match and verify the unlocking code, if the verification result is legal, the lock is automatically opened, and if the verification result is illegal, the unlocking program is terminated.
After the unlocking task is finished, the unlocking personnel closes the safe door, the dynamic coded lock automatically executes locking, a dynamic locking code is generated, and the locking code is uploaded to the ELMS.
After the ELMS system receives the locking code, the locking code is automatically confirmed, and the locking process is unlocked at a fast speed.
The second embodiment:
referring to fig. 9, fig. 9 shows a dynamic coded lock unlocking system based on BT and IOT, which includes an intelligent lock, a server and an intelligent terminal, where the intelligent lock is in communication connection with the server, and the intelligent lock is in communication connection with the intelligent terminal;
the intelligent lock is used for establishing connection with an intelligent terminal; receiving identity information input by a user through an intelligent terminal, and generating dynamic verification information according to the identity information and first identifier information of the intelligent lock; sending the dynamic verification information to a server; receiving and analyzing unlocking information sent by the server after the verification is successful; verifying the analyzed unlocking information according to the key of the intelligent lock, and executing unlocking action when the verification is successful;
the intelligent terminal is used for presetting unlocking permission information, receiving an unlocking application sent by the intelligent lock and dynamic verification information associated with the unlocking application, and analyzing and compiling the dynamic verification information to obtain first identifier information, identity information and unlocking time information of the intelligent lock; and verifying the first identifier information, the identity information and the unlocking time information according to the unlocking permission information, and generating unlocking information and sending the unlocking information to the intelligent lock after the verification is successful.
Preferably, the intelligent lock includes intelligent lock body, thing communication network module and bluetooth module, the intelligent lock pass through thing communication network module with server communication connection, the intelligent lock pass through bluetooth module with intelligent terminal communication connection.
In particular, the intelligent lock comprises a lock disc and a lock body. And (4) a handheld terminal (with Bluetooth function). In the implementation process, the direct interconnection communication between the lockset and the ELMS system is realized by integrating the Internet of things communication module on the lockset; through integrated Bluetooth module on the tool to lock, realize the tool to lock and hand-held terminal Bluetooth and be connected.
In this embodiment, before the dynamic password lock is formally used online, parameters of the communication module of the internet of things of the dynamic password lock must be set (for example, MAC information of the lock, a server communication address to which the lock needs to access, that is, an IP and a port of the ELMS system).
Example three:
fig. 10 is a schematic structural diagram of an electronic device according to an embodiment of the present application, and in the present application, an electronic device 100 for implementing an RFID and IOT based dynamic password lock unlocking method according to the present invention according to an embodiment of the present application can be described by using the schematic diagram shown in fig. 10.
As shown in fig. 10, an electronic device 100 includes one or more processors 102, one or more memory devices 104, and the like, which are interconnected via a bus system and/or other type of connection mechanism (not shown). It should be noted that the components and structure of the electronic device 100 shown in fig. 10 are only exemplary and not restrictive, and the electronic device may have some of the components shown in fig. 10 and may have other components and structures not shown in fig. 10 as needed.
The processor 102 may be a Central Processing Unit (CPU) or other form of processing unit having data processing capabilities and/or instruction execution capabilities, and may control other components in the electronic device 100 to perform desired functions.
The storage 104 may include one or more computer program products that may include various forms of computer-readable storage media, such as volatile memory and/or non-volatile memory. The volatile memory may include, for example, random Access Memory (RAM), cache memory (cache), and/or the like. The non-volatile memory may include, for example, read Only Memory (ROM), hard disk, flash memory, etc. On which one or more computer program instructions may be stored that may be executed by processor 102 to implement the functions of the embodiments of the application (as implemented by the processor) described below and/or other desired functions. Various applications and various data, such as various data used and/or generated by the applications, may also be stored in the computer-readable storage medium.
The invention also provides a computer storage medium on which a computer program is stored, in which the method of the invention, if implemented in the form of software functional units and sold or used as a stand-alone product, can be stored. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer storage medium and used by a processor to implement the steps of the embodiments of the method. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer storage medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, read-Only Memory (ROM), random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer storage media may include content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer storage media that does not include electrical carrier signals and telecommunications signals as subject to legislation and patent practice.
Various other modifications and changes may occur to those skilled in the art based on the foregoing teachings and concepts, and all such modifications and changes are intended to be included within the scope of the appended claims.

Claims (10)

1. A BT and IOT based dynamic coded lock unlocking method is characterized in that the BT and IOT based dynamic coded lock unlocking method is applied to a server and comprises the following steps:
presetting unlocking permission information;
receiving an unlocking application sent by an intelligent lock and dynamic verification information associated with the unlocking application, and analyzing and compiling the dynamic verification information to obtain first identifier information, identity information and unlocking time information of the intelligent lock;
verifying the first identifier information, the identity information and the unlocking time information according to the unlocking permission information, generating unlocking information after the verification is successful, sending the unlocking information to the intelligent lock, so that the intelligent lock analyzes the unlocking information, verifies the analyzed unlocking information according to the key of the intelligent lock, and executes unlocking action when the verification is successful.
2. The BT and IOT based dynamic password lock unlocking method according to claim 1, wherein the verifying the first identifier information, the identity information, and the unlocking time information according to the unlocking permission information comprises:
the unlocking permission information comprises unlocking task information, unlocking plan information and unlocking authorization information; confirming whether the intelligent lock corresponding to the first identifier information stores unlocking task information, unlocking plan information and unlocking authorization information within the unlocking time; if yes, confirming whether the identity information is legal or not according to the unlocking authorization information; and if the intelligent lock is legal, confirming whether the user corresponding to the identity information has the unlocking authority of the intelligent lock corresponding to the first identifier information within the unlocking time according to the unlocking task information, the unlocking plan information and the unlocking authorization information, and if so, judging that the verification is passed.
3. The BT and IOT based dynamic password lock unlocking method according to claim 1, wherein the verifying the first identifier information, the identity information, and the unlocking time information according to the unlocking permission information comprises:
the unlocking permission information comprises second identifier information of the intelligent lock, and time range information and authorization information for allowing the intelligent lock to be unlocked; and verifying the first identifier information, the identity information and the unlocking time information by combining the second identifier information, and the time range information and the authorization information which allow the intelligent lock to be unlocked, and judging that the verification is passed when the first identifier information of the intelligent lock is confirmed to be correct according to the second identifier information, the identity information is confirmed to be legal according to the authorization information, and the unlocking time information is located in the time range.
4. The BT and IOT based dynamic coded lock unlocking method of claim 1, wherein the dynamic verification information comprises a dynamic random code, and the unlocking information comprises a dynamic unlocking code for setting a time period.
5. A BT and IOT based dynamic coded lock unlocking method is characterized in that the BT and IOT based dynamic coded lock unlocking method is applied to an intelligent lock and comprises the following steps:
establishing connection with an intelligent terminal;
receiving identity information input by a user through an intelligent terminal, and generating dynamic verification information according to the identity information and first identifier information of the intelligent lock;
sending the dynamic verification information to a server, so that the server analyzes the dynamic verification information and compiles the dynamic verification information to obtain first identifier information, identity information and unlocking time information of the intelligent lock, and the server verifies the first identifier information, the identity information and the unlocking time information according to preset unlocking permission information;
receiving and analyzing unlocking information sent by the server after the verification is successful;
and verifying the analyzed unlocking information according to the key of the intelligent lock, and executing unlocking action when the verification is successful.
6. The BT and IOT based dynamic coded lock unlocking method according to claim 5, wherein after the step of performing the unlocking action when the verification is successful, the method further comprises:
and executing locking action, generating dynamic locking information and sending the dynamic locking information to the server side so as to ensure that the server side confirms the dynamic locking information.
7. The dynamic coded lock unlocking system based on BT and IOT is characterized by comprising an intelligent lock, a server and an intelligent terminal, wherein the intelligent lock is in communication connection with the server and the intelligent lock is in communication connection with the intelligent terminal;
the intelligent lock is used for establishing connection with an intelligent terminal; receiving identity information input by a user through an intelligent terminal, and generating dynamic verification information according to the identity information and first identifier information of the intelligent lock; sending the dynamic verification information to a server; receiving and analyzing unlocking information sent by the server after the verification is successful; verifying the analyzed unlocking information according to the key of the intelligent lock, and executing unlocking action when the verification is successful;
the intelligent terminal is used for presetting unlocking permission information, receiving an unlocking application sent by the intelligent lock and dynamic verification information associated with the unlocking application, and analyzing and compiling the dynamic verification information to obtain first identifier information, identity information and unlocking time information of the intelligent lock; and verifying the first identifier information, the identity information and the unlocking time information according to the unlocking permission information, and generating unlocking information and sending the unlocking information to the intelligent lock after the verification is successful.
8. The BT and IOT based dynamic coded lock unlocking system of claim 7, wherein the intelligent lock comprises an intelligent lock body, an Internet of things communication module and a Bluetooth module, the intelligent lock is in communication connection with the server through the Internet of things communication module, and the intelligent lock is in communication connection with the intelligent terminal through the Bluetooth module.
9. An electronic device, comprising: at least one processor, and a memory communicatively coupled to the at least one processor, wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the BT and IOT based dynamic cryptographic lock unlocking method of any of claims 1-6.
10. A computer storage medium having a computer program stored thereon, wherein the computer program, when executed by a processor, implements the BT and IOT based dynamic combination lock unlocking method of any of claims 1-6.
CN202210803648.7A 2022-07-07 2022-07-07 BT and IOT based dynamic coded lock unlocking method and system Pending CN115171252A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210803648.7A CN115171252A (en) 2022-07-07 2022-07-07 BT and IOT based dynamic coded lock unlocking method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210803648.7A CN115171252A (en) 2022-07-07 2022-07-07 BT and IOT based dynamic coded lock unlocking method and system

Publications (1)

Publication Number Publication Date
CN115171252A true CN115171252A (en) 2022-10-11

Family

ID=83493345

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210803648.7A Pending CN115171252A (en) 2022-07-07 2022-07-07 BT and IOT based dynamic coded lock unlocking method and system

Country Status (1)

Country Link
CN (1) CN115171252A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103971435A (en) * 2014-05-22 2014-08-06 广东欧珀移动通信有限公司 Unlocking method, server, mobile terminal, electronic lock and unlocking system
CN109785477A (en) * 2018-12-13 2019-05-21 深圳市海云天科技股份有限公司 A kind of method for unlocking and intelligent secrecy box of intelligence secrecy box
CN112002043A (en) * 2020-09-03 2020-11-27 云南电网有限责任公司信息中心 Intelligent lock control method and system based on NB-IOT
CN113140056A (en) * 2020-12-28 2021-07-20 上海安威士科技股份有限公司 Intelligent lock management system for wireless communication
CN113808305A (en) * 2021-09-02 2021-12-17 广州广电运通金融电子股份有限公司 Coded lock system, coded lock opening and closing method and storage medium
CN114550353A (en) * 2022-02-24 2022-05-27 广东电网有限责任公司 Intelligent lock control system of transformer substation

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103971435A (en) * 2014-05-22 2014-08-06 广东欧珀移动通信有限公司 Unlocking method, server, mobile terminal, electronic lock and unlocking system
CN109785477A (en) * 2018-12-13 2019-05-21 深圳市海云天科技股份有限公司 A kind of method for unlocking and intelligent secrecy box of intelligence secrecy box
CN112002043A (en) * 2020-09-03 2020-11-27 云南电网有限责任公司信息中心 Intelligent lock control method and system based on NB-IOT
CN113140056A (en) * 2020-12-28 2021-07-20 上海安威士科技股份有限公司 Intelligent lock management system for wireless communication
CN113808305A (en) * 2021-09-02 2021-12-17 广州广电运通金融电子股份有限公司 Coded lock system, coded lock opening and closing method and storage medium
CN114550353A (en) * 2022-02-24 2022-05-27 广东电网有限责任公司 Intelligent lock control system of transformer substation

Similar Documents

Publication Publication Date Title
CN107113315B (en) Identity authentication method, terminal and server
EP3723399A1 (en) Identity verification method and apparatus
CN108834144B (en) Method and system for managing association of operator number and account
US8683562B2 (en) Secure authentication using one-time passwords
CN110232568B (en) Mobile payment method, mobile payment device, computer equipment and readable storage medium
CN1323538C (en) A dynamic identity certification method and system
TW201741922A (en) Biological feature based safety certification method and device
US9055061B2 (en) Process of authentication for an access to a web site
WO2022105462A1 (en) Database multi-authentication method and system, terminal, and storage medium
CN109344588A (en) Safety certifying method and terminal device
CN106936588A (en) A kind of trustship method, the apparatus and system of hardware controls lock
CN113242238B (en) Secure communication method, device and system
CN113591057B (en) Biological characteristic off-line identity recognition method and system
CN107733636A (en) Authentication method and Verification System
CN109462572B (en) Multi-factor authentication method, system, storage medium and security gateway based on encryption card and UsbKey
WO2016070611A1 (en) Method for processing data, server and terminal
CN108768941B (en) Method and device for remotely unlocking safety equipment
CN112862487A (en) Digital certificate authentication method, equipment and storage medium
CN115527292A (en) Mobile phone terminal remote vehicle unlocking method of security chip and security chip device
CN1786864A (en) Method for safety identification of computer
US20230262045A1 (en) Secure management of a robotic process automation environment
CN113285809A (en) Continuous signature method and system based on electronic signature middleware
CN113205342A (en) User identity authentication method and device based on multi-terminal payment
CN115171252A (en) BT and IOT based dynamic coded lock unlocking method and system
CN115171245A (en) HCE-based door lock security authentication method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination