CN116229618A - Intelligent electronic lock management system and management method - Google Patents

Intelligent electronic lock management system and management method Download PDF

Info

Publication number
CN116229618A
CN116229618A CN202310205847.2A CN202310205847A CN116229618A CN 116229618 A CN116229618 A CN 116229618A CN 202310205847 A CN202310205847 A CN 202310205847A CN 116229618 A CN116229618 A CN 116229618A
Authority
CN
China
Prior art keywords
unlocking
ciphertext
key
lock
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310205847.2A
Other languages
Chinese (zh)
Inventor
王永峰
白培基
胡大有
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Sunson Tech Co ltd
Original Assignee
Shenzhen Sunson Tech Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Sunson Tech Co ltd filed Critical Shenzhen Sunson Tech Co ltd
Priority to CN202310205847.2A priority Critical patent/CN116229618A/en
Publication of CN116229618A publication Critical patent/CN116229618A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/0042Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed
    • G07C2009/00476Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention relates to the field of intelligent locks, and discloses an intelligent electronic lock management system and an intelligent electronic lock management method, which are used for realizing intelligent management of an intelligent electronic lock and improving safety of the intelligent electronic lock. The method comprises the following steps: verifying the geographic position coordinates and unlocking times to obtain a target verification result; acquiring a ciphertext M1 of the fingerprint data according to the target verification result, and performing fingerprint comparison verification on the ciphertext M1 to obtain a fingerprint verification result; collecting a password input by an unlocking person according to a fingerprint verification result, encrypting the password by adopting a key1 to generate a ciphertext M2, and carrying out decryption verification on the ciphertext M2 to obtain a decryption verification result; encrypting an unlocking key2 according to the decryption verification result and the key1 to generate a ciphertext M3, and carrying out unlocking authorization according to the ciphertext M3; the key end is in butt joint with the lock end, power is supplied to the lock end through the key end, an unlocking instruction is sent, and the key end is unlocked according to the unlocking instruction.

Description

Intelligent electronic lock management system and management method
Technical Field
The invention relates to the field of intelligent locks, in particular to an intelligent electronic lock management system and an intelligent electronic lock management method.
Background
The traditional mechanical lock is characterized in that one lock is unlocked by a plurality of keys, different locks use different keys, and one lock can be provided with a plurality of keys, so that the mechanical lock is neither safe (the keys are easy to copy after being handed to others) nor convenient to manage (the keys are also recovered after being handed to others, and the locks cannot be known to be unlocked several times, by whom, when and where). Aiming at the problems, various electronic locks are also put forward in the market at present, and the main working principle is as follows: the management personnel uses the computer to connect the electronic key, and the operation management software downloads the fingerprint data of the personnel of unblanking and the key of unblanking of electronic lock to the key, and when the personnel of unblanking used the electronic key, only need verify the fingerprint on the electronic key, can use the electronic key again because the key of unblanking is stored in the electronic key, and electronic key and electronic lock use the key to encrypt the communication when unblanking, accomplish the unblanking finally. Meanwhile, a clock system is arranged in the electronic key, the electronic lock is provided with a unique number SN and an unlocking key, fingerprint data is unique in identification, so that the electronic key can record when a person opens which lock, when the key is connected with a computer again, the unlocking and locking records can be uploaded to computer management software, and a manager downloads fingerprint data of different persons and the key of the electronic lock to the electronic key, thereby realizing the functions that one key can open different locks and a plurality of keys can open one lock.
However, in the existing electronic lock system, fingerprint data and an unlocking key are always stored in the electronic key, and the data may be copied by an lawbreaker using a technical means, so that the purpose of copying the electronic key to illegally unlock is achieved, and the security is reduced. Secondly, the manager can not know in time when and where the electronic key is used, and when the fingerprint data and the unlocking key of other unlocking personnel are downloaded, the manager needs to be returned with the key, so that the working efficiency is greatly reduced, and the management is inconvenient.
Disclosure of Invention
The invention provides an intelligent electronic lock management system and an intelligent electronic lock management method, which are used for realizing intelligent management of an intelligent electronic lock and improving the safety of the intelligent electronic lock.
The first aspect of the invention provides an intelligent electronic lock management method, which comprises the following steps: obtaining geographic position coordinates and unlocking times of a key end, and generating a dynamic password corresponding to the key end according to preset background server management software; verifying the position information and the unlocking times of the geographic position coordinates and the unlocking times to obtain a target verification result; when the target verification result is verification passing, acquiring a ciphertext M1 of fingerprint data from the background server management software, and performing fingerprint comparison verification on the fingerprint input by the unlocking person on the key end and the ciphertext M1 to obtain a fingerprint verification result; when the fingerprint verification result is that the fingerprint verification is passed, acquiring a password input by an unlocking person, encrypting the password by adopting a key1 to generate a ciphertext M2, and sending the ciphertext M2 to the background server management software to decrypt and verify the dynamic password to obtain a decryption verification result; when the decryption verification result is that the password verification is passed, the key1 is used for encrypting an unlocking key2 to generate a ciphertext M3, and the ciphertext M3 is sent to the key end so as to carry out unlocking authorization on the unlocking personnel; and butting the key end with the lock end, supplying power to the lock end through the key end, sending an unlocking instruction, and unlocking the key end according to the unlocking instruction.
With reference to the first aspect, in a first implementation manner of the first aspect of the present invention, the verifying the position information and the unlocking times for the geographic position coordinate and the unlocking times to obtain a target verification result includes: acquiring a preset geographical position coordinate limiting range, and performing position verification on the geographical position coordinate according to the geographical position coordinate limiting range to obtain a position verification result, wherein the position verification result comprises: position verification pass and position verification fail; acquiring preset unlocking times, and verifying the unlocking times according to the unlocking times to obtain unlocking times verification results, wherein the unlocking times verification results comprise: the unlocking times are consistent with the unlocking times and the unlocking times are not consistent with the unlocking times; and when the position verification result is that the position verification is passed and the unlocking times verification result is that the unlocking times are consistent with the unlocking times, determining that the target verification result is that the verification is passed.
With reference to the first aspect, in a second implementation manner of the first aspect of the present invention, when the target verification result is verification passing, acquiring a ciphertext M1 of fingerprint data from the background server management software, and performing fingerprint comparison verification on a fingerprint input by an unlocking person on the key end and the ciphertext M1 to obtain a fingerprint verification result, where the fingerprint comparison verification result includes: when the target verification result is verification passing, acquiring a ciphertext M1 of fingerprint data from the background server management software through the key end, wherein the ciphertext M1 is encrypted by a key1 by adopting an SM4 symmetric encryption algorithm; the key end decrypts the ciphertext M1 through a key1 and collects fingerprints input by the unlocking personnel on the key end; and performing fingerprint comparison verification on the fingerprint and the ciphertext M1 to obtain a fingerprint verification result, wherein the fingerprint verification result comprises the following steps: fingerprint authentication passes and fingerprint authentication does not pass.
With reference to the first aspect, in a third implementation manner of the first aspect of the present invention, when the fingerprint verification result is that the fingerprint verification passes, collecting a password input by the unlocking person and encrypting the password by using a key1, generating a ciphertext M2, and sending the ciphertext M2 to the background server management software to perform decryption verification on the dynamic password, so as to obtain a decryption verification result, where the method includes: when the fingerprint verification result is that the fingerprint verification is passed, acquiring a password input by the unlocking personnel at the key end; encrypting the password by adopting a key1 to generate a ciphertext M2, and sending the ciphertext M2 to the background server management software; and carrying out decryption verification on the dynamic password and the ciphertext M2 through the background server management software to obtain a decryption verification result, wherein the decryption result comprises the following steps: password authentication pass and password authentication fail.
With reference to the first aspect, in a fourth implementation manner of the first aspect of the present invention, when the decryption verification result is that the password verification is passed, encrypting an unlocking key2 by using the key1 to generate a ciphertext M3, and sending the ciphertext M3 to the key end to perform unlocking authorization on the unlocking personnel, including: when the decryption verification result is that the password verification is passed, encrypting an unlocking key2 through the key1 to generate a ciphertext M3, and sending the ciphertext M3 to the key end; decrypting the ciphertext M3 by the key end through the key1 to obtain a key2; and carrying out unlocking authorization on the unlocking personnel according to the key 2.
With reference to the first aspect, in a fifth implementation manner of the first aspect of the present invention, the docking the key end with the lock end, powering the lock end through the key end, sending an unlocking command, and unlocking the key end according to the unlocking command includes: the unlocking personnel dock the key end with the lock end, power is supplied to the lock end through the key end after the key end is successfully docked, and an unlocking instruction is sent to the lock end; generating a random number S after receiving the unlocking instruction through the lock end, and transmitting the random number S back to the key end; encrypting the random number S by the key end through a key2 to generate a ciphertext M4, and sending the ciphertext M4 to the lock end; the random number S and the ciphertext M4 are subjected to encryption comparison through the lock end, and a comparison result is obtained; and when the comparison result is that the comparison is successful, the lock pin is driven by the lock end and the lock cylinder is twisted by the key end to unlock.
With reference to the first aspect, in a sixth implementation manner of the first aspect of the present invention, the intelligent electronic lock management method further includes: the key end is sent to the on-off lock state information, and the on-off lock record information is sent to the background server management software through the key end; deleting the key2, the ciphertext M1, the ciphertext M2, the ciphertext M3 and the ciphertext M4 to generate a deletion record; and storing the deletion record through a database in the background server management software, and monitoring the operation state of the key terminal according to the deletion record.
The second aspect of the present invention provides an intelligent electronic lock management system, including: the key end is connected with the key end;
the lock end includes: the lock comprises a lock key communication interface circuit, a data encryption chip with SM2 and SM4 encryption technologies, a lock pin driving circuit and a lock state detection circuit, wherein the lock end is not provided with a power supply, and the lock end is powered by the key end when the lock end is in butt joint with the key end;
the key end includes: the system comprises a key communication interface circuit, a main control chip with SM2 and SM4 encryption technologies, a 4G wireless communication module with Beidou and GPS positioning functions, a fingerprint image module, a password input key, a USB communication interface circuit, a battery management circuit and an anti-disassembly self-destruction detection circuit;
the background server management software includes: the system comprises a database, a data encryption module, an administrator login module, a lock and key adding module, a personnel information adding module, an unlocking authorization setting module and an unlocking record obtaining module.
With reference to the second aspect, in a first implementation manner of the second aspect of the present invention, the personnel information adding module is specifically configured to: person numbers, fingerprints, and passwords are added.
With reference to the second aspect, in a second implementation manner of the second aspect of the present invention, the unlocking authority setting module is specifically configured to: and setting unlocking time, personnel number, lock end number, unlocking times and geographic position coordinate range.
According to the technical scheme provided by the invention, through the remote wireless communication function of the electronic key, the Beidou and GPS double positioning function for acquiring the geographic position information and the personal password input verification function, the remote communication between management software and the electronic key is realized, management staff can remotely download unlocking keys and fingerprint data to the electronic key, the time and place for allowing unlocking can be set, the time and place for allowing unlocking can be known in real time when and where the electronic key is used, the unlocking and locking states can be acquired, and the management staff can set whether someone can unlock or lock without recovering the electronic key, so that the management is greatly facilitated. Meanwhile, the remote wireless communication function is provided, the unlocking key and fingerprint data of an unlocking person are not required to be downloaded and stored in the electronic key at first, and after the unlocking person arrives at the present site, the management software downloads related data into the electronic key, the data are deleted after the use is finished, and the unlocking information is subjected to position and unlocking times verification, fingerprint verification and password verification, so that unlocking authorization is carried out on the unlocking person, intelligent management of the intelligent electronic lock is further realized, and the safety is improved.
Drawings
FIG. 1 is a schematic diagram of an embodiment of a method for managing an intelligent electronic lock according to an embodiment of the present invention;
FIG. 2 is a flow chart of fingerprint verification in an embodiment of the present invention;
FIG. 3 is a flow chart of decryption verification in an embodiment of the invention;
FIG. 4 is a flow chart of the encryption comparison and unlocking in the embodiment of the invention;
FIG. 5 is a schematic diagram of an embodiment of a system for managing an intelligent electronic lock according to an embodiment of the present invention
FIG. 6 is an electrical block diagram of a lock end and a key end in an embodiment of the present invention.
Detailed Description
The embodiment of the invention provides an intelligent electronic lock management system and an intelligent electronic lock management method, which are used for realizing intelligent management of an intelligent electronic lock and improving the safety of the intelligent electronic lock. The terms "first," "second," "third," "fourth" and the like in the description and in the claims and in the above drawings, if any, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments described herein may be implemented in other sequences than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed or inherent to such process, method, article, or apparatus.
For easy understanding, the following describes a specific flow of an embodiment of the present invention, referring to fig. 1, and one embodiment of the method for managing an intelligent electronic lock in the embodiment of the present invention includes:
s101, obtaining geographic position coordinates and unlocking times of a key end, and generating a dynamic password corresponding to the key end according to preset background server management software;
it can be understood that the execution body of the present invention may be an intelligent electronic lock management system, and may also be a terminal or a server, which is not limited herein.
Specifically, the initialization process needs to be performed on the key end, where the initialization process specifically includes: the background server management software is installed on a computer of a user manager, when a key end is used for the first time after leaving a factory, the key end is connected with the computer by using a USB wire and communicated with the background server management software, a manager operates the background server management software, invokes a data encryption module, generates a group of key end key1 by using an SM4 symmetric encryption technology, and stores the key in a database. The background server management software simultaneously sends a command for preparing to load the key1 to the key end, the key end uses an SM2 asymmetric encryption technology to randomly generate a pair of public key public_key A and private key private_key A after receiving the command, uploads the public key public_key A to the background server management software, the background server management software calls a data encryption module after receiving the public_key A, encrypts the key1 generated before by using the SM2 encryption technology and the public key public_key A, sends a ciphertext to the key end, and the key end uses the private key public_key A to decrypt the ciphertext to obtain the key1, and stores the key1 in a main control chip for later encrypted communication with the background server management software. When the lock end is used for the first time after leaving the factory, the steps for loading the key on the key end are similar. Because the lock end is not provided with a communication interface for communicating with the computer, the lock end is in butt joint with the key end, the UART serial port technology is used for communication, and the USB wire of the wrong key assisting end is connected with the computer for communicating with the background server management software. The background server management software and the lockterminal also use SM2 and SM4 encryption technology to store the unlocking key2 into the database and the data encryption chip of the lockterminal. For the asymmetric encryption technology, data encrypted by using a public key can be successfully decrypted only by using a private key, and the data are always transmitted in a ciphertext mode in the process of loading keys 1 and 2 on a key end and a lock end, so that the safety is ensured. The background server management software is installed on the networked server electric clothes, and an administrator account number and a password are set. The manager logs in the background server management software to add unlocking personnel information, including unlocking personnel names, numbers and key authorization passwords, uses a fingerprint image module on a key end to input unlocking personnel instruction data, and uses a key1 to encrypt and store the unlocking personnel instruction data in a database. When to unlock, an administrator logs in to the background server management software, sets keys and locks that someone can use at what time and where, and the number of times that the lock can be unlocked. The key end in the embodiment is added with the anti-disassembling self-destruction function.
Specifically, an administrator logs in a background server management software to select unlocking personnel, and sets available keys and lock numbers, unlocking time, authorized unlocking times and unlocking geographic positions; the unlocking personnel arrive at the on-site unlocking key end to acquire geographic position coordinates; the key end is connected with the background server management software by using a TCP instruction stream technology with SSL encryption protocol through a 4G network, and the background server management software generates a group of dynamic passwords of the key end at the moment.
S102, verifying the geographic position coordinates and unlocking times to obtain a target verification result;
specifically, position information and unlocking times are verified on the geographic position coordinates and unlocking times, a target verification result is obtained, background server management software verifies the geographic position coordinates and unlocking times, if verification fails, a key end verification failure prompt is provided, and if verification is successful, the key end performs fingerprint verification in the next step.
S103, when the target verification result is verification passing, acquiring a ciphertext M1 of fingerprint data from background server management software, and performing fingerprint comparison verification on a fingerprint input by an unlocking person on a key end and the ciphertext M1 to obtain a fingerprint verification result;
the key end obtains a fingerprint data ciphertext M1 encrypted by an SM4 technology by using a key1 from background server management software; the key end decrypts M1 by using the downloaded key1 during initialization, and performs fingerprint comparison verification on the fingerprint and ciphertext M1 input by the unlocking personnel on the key end, so as to obtain a fingerprint verification result.
S104, when the fingerprint verification result is that the fingerprint verification is passed, acquiring a password input by an unlocking person, encrypting the password by adopting a key1 to generate a ciphertext M2, and sending the ciphertext M2 to background server management software to decrypt and verify the dynamic password to obtain a decryption verification result;
specifically, when the fingerprint verification result is that the fingerprint verification is passed, acquiring a password input by an unlocking person, encrypting the password by adopting a key1 to generate a ciphertext M2, sending the ciphertext M2 to background server management software to decrypt and verify the dynamic password, so as to obtain a decryption verification result, and if the verification is successful, acquiring the password input by a key end; if the verification fails, the key end prompts that the verification fails.
S105, when the decryption verification result is that the password verification is passed, the unlocking key2 is encrypted through the key1 to generate a ciphertext M3, and the ciphertext M3 is sent to a key end to perform unlocking authorization on unlocking personnel;
specifically, when the decryption verification result is that the password verification is passed, the key1 is used for encrypting the unlocking key2 to generate a ciphertext M3, the ciphertext M3 is sent to a key end to carry out unlocking authorization on unlocking personnel, the key end inputs a password, the key end uses the key1 for encryption to generate the ciphertext M2 and sends the ciphertext M2 to background server management software, the background server management software uses the key1 for decryption to obtain the password input by the key, the background server management software uses the key1 for decryption M2, and the password input by the key end and the password dynamically generated by the background server management software are verified; if the verification fails, the key end is verified to fail, and if the verification is successful, the background server management software encrypts the unlocking key2 by using the key1 to generate a ciphertext M3, and sends the ciphertext M3 to the key end.
S106, butting the key end with the lock end, supplying power to the lock end through the key end, sending an unlocking instruction, and unlocking the key end according to the unlocking instruction.
Specifically, the key end is in butt joint with the lock end, power is supplied to the lock end through the key end, an unlocking instruction is sent, the key end is unlocked according to the unlocking instruction, wherein the key end uses key1 to decrypt and obtain M3 to obtain an unlocking key2, the key end is in butt joint with the lock end, power is supplied to the lock end, a mirror opening instruction is sent, and the key end is unlocked according to the unlocking instruction. In the lock management process in this embodiment, fingerprint image data, a key-end password, and a lock-end key are not always stored in the key, but are automatically deleted after use. The manager adds the task of unblanking and does not need to withdraw the key, utilizes 4G communication technology long-range data transmission to the key end, can use satellite positioning function to restrict the service area of key, and the real-time supervision key's service behavior has made things convenient for the management. The key does not always store sensitive data information, but is acquired from background server management software through 4G wireless communication when in use, and the key is automatically deleted after use, so that the safety is improved.
According to the embodiment of the invention, through the remote wireless communication function of the electronic key, the Beidou and GPS double positioning function for acquiring the geographic position information and the personal password input verification function, the remote communication of management software and the electronic key is realized, a manager can remotely download an unlocking key and fingerprint data to the electronic key, the time and place for allowing unlocking can be set, the time and place for allowing unlocking can be known in real time when and where the electronic key is used, the unlocking and locking states can be acquired, and the manager can set whether someone can unlock or lock without recovering the electronic key, so that the management is greatly facilitated. Meanwhile, the remote wireless communication function is provided, the unlocking key and fingerprint data of an unlocking person are not required to be downloaded and stored in the electronic key at first, and after the unlocking person arrives at the present site, the management software downloads related data into the electronic key, and after the use is finished, the data are deleted, and the unlocking information is subjected to position and unlocking times verification, fingerprint verification and password verification, so that unlocking authorization of the unlocking person is realized, intelligent management of the intelligent electronic lock is further realized, and the safety is improved.
In a specific embodiment, the process of executing step S102 may specifically include the following steps:
(1) Acquiring a preset geographical position coordinate limiting range, and performing position verification on geographical position coordinates according to the geographical position coordinate limiting range to obtain a position verification result, wherein the position verification result comprises: position verification pass and position verification fail;
(2) Acquiring preset unlocking times, and verifying the unlocking times according to the unlocking times to obtain unlocking times verification results, wherein the unlocking times verification results comprise: the unlocking times are in accordance with the unlocking times and the unlocking times are not in accordance with the unlocking times;
(3) When the position verification result is that the position verification is passed and the unlocking times are consistent with the unlocking times, determining that the target verification result is that the verification is passed.
Specifically, the server acquires a preset geographical position coordinate limiting range, and performs position verification on the geographical position coordinate according to the geographical position coordinate limiting range to obtain a position verification result, wherein the position verification result comprises: position verification pass and position verification fail; acquiring preset unlocking times, and verifying the unlocking times according to the unlocking times to obtain unlocking times verification results, wherein the unlocking times verification results comprise: the unlocking times are in accordance with the unlocking times and the unlocking times are not in accordance with the unlocking times; when the position verification result is that the position verification is passed and the unlocking times are consistent with the unlocking times, determining that the target verification result is that the verification is passed. Further, when the position verification result is that the position verification is not passed and the unlocking times verification result is that the unlocking times are not consistent with the unlocking times, determining that the target verification result is that the verification is not passed; when the position verification result is that the position verification is not passed and the unlocking times verification result is that the unlocking times are consistent with the unlocking times, determining that the target verification result is that the verification is not passed; when the position verification result is that the position verification is passed and the unlocking times verification result is that the unlocking times are not consistent with the unlocking times, determining that the target verification result is that the verification is not passed.
In a specific embodiment, as shown in fig. 2, the process of performing step S103 may specifically include the following steps:
s201, when a target verification result is verification passing, acquiring a ciphertext M1 of fingerprint data from background server management software through a key end, wherein the ciphertext M1 is encrypted by a key1 by adopting an SM4 symmetric encryption algorithm;
s202, a key end decrypts a ciphertext M1 through a key1, and collects fingerprints input by an unlocking person on the key end;
s203, fingerprint comparison verification is carried out on the fingerprint and the ciphertext M1, and a fingerprint verification result is obtained, wherein the fingerprint verification result comprises the following steps: fingerprint authentication passes and fingerprint authentication does not pass.
Specifically, when the target verification result is verification passing, acquiring a ciphertext M1 of fingerprint data from background server management software through a key end, wherein the ciphertext M1 is encrypted by a key1 by adopting an SM4 symmetric encryption algorithm; the key end decrypts the ciphertext M1 through the key1 and collects fingerprints input by an unlocking person on the key end; fingerprint comparison verification is carried out on the fingerprint and the ciphertext M1, and a fingerprint verification result is obtained, wherein the fingerprint verification result comprises the following steps: fingerprint authentication passes and fingerprint authentication does not pass. After the server passes the verification, the key end continuously acquires the fingerprint data ciphertext M1 encrypted by the key1 through the SM4 symmetric encryption technology from the background server management software, decrypts the M1 through the key1, and an unlocking person inputs the fingerprint again on the key end and compares the fingerprint with the M1 to verify the fingerprint.
In a specific embodiment, as shown in fig. 3, the process of executing step S104 may specifically include the following steps:
s301, when the fingerprint verification result is that the fingerprint verification is passed, acquiring a password input by an unlocking person at a key end;
s302, encrypting the password by adopting a key1 to generate a ciphertext M2, and sending the ciphertext M2 to background server management software;
s303, carrying out decryption verification on the dynamic password and the ciphertext M2 through background server management software to obtain a decryption verification result, wherein the decryption result comprises: password authentication pass and password authentication fail.
Specifically, when the fingerprint verification result is that the fingerprint verification is passed, acquiring a password input by an unlocking person at a key end; encrypting the password by adopting a key1 to generate a ciphertext M2, and sending the ciphertext M2 to background server management software; the dynamic password and the ciphertext M2 are decrypted and verified through background server management software, and a decryption verification result is obtained, wherein the decryption result comprises the following steps: password authentication pass and password authentication fail. After the server fingerprint verification is passed, inputting a password, encrypting by using a key1 to generate a ciphertext M2, sending the ciphertext M2 to a dynamic password generated before decryption verification of background server management software, and carrying out decryption verification on the dynamic password and the ciphertext M2 by the background server management software to obtain a decryption verification result, wherein the decryption result comprises: password authentication pass and password authentication fail.
In a specific embodiment, the process of executing step S105 may specifically include the following steps:
(1) When the decryption verification result is that the password verification is passed, the unlocking key2 is encrypted through the key1 to generate a ciphertext M3, and the ciphertext M3 is sent to a key end;
(2) Decrypting the ciphertext M3 by using the key1 through the key end to obtain a key2;
(3) And carrying out unlocking authorization on unlocking personnel according to the key 2.
Specifically, when the decryption verification result is that the password verification is passed, the unlocking key2 is encrypted through the key1 to generate a ciphertext M3, and the ciphertext M3 is sent to the key end; decrypting the ciphertext M3 by using the key1 through the key end to obtain a key2; and carrying out unlocking authorization on unlocking personnel according to the key 2. The server password verification is passed, key1 is used for encrypting an unlocking key2 to generate a ciphertext M3 and the ciphertext M3 is sent to the key end, and the key end uses key1 for decrypting M3 to obtain the unlocking key2; through the verification, the key end has authorized the unlocking personnel.
In a specific embodiment, as shown in fig. 4, the process of executing step S106 may specifically include the following steps:
s401, butting the key end and the lock end by unlocking personnel, supplying power to the lock end by the key end after the butting is successful, and sending an unlocking instruction to the lock end;
s402, receiving an unlocking instruction through the lock end, generating a random number S, and returning the random number S to the key end;
s403, encrypting the random number S by adopting a key2 through a key end, generating a ciphertext M4, and sending the ciphertext M4 to a lock end;
s404, carrying out encryption comparison on the random number S and the ciphertext M4 through a lock end to obtain a comparison result;
and S405, when the comparison result is that the comparison is successful, the lock cylinder is twisted to unlock through the lock end driving lock pin and the key end.
Specifically, the key end and the lock end are in butt joint through unlocking personnel, after the butt joint is successful, the lock end is powered through the key end, and an unlocking instruction is sent to the lock end; generating a random number S after receiving an unlocking instruction through a lock end, and returning the random number S to a key end; encrypting the random number S by adopting a key2 at a key end to generate a ciphertext M4, and sending the ciphertext M4 to a lock end; the random number S and the ciphertext M4 are encrypted and compared through the lock end, and a comparison result is obtained; when the comparison result is that the comparison is successful, the lock pin is driven by the lock end and the lock core is twisted by the key end to unlock. The unlocking personnel butt joint the key end and the lock end, the key end supplies power to the lock end, an unlocking instruction is sent, the lock end generates a group of random numbers S after the instruction is sent back to the key end, the key end encrypts the random numbers S by using the key2 to generate ciphertext M4 and sends the ciphertext M4 to the lock end, the lock end also encrypts the random numbers S by using the downloaded key2 during initialization and compares the encrypted random numbers S with the M4, after the comparison is successful, the lock end drives the lock pin, the key end twists the lock cylinder to realize unlocking, and the lock opening and closing states are sent to the key end.
In a specific embodiment, the intelligent electronic lock management method further includes the following steps:
(1) The method comprises the steps that lock opening and closing state information is sent to a key end, and lock opening and closing record information is sent to background server management software through the key end;
(2) Deleting the key2, the ciphertext M1, the ciphertext M2, the ciphertext M3 and the ciphertext M4 to generate a deletion record;
(3) And storing the deleted records through a database in the background server management software, and monitoring the operation state of the key terminal according to the deleted records.
Specifically, the key end is sent to switch lock state information, and switch lock record information is sent to background server management software through the key end; deleting the key2, the ciphertext M1, the ciphertext M2, the ciphertext M3 and the ciphertext M4 to generate a deletion record; and storing the deleted records through a database in the background server management software, and monitoring the operation state of the key terminal according to the deleted records. The key end sends the switch lock record information to the background server management software, and deletes the key2, the ciphertext M1, the ciphertext M2, the ciphertext M3 and the ciphertext M4, and the background server management software database stores the record, so that a manager can timely monitor the operation state.
The method for managing the intelligent electronic lock in the embodiment of the present invention is described above, and the system for managing the intelligent electronic lock in the embodiment of the present invention is described below, referring to fig. 5, where an embodiment of the system for managing the intelligent electronic lock in the embodiment of the present invention includes: the intelligent electronic lock management system comprises: a lockend 501, a keyend 502, and background server management software 503;
the locking end 501 includes: the key communication interface circuit, the data encryption chip with SM2 and SM4 encryption technology, the lock pin driving circuit and the lock state detection circuit, wherein the lock end 501 is not powered, and the lock end 501 is powered by the key end 502 when the lock end 501 is in butt joint with the key end 502;
the key end 502 includes: the system comprises a key communication interface circuit, a main control chip with SM2 and SM4 encryption technologies, a 4G wireless communication module with Beidou and GPS positioning functions, a fingerprint image module, a password input key, a USB communication interface circuit, a battery management circuit and an anti-disassembly self-destruction detection circuit;
the background server management software 503 includes: the system comprises a database, a data encryption module, an administrator login module, a lock and key adding module, a personnel information adding module, an unlocking authorization setting module and an unlocking record obtaining module.
The personnel information adding module is specifically used for: person numbers, fingerprints, and passwords are added.
The unlocking authorization setting module is specifically used for: and setting unlocking time, personnel number, lock end number, unlocking times and geographic position coordinate range.
Through the cooperation of the components, the remote communication between management software and the electronic key is realized through the assembly of the remote wireless communication function with the electronic key, the Beidou and GPS double positioning function for acquiring the geographic position information and the personal password input verification function, the management personnel can remotely download unlocking keys and fingerprint data to the electronic key, the time and the place for allowing unlocking can be set, the time and the place for allowing unlocking can be known in real time when and where the electronic key is used, the unlocking and locking states can be acquired, and the management personnel can set whether someone can unlock or lock without retracting the electronic key, so that the management is greatly facilitated. Meanwhile, the remote wireless communication function is provided, the unlocking key and fingerprint data of an unlocking person are not required to be downloaded and stored in the electronic key at first, and after the unlocking person arrives at the present site, the management software downloads related data into the electronic key, the data are deleted after the use is finished, and the unlocking information is subjected to position and unlocking times verification, fingerprint verification and password verification, so that unlocking authorization is carried out on the unlocking person, intelligent management of the intelligent electronic lock is further realized, and the safety is improved.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, which are not repeated herein.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied essentially or in part or all of the technical solution or in part in the form of a software product stored in a storage medium, including instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a read-only memory (ROM), a random access memory (random acceS memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. The intelligent electronic lock management method is characterized by comprising the following steps of:
obtaining geographic position coordinates and unlocking times of a key end, and generating a dynamic password corresponding to the key end according to preset background server management software;
verifying the position information and the unlocking times of the geographic position coordinates and the unlocking times to obtain a target verification result;
when the target verification result is verification passing, acquiring a ciphertext M1 of fingerprint data from the background server management software, and performing fingerprint comparison verification on the fingerprint input by the unlocking person on the key end and the ciphertext M1 to obtain a fingerprint verification result;
when the fingerprint verification result is that the fingerprint verification is passed, acquiring a password input by an unlocking person, encrypting the password by adopting a key1 to generate a ciphertext M2, and sending the ciphertext M2 to the background server management software to decrypt and verify the dynamic password to obtain a decryption verification result;
when the decryption verification result is that the password verification is passed, the key1 is used for encrypting an unlocking key2 to generate a ciphertext M3, and the ciphertext M3 is sent to the key end so as to carry out unlocking authorization on the unlocking personnel;
and butting the key end with the lock end, supplying power to the lock end through the key end, sending an unlocking instruction, and unlocking the key end according to the unlocking instruction.
2. The method for managing an intelligent electronic lock according to claim 1, wherein the verifying the geographic location coordinates and the unlocking times to obtain the target verification result includes:
acquiring a preset geographical position coordinate limiting range, and performing position verification on the geographical position coordinate according to the geographical position coordinate limiting range to obtain a position verification result, wherein the position verification result comprises: position verification pass and position verification fail;
acquiring preset unlocking times, and verifying the unlocking times according to the unlocking times to obtain unlocking times verification results, wherein the unlocking times verification results comprise: the unlocking times are consistent with the unlocking times and the unlocking times are not consistent with the unlocking times;
and when the position verification result is that the position verification is passed and the unlocking times verification result is that the unlocking times are consistent with the unlocking times, determining that the target verification result is that the verification is passed.
3. The method for managing an intelligent electronic lock according to claim 1, wherein when the target verification result is verification passing, acquiring a ciphertext M1 of fingerprint data from the background server management software, and performing fingerprint comparison verification on a fingerprint input by an unlocking person on the key end and the ciphertext M1 to obtain a fingerprint verification result, comprising:
when the target verification result is verification passing, acquiring a ciphertext M1 of fingerprint data from the background server management software through the key end, wherein the ciphertext M1 is encrypted by a key1 by adopting an SM4 symmetric encryption algorithm;
the key end decrypts the ciphertext M1 through a key1 and collects fingerprints input by the unlocking personnel on the key end;
and performing fingerprint comparison verification on the fingerprint and the ciphertext M1 to obtain a fingerprint verification result, wherein the fingerprint verification result comprises the following steps: fingerprint authentication passes and fingerprint authentication does not pass.
4. The method of claim 1, wherein when the fingerprint verification result is that the fingerprint verification is passed, collecting a password input by the unlocking person and encrypting the password by using a key1 to generate a ciphertext M2, and sending the ciphertext M2 to the background server management software to decrypt and verify the dynamic password, so as to obtain a decryption verification result, comprising:
when the fingerprint verification result is that the fingerprint verification is passed, acquiring a password input by the unlocking personnel at the key end;
encrypting the password by adopting a key1 to generate a ciphertext M2, and sending the ciphertext M2 to the background server management software;
and carrying out decryption verification on the dynamic password and the ciphertext M2 through the background server management software to obtain a decryption verification result, wherein the decryption result comprises the following steps: password authentication pass and password authentication fail.
5. The method of claim 1, wherein when the decryption verification result is that the password verification is passed, encrypting an unlocking key2 by the key1 to generate a ciphertext M3, and sending the ciphertext M3 to the key end to perform unlocking authorization on the unlocking person, comprising:
when the decryption verification result is that the password verification is passed, encrypting an unlocking key2 through the key1 to generate a ciphertext M3, and sending the ciphertext M3 to the key end;
decrypting the ciphertext M3 by the key end through the key1 to obtain a key2;
and carrying out unlocking authorization on the unlocking personnel according to the key 2.
6. The intelligent electronic lock management method according to claim 1, wherein the interfacing the key end with the lock end, supplying power to the lock end through the key end and transmitting an unlock instruction, and unlocking the key end according to the unlock instruction, comprises:
the unlocking personnel dock the key end with the lock end, power is supplied to the lock end through the key end after the key end is successfully docked, and an unlocking instruction is sent to the lock end;
generating a random number S after receiving the unlocking instruction through the lock end, and transmitting the random number S back to the key end;
encrypting the random number S by the key end through a key2 to generate a ciphertext M4, and sending the ciphertext M4 to the lock end;
the random number S and the ciphertext M4 are subjected to encryption comparison through the lock end, and a comparison result is obtained;
and when the comparison result is that the comparison is successful, the lock pin is driven by the lock end and the lock cylinder is twisted by the key end to unlock.
7. The intelligent electronic lock management method of claim 6, further comprising:
the key end is sent to the on-off lock state information, and the on-off lock record information is sent to the background server management software through the key end;
deleting the key2, the ciphertext M1, the ciphertext M2, the ciphertext M3 and the ciphertext M4 to generate a deletion record;
and storing the deletion record through a database in the background server management software, and monitoring the operation state of the key terminal according to the deletion record.
8. An intelligent electronic lock management system, the intelligent electronic lock management system comprising: the key end is connected with the key end;
the lock end includes: the lock comprises a lock key communication interface circuit, a data encryption chip with SM2 and SM4 encryption technologies, a lock pin driving circuit and a lock state detection circuit, wherein the lock end is not provided with a power supply, and the lock end is powered by the key end when the lock end is in butt joint with the key end;
the key end includes: the system comprises a key communication interface circuit, a main control chip with SM2 and SM4 encryption technologies, a 4G wireless communication module with Beidou and GPS positioning functions, a fingerprint image module, a password input key, a USB communication interface circuit, a battery management circuit and an anti-disassembly self-destruction detection circuit;
the background server management software includes: the system comprises a database, a data encryption module, an administrator login module, a lock and key adding module, a personnel information adding module, an unlocking authorization setting module and an unlocking record obtaining module.
9. The intelligent electronic lock management system according to claim 8, wherein the personnel information adding module is specifically configured to: person numbers, fingerprints, and passwords are added.
10. The intelligent electronic lock management system according to claim 8, wherein the unlocking authority setting module is specifically configured to: and setting unlocking time, personnel number, lock end number, unlocking times and geographic position coordinate range.
CN202310205847.2A 2023-03-06 2023-03-06 Intelligent electronic lock management system and management method Pending CN116229618A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310205847.2A CN116229618A (en) 2023-03-06 2023-03-06 Intelligent electronic lock management system and management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310205847.2A CN116229618A (en) 2023-03-06 2023-03-06 Intelligent electronic lock management system and management method

Publications (1)

Publication Number Publication Date
CN116229618A true CN116229618A (en) 2023-06-06

Family

ID=86580306

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310205847.2A Pending CN116229618A (en) 2023-03-06 2023-03-06 Intelligent electronic lock management system and management method

Country Status (1)

Country Link
CN (1) CN116229618A (en)

Similar Documents

Publication Publication Date Title
JP4016019B2 (en) Apparatus, system, and method for providing authorized remote access to a target system
US8930700B2 (en) Remote device secure data file storage system and method
AU2006278422B2 (en) System and method for user identification and authentication
CN109410406A (en) A kind of authorization method, device and system
CN111080845B (en) Temporary unlocking method, system, door lock, administrator terminal and readable storage medium
US8707444B2 (en) Systems and methods for implementing application control security
CN106161032A (en) A kind of identity authentication method and device
WO2004086244A1 (en) Memory device and pass code generator
CN112769808B (en) Mobile fort machine for industrial local area network, operation and maintenance method thereof and computer equipment
CN110070650A (en) A kind of intelligent unlocking method and system of intelligent distribution box
CN108629172B (en) A kind of fingerprint management method and system
CN107979472A (en) A kind of coding lock system and authentication method
CN114550353B (en) Intelligent lockset control system of transformer substation
CN109003368B (en) Bluetooth access control system offline password updating method and Bluetooth access control system
CN110738764A (en) Security control system and method based on intelligent lock
CN112425116B (en) Intelligent door lock wireless communication method, intelligent door lock, gateway and communication equipment
KR101949934B1 (en) Apparatus and Method for Monitering Equipment Using Augmented Reality Image
CN111063070B (en) Digital key sharing method, digital key verification method and digital key verification equipment
CN100476841C (en) Method and system for centrally managing code to hard disk of enterprise
CN208272988U (en) A kind of coding lock system and device
CN116229618A (en) Intelligent electronic lock management system and management method
CN114218557A (en) AI and cloud control-based user data security protection method and device
CN114255533A (en) Intelligent lock system and implementation method thereof
CN113593088A (en) Intelligent unlocking method, intelligent lock, mobile terminal and server
JPH11202765A (en) Ciphered information processor, ciphered information processing method and recording medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination