CN115471939B - IC card automatic encryption adding method, access control equipment and readable medium - Google Patents

IC card automatic encryption adding method, access control equipment and readable medium Download PDF

Info

Publication number
CN115471939B
CN115471939B CN202211054517.XA CN202211054517A CN115471939B CN 115471939 B CN115471939 B CN 115471939B CN 202211054517 A CN202211054517 A CN 202211054517A CN 115471939 B CN115471939 B CN 115471939B
Authority
CN
China
Prior art keywords
card
access control
encryption
secret key
control equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211054517.XA
Other languages
Chinese (zh)
Other versions
CN115471939A (en
Inventor
王妙玉
张志华
周亮
李昌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Hotata Smart Home Co Ltd
Original Assignee
Guangdong Hotata Smart Home Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Hotata Smart Home Co Ltd filed Critical Guangdong Hotata Smart Home Co Ltd
Priority to CN202211054517.XA priority Critical patent/CN115471939B/en
Publication of CN115471939A publication Critical patent/CN115471939A/en
Application granted granted Critical
Publication of CN115471939B publication Critical patent/CN115471939B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/215Individual registration on entry or exit involving the use of a pass the system having a variable access-code, e.g. varied as a function of time

Abstract

The invention relates to the field of data processing, in particular to an automatic encryption adding method for an IC card, access control equipment and a readable medium. An automatic encryption adding method of an IC card is applied to access control equipment and comprises the following steps: acquiring basic parameters of the IC card in response to the attaching operation of the IC card; and checking the IC card by using the first secret key, if the checking is successful, writing the second secret key into an encryption sector of the IC card, storing the basic parameters in access control equipment, and determining the door opening authority of the IC card. The entrance guard equipment responds to the close IC card, directly acquires the basic parameters of the IC card, and simultaneously uses the first secret key to check the IC card, under the condition of successful check, writes the second secret key into the encryption sector of the IC card, and simultaneously stores the basic parameters of the IC card in the entrance guard equipment for data backup, thereby completing the addition work of the IC card, greatly simplifying the card encryption operation flow of the intelligent lock, and ensuring that the addition is successful, namely the encryption is successful without independently developing a card writer, thereby being convenient and quick.

Description

IC card automatic encryption adding method, access control equipment and readable medium
Technical Field
The invention relates to the field of data processing, in particular to an automatic encryption adding method for an IC card, access control equipment and a readable medium.
Background
Along with technological progress, entrance guard equipment such as intelligent lock walks into everyone, and the safety precaution becomes an important social problem at this moment at present, and in current access control system, the IC card need carry out the read-write operation through the card reader earlier, and the card reader is in writing into the IC card with the password, and the IC card just can use afterwards. That is, before the IC card is used, the IC card can be used after the reading and writing operations are performed through the card reader, so that the operation is complicated, and the IC card is not beneficial to users.
Disclosure of Invention
In view of the above-mentioned shortcomings of the prior art, an object of the present invention is to provide an automatic encryption adding method for an IC card, an access control device, and a readable medium, which can automatically encrypt the IC card while adding the IC card, and improve user experience.
In order to achieve the above purpose, the invention adopts the following technical scheme:
in one aspect, the invention provides an automatic encryption adding method for an IC card, which is applied to access control equipment and comprises the following steps:
acquiring basic parameters of the IC card in response to the attaching operation of the IC card; the basic parameters are identification data of the IC card;
and checking the IC card by using the first secret key, if the checking is successful, writing the second secret key into an encryption sector of the IC card, storing the basic parameters in access control equipment, and determining the door opening authority of the IC card.
Further, the method further comprises the following steps:
and if the verification by using the first secret key fails, verifying the IC card by using a second secret key, and if the verification is successful, storing the basic parameters in access control equipment, and determining the door opening authority of the IC card.
Further, the storing the basic parameter in the access control device includes:
and encrypting the basic parameters by using a first encryption algorithm to generate ciphertext parameters and storing the ciphertext parameters.
Further, the attaching operation is as follows:
the distance between the first sensing area of the IC card and the second sensing area of the access control equipment is smaller than a preset distance.
Further, before the attaching operation in response to the IC card, the method further includes:
the method comprises the steps that network distribution operation is conducted on access control equipment through a mobile terminal, so that data interaction is conducted between the access control equipment and a server;
and driving the access control equipment to execute a card input function through a preset instruction of the server or the mobile terminal.
Further, before writing the second key to the encrypted sector, the method further includes:
detecting whether an encryption sector exists in the IC card, and if not, constructing the encryption sector by using a preset mode.
In another aspect, the present invention further provides an access control device, including:
the first interaction module is used for responding to the attaching operation of the IC card, acquiring basic parameters of the IC card and writing data into the IC card;
and the processing module is used for checking the IC card by using the first secret key, if the checking is successful, the first interaction module is driven to write the second secret key into the encryption sector, the basic parameters are stored in the access control equipment, and the door opening authority of the IC card is determined.
Further, the method further comprises the following steps:
the unlocking module is connected with the first interaction module and is used for verifying the IC card by using a second secret key; wherein,
if the verification is passed, unlocking operation is executed under the condition that the basic parameters of the IC card are stored in the access control equipment;
if the verification is not passed, prompting verification failure information.
In another aspect, the present invention provides an access control device, including:
a memory storing a computer program;
and the processor is used for realizing any one of the automatic encryption adding methods of the IC card when executing the computer program.
In another aspect, the present invention provides a computer-readable medium storing a computer program which, when executed by a processor, implements any one of the aforementioned IC card automatic encryption adding methods.
Compared with the prior art, the IC card automatic encryption adding method, the access control equipment and the readable medium provided by the invention have the following beneficial effects:
the method for automatically encrypting and adding the IC card provided by the invention has the advantages that the entrance guard equipment responds to the close IC card, the basic parameters of the IC card are directly obtained, the first secret key is used for checking the IC card, the second secret key is written into the encryption sector of the IC card under the condition of successful checking, the basic parameters of the IC card are stored in the entrance guard equipment for data backup, the addition work of the IC card is completed, the card encryption operation flow of the intelligent lock is greatly simplified, the automatic encryption aiming at the IC card in the process of adding the IC card is realized, the successful addition is the successful encryption without independently developing a card writer, and the method is convenient and quick.
Drawings
Fig. 1 is a flowchart of an IC card automatic encryption adding method provided by the present invention.
Fig. 2 is a block diagram of the structure of the access control device provided by the invention.
Detailed Description
In order to make the objects, technical solutions and effects of the present invention clearer and more specific, the present invention will be described in further detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
Those of ordinary skill in the art will realize that the foregoing general description and the following detailed description are illustrative of specific embodiments of the present invention and are not intended to be limiting.
The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process or method that comprises a list of steps does not include only those steps, but may include other steps not expressly listed or inherent to such process or method. Likewise, without further limitations, one or more devices or subsystems beginning with "comprising". A "neither does an element or structure or component have no further limitations, excluding the presence of other devices or other subsystems or other elements or other structures or other components or other devices or other subsystems or other elements or other structures or other components. The appearances of the phrases "in one embodiment," "in another embodiment," and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.
Referring to fig. 1, the invention provides an automatic encryption adding method of an IC card, which is applied to access control equipment, wherein the access control equipment is preferably an intelligent lock, and the intelligent lock comprises a human body infrared sensor module, a full-automatic lock body, a WiFi module and an IC card encryption module. The IC card automatic encryption adding method is mainly applied to an IC card encryption module. In addition, in practical application, a server and a mobile terminal are also used in the automatic encryption adding method, a management platform is constructed, and a user can intuitively manage the intelligent lock conveniently, wherein the server is preferably an IOT cloud platform, and the mobile terminal is preferably a mobile phone.
Wherein, the human body infrared sensor module is used for detecting human body pyroelectric infrared signals in an action zone; the human body infrared sensor senses the wavelength (about 8-12 nm) of the human body infrared pyroelectric signal, and when the human body approaches to the sensor action area, the infrared sensor module responds to the signal to master the intelligent lock, so that the human body detection function is realized. The infrared sensor module does not respond when objects other than a person approach the sensor action area.
The full-automatic lock body realizes real-time detection of the states of opening/closing door, inclined tongue, square tongue, lock core and the like.
The WiFi module is used for realizing intelligent lock networking and uploading the intelligent lock end data detected in real time to the IOT platform or carrying out close-range interaction with the mobile equipment through WiFi.
The IOT cloud platform is used for carrying out user registration management and other system setting on the intelligent lock and carrying out data association management on the whole system.
The mobile phone is used for carrying out network distribution operation on the WIFI module, carrying out data linkage through or without the IOT platform, and monitoring intelligent lock end state information through the IOT platform.
The automatic encryption adding method of the IC card comprises the following steps:
acquiring basic parameters of the IC card in response to the attaching operation of the IC card; the basic parameters are identification data of the IC card; the basic parameters include a card number or a custom identifier.
And checking the IC card by using the first secret key, if the checking is successful, writing the second secret key into the encryption sector, storing the basic parameters in the access control equipment, and determining the door opening authority of the IC card. Preferably, in the present embodiment, the verification of the IC card refers to verification of an encrypted sector of the IC card.
In particular, the first key is preferably an initial key for a blank IC card, for example in the form of xFF xff\xff initial key. The method for checking the first secret key of the IC card is not limited by the invention, and a person skilled in the art can check the IC card by using a corresponding checking mode according to actual requirements, wherein the preferred checking mode is to acquire the data of the encrypted sector, if the data in the encrypted sector accords with the format or rule of the initial secret key, the check is judged to be successful, otherwise, the check is failed.
Further, if the verification of the IC card by using the first secret key fails, a prompt is sent out by a pair method to remind that the card is not a blank card, so that a user can conveniently and quickly determine the card type.
In this embodiment, a person skilled in the art may select an appropriate encryption mode according to actual needs to encrypt an encryption sector of a blank IC card using an initial key (a first key), and may encrypt the encryption sector using a second key (a user private key) based on the same or different encryption modes.
The method for automatically encrypting and adding the IC card provided by the invention has the advantages that the entrance guard equipment responds to the close IC card, the basic parameters of the IC card are directly obtained, the first secret key is used for checking the IC card, the second secret key is written into the encryption sector of the IC card under the condition of successful checking, the basic parameters of the IC card are stored in the entrance guard equipment for data backup, the addition work of the IC card is completed, the card encryption operation flow of the intelligent lock is greatly simplified, the automatic encryption aiming at the IC card in the process of adding the IC card is realized, the successful addition is the successful encryption without independently developing a card writer, and the method is convenient and quick.
Further, as a preferred solution, the present embodiment further includes:
and if the verification by using the first secret key fails, verifying the IC card by using a second secret key, and if the verification is successful, storing the basic parameters in access control equipment, and determining the door opening authority of the IC card. In this embodiment, if the first key is used to verify that the IC card cannot be successfully verified, the IC card is either an invalid card or encrypted by other access control devices under the user, so that a secondary judgment is required, that is, verification is performed by using the second key, if the second key is used, it means that the IC card is encrypted, and at this time, the adding work can be completed by only storing the basic parameters of the IC card in the access control device, and it is ensured that the added IC card is encrypted. If the IC card cannot be successfully verified by using the second secret key, the card is an invalid card, and a prompt is sent out.
Further, in this embodiment, the storing the basic parameter in the access control device includes:
the basic parameters are encrypted by using a first encryption algorithm to generate ciphertext parameters and stored (in the access control equipment). Specifically, the first encryption algorithm comprises a symmetric encryption algorithm, an asymmetric encryption algorithm and a Hash encryption algorithm. When the method is used, the ciphertext parameters can be decrypted for use, namely, the basic parameters stored in the access control equipment are encrypted, so that the data security is further improved.
Further, in this embodiment, the attaching operation is as follows:
the distance between the first sensing area of the IC card and the second sensing area of the access control equipment is smaller than a preset distance. Specifically, the first induction area of the IC card is a corresponding position of an interaction unit in the IC card, and the interaction unit is preferably a near-distance interaction device such as NFC and RFID. The second sensing area of the access control device corresponds to the position of the first interaction module of the access control device, and the first interaction module preferably adopts a device corresponding to the interaction unit. The predetermined distance is preferably 0 to 2 cm, and more preferably 0.3 cm. It is possible to ensure that the automatic encryption adding method of the IC card is performed after the IC card is attached.
Further, in this embodiment, before the attaching operation in response to the IC card, the method further includes:
the method comprises the steps that network distribution operation is conducted on access control equipment through a mobile terminal, so that data interaction is conducted between the access control equipment and a server;
and driving the access control equipment to execute a card input function through a preset instruction of the server or the mobile terminal. In a specific operation process, firstly, a user performs network distribution on the WIFI module through the APP on the mobile terminal (the network distribution process is not limited, a network distribution method commonly used in the field is adopted), after the network distribution is successful, the access control equipment can perform data interaction with the IOT platform, at the moment, detected equipment data can be uploaded to the IOT platform, meanwhile, a driving instruction sent by the IOT platform can be received, for example, the mobile terminal sends a card input function instruction to the access control equipment through the IOT platform, and then the access control equipment enters a card input interface under the condition that the instruction is received.
Further, as a preferred solution, the present embodiment further includes, before writing the second key into the encrypted sector of the IC card:
detecting whether an encryption sector exists in the IC card, if so, writing the second key into the encryption sector; if not, the encrypted sector is constructed using a predetermined scheme. That is, in the present embodiment, the configuration may be made such that the IC card has an encrypted sector, without the encrypted sector in the IC card.
In addition, in the present embodiment, the encrypted sector in the IC card needs to be structured in a predetermined manner in advance, for example, a part of the sector of the memory is locked using an encryption algorithm, and data can be read and written in the part of the sector only by providing the correct key.
Correspondingly, referring to fig. 2, the invention further provides an access control device, which comprises:
the first interaction module is used for responding to the attaching operation of the IC card, acquiring basic parameters of the IC card and writing data into the IC card; specifically, the first interaction module is a device corresponding to a data interaction mode of the IC card, for example, a Near Field Communication (NFC) mode, an RFID tag mode, and the like.
And the processing module is used for checking the IC card by using the first secret key, if the checking is successful, the first interaction module is driven to write the second secret key into the encryption sector, the basic parameters are stored in the access control equipment, and the door opening authority of the IC card is determined.
Further, in this embodiment, the processing module is further configured to:
and if the verification by using the first secret key fails, verifying the IC card by using a second secret key, and if the verification is successful, storing the basic parameters in access control equipment, and determining the door opening authority of the IC card.
Further, as a preferred solution, the present embodiment further includes:
the second interaction module is used for carrying out network allocation operation through the mobile terminal and realizing data interaction with the server after the network allocation is successful; and responding to a preset instruction of the mobile terminal or the server side, and executing a card input function. Specifically, the second interaction module is mainly used for networking access control equipment, namely, the second interaction module is preferably a WiFi module or a GPRS module.
Further, as a preferred solution, the present embodiment further includes:
the unlocking module is connected with the first interaction module and is used for verifying the IC card by using a second secret key; wherein,
if the verification is passed, unlocking operation is executed under the condition that the basic parameters of the IC card are stored in the access control equipment; under the condition that the basic parameters of the corresponding IC card are not stored in the access control equipment, unlocking operation is not executed, and early warning information is sent outwards to prompt a user to input the IC card into the access control equipment so that the access control equipment can be normally used.
If the verification is not passed, prompting verification failure information. Of course, in the access control equipment use, the unlocking module cooperates with the human infrared sensor module, namely when the human infrared sensor module detects that someone is close to the unlocking module, the unlocking module is started, and at the moment, the basic parameters detected by the first interaction module are preferentially sent to the unlocking module. Of course, when the entrance guard device executes the IC card entry operation, the basic parameters are preferentially sent to the processing module.
Correspondingly, the invention also provides access control equipment, which comprises:
a memory storing a computer program;
and the processor is used for realizing the automatic encryption adding method of the IC card according to any embodiment when executing the computer program.
Accordingly, the present invention also provides a computer-readable medium storing a computer program which, when executed by a processor, implements the IC card automatic encryption adding method according to any one of the foregoing embodiments.
More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present application, however, a computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing.
It will be understood that equivalents and modifications will occur to those skilled in the art in light of the present invention and their spirit, and all such modifications and substitutions are intended to be included within the scope of the present invention as defined in the following claims.

Claims (9)

1. An automatic encryption adding method of an IC card is characterized by being applied to access control equipment and comprising the following steps:
acquiring basic parameters of the IC card in response to the attaching operation of the IC card; the basic parameters are identification data of the IC card;
checking the IC card by using the first secret key, if the checking is successful, writing the second secret key into an encryption sector of the IC card, storing the basic parameters in access control equipment, and determining the door opening authority of the IC card; wherein, the first secret key is the initial secret key of the blank IC card;
the verification of the IC card by using the first secret key specifically comprises the following steps: acquiring data of an encryption sector of the blank IC card, if the data in the encryption sector accords with the format or rule of the initial key, judging that the verification is successful, otherwise, judging that the verification is failed;
if the verification by using the first secret key fails, the second secret key is used for verifying the IC card, if the verification is successful, the basic parameters are stored in the access control equipment, the door opening authority of the IC card is determined, if the verification fails, the IC card is judged to be an invalid card, and a prompt is sent out.
2. The IC card automatic encryption adding method according to claim 1, wherein the storing the basic parameters in the access control device includes:
and encrypting the basic parameters by using a first encryption algorithm to generate ciphertext parameters and storing the ciphertext parameters.
3. The IC card automatic encryption adding method according to claim 1, wherein the attaching operation is:
the distance between the first sensing area of the IC card and the second sensing area of the access control equipment is smaller than a preset distance.
4. The IC card automatic encryption adding method according to claim 1, characterized by further comprising, before the attaching operation in response to the IC card:
the method comprises the steps that network distribution operation is conducted on access control equipment through a mobile terminal, so that data interaction is conducted between the access control equipment and a server;
and driving the access control equipment to execute a card input function through a preset instruction of the server or the mobile terminal.
5. The IC card automatic encryption adding method according to claim 1, characterized by further comprising, before writing a second key to the encrypted sector of the IC card:
detecting whether an encryption sector exists in the IC card, and if not, constructing the encryption sector by using a preset mode.
6. An access control device, comprising:
the first interaction module is used for responding to the attaching operation of the IC card, acquiring basic parameters of the IC card and writing data into the IC card;
the processing module is used for checking the IC card by using the first secret key, if the checking is successful, the first interaction module is driven to write the second secret key into the encryption sector, the basic parameters are stored in the access control equipment, and the door opening authority of the IC card is determined; wherein, the first secret key is the initial secret key of the blank IC card;
the verification of the IC card by using the first secret key specifically comprises the following steps: acquiring data of an encryption sector of the blank IC card, if the data in the encryption sector accords with the format or rule of the initial key, judging that the verification is successful, otherwise, judging that the verification is failed;
and the processing module is further used for checking the IC card by using a second secret key if the first secret key fails to check, storing the basic parameters in the access control equipment if the checking is successful, determining the door opening authority of the IC card, judging that the IC card is an invalid card if the checking is failed, and sending a prompt to the outside.
7. The access control device of claim 6, further comprising:
the unlocking module is connected with the first interaction module and is used for verifying the IC card by using a second secret key; wherein,
if the verification is passed, unlocking operation is executed under the condition that the basic parameters of the IC card are stored in the access control equipment;
if the verification is not passed, prompting verification failure information.
8. An access control device, comprising:
a memory storing a computer program;
a processor, when executing the computer program, implementing the IC card automatic encryption adding method of any one of claims 1 to 5.
9. A computer-readable medium, characterized in that a computer program is stored, which, when being executed by a processor, implements the IC card automatic encryption adding method according to any one of claims 1 to 5.
CN202211054517.XA 2022-08-31 2022-08-31 IC card automatic encryption adding method, access control equipment and readable medium Active CN115471939B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211054517.XA CN115471939B (en) 2022-08-31 2022-08-31 IC card automatic encryption adding method, access control equipment and readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211054517.XA CN115471939B (en) 2022-08-31 2022-08-31 IC card automatic encryption adding method, access control equipment and readable medium

Publications (2)

Publication Number Publication Date
CN115471939A CN115471939A (en) 2022-12-13
CN115471939B true CN115471939B (en) 2024-02-09

Family

ID=84368549

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211054517.XA Active CN115471939B (en) 2022-08-31 2022-08-31 IC card automatic encryption adding method, access control equipment and readable medium

Country Status (1)

Country Link
CN (1) CN115471939B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR3039296A1 (en) * 2015-07-24 2017-01-27 Info Wise Ltd
CN107945324A (en) * 2017-11-14 2018-04-20 广东安居宝数码科技股份有限公司 Card writing method, card reading method and the device of access control system
CN108551455A (en) * 2018-04-24 2018-09-18 北京小米移动软件有限公司 The configuration method and device of smart card
CN110210591A (en) * 2019-06-05 2019-09-06 金邦达有限公司 A kind of wiring method, computer installation and the computer readable storage medium of intellective IC card personal data
CN111144520A (en) * 2019-12-10 2020-05-12 惠州拓邦电气技术有限公司 IC card read-write method, device, storage medium and intelligent lock
CN112070940A (en) * 2020-08-05 2020-12-11 日立楼宇技术(广州)有限公司 Access control authorization method, access control release method, device, access control controller and medium
CN112735005A (en) * 2020-12-29 2021-04-30 北京深思数盾科技股份有限公司 Access control card, authorization and verification method thereof, terminal subsystem and access control system
CN113065367A (en) * 2021-03-29 2021-07-02 新疆爱华盈通信息技术有限公司 IC card reading method, IC card reading device, electronic device, and storage medium
CN114172544A (en) * 2021-10-20 2022-03-11 荣耀终端有限公司 Method for copying smart card and electronic equipment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7009489B2 (en) * 2002-06-14 2006-03-07 Sentrilock, Inc. Electronic lock system and method for its use

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR3039296A1 (en) * 2015-07-24 2017-01-27 Info Wise Ltd
CN107945324A (en) * 2017-11-14 2018-04-20 广东安居宝数码科技股份有限公司 Card writing method, card reading method and the device of access control system
CN108551455A (en) * 2018-04-24 2018-09-18 北京小米移动软件有限公司 The configuration method and device of smart card
CN110210591A (en) * 2019-06-05 2019-09-06 金邦达有限公司 A kind of wiring method, computer installation and the computer readable storage medium of intellective IC card personal data
CN111144520A (en) * 2019-12-10 2020-05-12 惠州拓邦电气技术有限公司 IC card read-write method, device, storage medium and intelligent lock
CN112070940A (en) * 2020-08-05 2020-12-11 日立楼宇技术(广州)有限公司 Access control authorization method, access control release method, device, access control controller and medium
CN112735005A (en) * 2020-12-29 2021-04-30 北京深思数盾科技股份有限公司 Access control card, authorization and verification method thereof, terminal subsystem and access control system
CN113065367A (en) * 2021-03-29 2021-07-02 新疆爱华盈通信息技术有限公司 IC card reading method, IC card reading device, electronic device, and storage medium
CN114172544A (en) * 2021-10-20 2022-03-11 荣耀终端有限公司 Method for copying smart card and electronic equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘洪林,符强,张保忠.MTK原理及物联网应用.北京航空航天大学出版社,2012,(第1版),第163-164页. *

Also Published As

Publication number Publication date
CN115471939A (en) 2022-12-13

Similar Documents

Publication Publication Date Title
US10957136B1 (en) Information-based, biometric, asynchronous access control system
US10659457B2 (en) Information processing device, information processing system, and information processing method
JP5259400B2 (en) Mass storage device with near-field communication
CN205427990U (en) Pronunciation access control system based on digital identifying code of developments
US20090184800A1 (en) Cellular phone Entry Techniques
US8839380B2 (en) Method for the temporary personalization of a communication device
CN111835689A (en) Identity authentication method of digital key, terminal device and medium
CN111868726A (en) Electronic device and digital key supply method for electronic device
CN114120487B (en) Automobile digital key management method, system, equipment and storage medium
CN112819997A (en) Method, apparatus and computer-readable storage medium for creating vehicle key
JP2004348478A (en) Authentication system using ic card and ic card
KR20110096576A (en) Access identification and control device
KR101345018B1 (en) Teminal and security certification system therewith
US20120102565A1 (en) Method and system for controlling the execution of a function protected by authentification of a user, in particular for the access to a resource
US8151111B2 (en) Processing device constituting an authentication system, authentication system, and the operation method thereof
CN115471939B (en) IC card automatic encryption adding method, access control equipment and readable medium
CN111010687B (en) Method and system for quick communication between non-contact card and mobile device
CN113632415A (en) Secure emergency vehicle communication
EP3503044A1 (en) Method of getting access to a vehicle
CN210924713U (en) Access control system based on iBeacon technology
CN102474498A (en) Authentication method for user identification equipment
WO2021082195A1 (en) Method for creating and managing virtual key, apparatus, and computer readable storage medium
CN112560116A (en) Function control method, device and storage medium
EP2620902A1 (en) Central security device, system and method for smart cards
CN112422281A (en) Method and system for changing secret key in security module

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant