WO2015117507A1 - Procédé d'authentification, dispositif de collecte, dispositif et système d'authentification, et armoire et son procédé de déverrouillage - Google Patents
Procédé d'authentification, dispositif de collecte, dispositif et système d'authentification, et armoire et son procédé de déverrouillage Download PDFInfo
- Publication number
- WO2015117507A1 WO2015117507A1 PCT/CN2014/094000 CN2014094000W WO2015117507A1 WO 2015117507 A1 WO2015117507 A1 WO 2015117507A1 CN 2014094000 W CN2014094000 W CN 2014094000W WO 2015117507 A1 WO2015117507 A1 WO 2015117507A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- identification information
- feature identification
- physiological feature
- authentication
- user
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Definitions
- the present invention relates to the field of communications, and in particular, to an authentication method, a collecting device, an authentication device and system, and a cabinet and an unlocking method thereof.
- a pattern recognition system that utilizes physiological characteristic information such as fingerprint information and face information of a user is increasingly used, for example, in an advanced access control system.
- the fingerprint information or the face information of the authorized user are stored locally in the collection terminal (for example, the fingerprint collection terminal and the face information collection terminal); and such collection terminals are generally arranged in a relatively prominent manner.
- the place is convenient for the user to input relevant information, for example, when the application is an access control system, such collection terminals are generally installed in a public place outside the door. Therefore, the fingerprint information or the facial information of the authorized user stored in the collection terminal may be damaged, stolen or falsified, which is a potential safety hazard.
- Embodiments of the present invention provide an authentication method, a collection device, an authentication device and system, and a cabinet and an unlocking method thereof, which solve the problem of low security of the existing identification system.
- an embodiment of the present invention provides an authentication method, including:
- the authentication device receives the physiological feature identification information sent by the collecting device by remote communication;
- the authentication device matches the physiological feature identification information with a preset authorized physiological feature identification information list, and determines whether the user corresponding to the physiological feature identification information is an authorized user.
- the method before the authenticating device receives the physiological feature identification information, the method further includes:
- the authentication device receives the physiological feature identification information of the designated authorized user that is sent by the collecting device by remote communication;
- the authentication device stores the physiological feature identification information of the designated authorized user in the authorized user physiological feature identification information list.
- the method further includes storing the physiological feature identification information in the illegal user physiological feature identification information list.
- the authentication device when the authenticating device determines that the user corresponding to the physiological feature identification information is an authorized user, the authentication device further includes issuing a remote unlocking instruction to the electronic lock device connected to the communication device.
- the physiological feature identification information includes at least one of fingerprint information, face information, eye information, and palm shape information.
- an embodiment of the present invention further provides an authentication method, including:
- the collecting device collects physiological feature identification information for identifying the current user identity
- the collecting device sends the physiological feature identification information to the authentication device through remote communication to authenticate the identity of the user.
- the method further includes:
- the collecting device collects physiological feature identification information of the designated authorized user
- the collecting device transmits the collected physiological characteristic identification information of the designated authorized user to the authentication device by remote communication.
- the physiological feature identification information includes at least one of fingerprint information, face information, eye information, and palm shape information.
- an embodiment of the present invention further provides an authentication method, including:
- the collecting device collects physiological feature identification information for identifying the current user identity
- the collecting device sends the physiological feature identification information to the authentication device by remote communication;
- the authentication device receives the physiological feature identification information sent by the collecting device by remote communication;
- the authentication device matches the physiological feature identification information with a preset authorized physiological feature identification information list, and determines whether the user corresponding to the physiological feature identification information is an authorized user.
- an embodiment of the present invention further provides a cabinet unlocking method, where the cabinet is provided with a collecting device and an electronic lock device for locking the cabinet door; the collecting device and the electronic lock device Remotely communicating with the authentication device;
- the collecting device collects physiological feature identification information for identifying the current user identity, and sends the physiological feature identification information to the authentication device through remote communication to authenticate the identity of the user;
- the electronic lock device receives a remote unlocking command sent by the authentication device when the user is an authorized user according to the physiological feature identification information, and performs unlocking according to the remote unlocking instruction.
- the embodiment of the present invention further provides an authentication device, including an information receiving module and an authentication module;
- the information receiving module is configured to receive physiological feature identification information that is sent by the collecting device by remote communication;
- the authentication module is configured to match the physiological feature identification information with a preset authorized user physiological feature identification information list, and determine whether the user corresponding to the physiological feature identification information is an authorized user.
- an illegal user list maintenance module is further included;
- the illegal user list maintenance module is configured to store the physiological feature identification information in the illegal user physiological feature identification information list when the authentication module determines that the user corresponding to the physiological feature identification information is not an authorized user.
- the embodiment of the present invention further provides a collection device, including an information collection module and an information transmission module;
- the information collection module is configured to collect physiological feature identification information for identifying a current user identity
- the information sending module is configured to send the physiological feature identification information to the authentication device by remote communication to authenticate the identity of the user.
- an embodiment of the present invention further provides an authentication system, including an acquisition device and an authentication device;
- the collecting device is configured to collect physiological feature identification information for identifying a current user identity, and send the physiological feature identification information to the authentication device by using remote communication;
- the authentication device is configured to receive physiological feature identification information that is sent by the collecting device by remote communication; and perform the physiological feature identification information and the preset authorized user physiological feature identification information list. Matching, determining whether the user corresponding to the physiological feature identification information is an authorized user.
- the authenticating device is further configured to: when the user corresponding to the physiological feature identification information is not an authorized user, store the physiological feature identification information in the illegal user physiological feature identification information list.
- the electronic lock device is further configured to: when determining that the user corresponding to the physiological feature identification information is an authorized user, sending a remote unlocking instruction to the electronic lock device; the electronic lock device is configured to: The unlocking is performed according to the remote unlocking instruction.
- an embodiment of the present invention further provides a cabinet, including a cabinet body, a cabinet door disposed on the cabinet body, an electronic lock device adapted to lock the cabinet door, and the cabinet body or the a collecting device on the cabinet door, wherein the collecting device and the electronic lock device are respectively remotely connected to the authentication device;
- the collecting device is configured to collect physiological feature identification information for identifying a current user identity, and send the physiological feature identification information to the authentication device by remote communication to authenticate the identity of the user;
- the electronic lock device is configured to receive a remote unlocking instruction sent by the authentication device when determining that the user is an authorized user according to the physiological feature identification information, and unlocking according to the remote unlocking instruction.
- the embodiment of the invention further provides a computer program and a carrier thereof, the computer program comprising program instructions, when the program instruction is executed by the authentication device, enabling the device to implement the method for authenticating.
- the authentication method, the collecting device, the authentication device and the system, the cabinet and the unlocking method thereof are provided separately, and the collecting device and the authentication device are separately set; and then the collecting device collects the physiological feature identification information identifying the current user identity. And transmitting to the authentication device by remote communication; the authentication device receives the physiological feature identification information sent by the collection device, and matches the physiological feature identification information with the preset authorized user physiological feature identification information list to complete the authentication.
- the physiological characteristic identification information of the authorized user is not stored on the collecting device, but the physiological characteristic identification information of the authorized user is stored on the side of the remote authentication device; therefore, other users may be prevented from being exposed to the external collecting device.
- the physiological characteristic identification information of the authorized user stored in the store is destroyed, stolen or tampered with, and improved The security of authentication management.
- FIG. 1 is a schematic structural diagram 1 of an authentication system according to Embodiment 1 of the present invention.
- FIG. 2 is a schematic structural diagram 2 of an authentication system according to Embodiment 1 of the present invention.
- FIG. 3 is a schematic structural diagram of a collection device according to Embodiment 1 of the present invention.
- FIG. 4 is a schematic structural diagram of an authentication apparatus according to Embodiment 1 of the present invention.
- FIG. 5 is a schematic structural diagram of a cabinet management system according to Embodiment 2 of the present invention.
- FIG. 6 is a schematic diagram of a fingerprint information input process of an authorized user according to Embodiment 3 of the present invention.
- FIG. 7 is a schematic diagram of a process for an authorized person to open a cabinet door according to Embodiment 3 of the present invention.
- FIG. 8 is a schematic diagram of a process for an unauthorized person to open a cabinet door according to Embodiment 3 of the present invention.
- FIG. 9 is a schematic diagram of an event query process according to Embodiment 3 of the present invention.
- FIG. 10 is a schematic diagram of event recording according to Embodiment 3 of the present invention.
- Embodiment 1 is a diagrammatic representation of Embodiment 1:
- FIG. 1 is a schematic structural diagram 1 of an authentication system according to Embodiment 1 of the present invention.
- the authentication system provided in this embodiment includes an acquisition device and an authentication device.
- the collection device and the authentication device are respectively disposed on different hardware terminals, and the two are remotely connected through a remote communication interface.
- the remote communication connection in this embodiment refers to a communication connection between different hardware devices; it is to distinguish communication between different functional modules in the same hardware device.
- the remote communication in this embodiment may be implemented through various networks or through various data lines. I will not repeat them here.
- the collecting device mainly collects physiological feature identification information for identifying the user identity, and sends the information to the authentication device through remote communication to perform identity authentication processing on the user;
- the authentication device receives the physiological feature identification information sent by the collecting device by remote communication, and matches the physiological feature identification information with a preset authorized physiological feature identification information list, and determines whether the user corresponding to the physiological feature identification information is authorized. user.
- the physiological characteristic identification information of the authorized user is not stored on the side of the collecting device, and the collecting device is mainly used for collecting and forwarding the physiological characteristic identification information of the user.
- the physiological characteristic identification information of the authorized user is stored in the back end. On the authentication device, this can avoid the user's physiological feature identification information acquired by other users from the front-end collection device, thereby causing various security risks.
- the authorized user physiological feature identification information in this embodiment may be stored directly on the authentication device locally, or may be stored in other remote databases or servers, and the authentication device needs to be used again.
- the physiological feature identification information in the embodiment includes at least one of fingerprint information, face information, eye information, and palm shape information. That is, the present embodiment can perform authentication by fingerprint recognition, face recognition, eye recognition, and/or palm shape recognition. Specifically, the information may be selected according to a specific application scenario. For example, the fingerprint identification and the face recognition technology may be used for authentication. The physiological feature identification information acquired at this time may include the user's fingerprint information and facial information.
- the physiological characteristic information and the user identity information (including name, gender, etc.) of the corresponding user may be directly imported from other devices;
- the collecting device collects the physiological characteristic information of the designated authorized user, and then stores the physiological characteristic information and the corresponding user identity information in the authorized user physiological characteristic identification information list.
- the collection device is further configured to collect the physiological feature identification information of the designated authorized user, and send the collected physiological characteristic identification information of the designated authorized user to the identification through remote communication.
- Right device for archival purposes.
- the collecting device may further encrypt the physiological feature identification information before sending the collected physiological feature identification information to the authentication device; correspondingly, the authentication device is receiving After the physiological feature identification information, it can be decrypted first.
- the authentication device in the embodiment determines that the user corresponding to the physiological feature identification information is not an authorized user, the authentication device stores the physiological feature identification information in the illegal user physiological feature identification information list for subsequent calling. For example, after a security incident occurs, the illegal user can be checked by calling the physiological characteristic information of the user that has been accessed in the illegal user physiological characteristic identification information list.
- FIG. 2 is a schematic structural diagram 2 of an authentication system according to Embodiment 1 of the present invention.
- the authentication system provided in this embodiment may further include an electronic lock device, and the electronic lock device also implements a remote communication connection with the authentication device through the remote communication interface.
- the electronic lock device can be used in a variety of access control systems, including in a variety of cabinets.
- the remote unlocking instruction may be issued to the electronic lock device; and the electronic lock device completes the unlocking according to the remote unlocking command.
- the authentication device when the authentication device determines that the user corresponding to the physiological feature identification information is not an authorized user, the authentication device may perform alarms in various manners, such as issuing an alarm sound and/or lighting a warning light.
- the authentication device may also generate a corresponding event record for each authentication process and store it for subsequent maintenance and management.
- the event record can specifically record user identity information and event related time information.
- FIG. 3 is a schematic structural diagram of a collection apparatus according to Embodiment 1 of the present invention; the collection apparatus in this embodiment includes a processor, a data storage, and a program memory, and the collection apparatus includes information collection. Module, information sending module;
- the information collection module is adapted to collect physiological feature identification information for identifying the current user identity
- the information sending module is adapted to send the obtained physiological feature identification information to the authentication device by remote communication to authenticate the identity of the user.
- the information collection module is further adapted to collect physiological characteristic information for the first use of the authorized user, and send the information to the authentication device for archiving by remote communication.
- the authentication device in this embodiment includes:
- the information receiving module is adapted to receive physiological feature identification information that is sent by the collecting device by remote communication, and the physiological feature identification information may be physiological characteristic information used for archiving when the user is used for the first time; or may be physiological for authentication Characteristic information
- the authentication module is adapted to match the physiological feature identification information with the preset authorized user physiological feature identification information list, and determine whether the user corresponding to the physiological feature identification information is an authorized user; if yes, send an unlock to the electronic lock control module An instruction; if not, storing the physiological feature identification information in the list of illegal user physiological characteristic identification information for subsequent invocation; and performing an alarm through the alarm module;
- An alarm module configured to trigger an alarm to perform an alarm, such as an audible alarm
- the event recording module is adapted to record the user identity information of each authentication and the related time information of the event, etc., to be called by a total subsequent query;
- the event query module is adapted to invoke the corresponding event record by inputting the query condition; or query the user physiological feature identification information in the list of illegal user physiological characteristic identification information, and return the query result;
- the fingerprint information database is applicable to the storage maintenance authorized user physiological characteristic identification information list and the illegal user physiological characteristic identification information list;
- the authorized user list maintenance module is configured to store the identity information of the authorized user and the corresponding physiological feature identification information in the authorized user physiological feature identification information list.
- the illegal user list maintenance module is configured to store the physiological feature identification information in the illegal user physiological feature identification information list when the authentication module determines that the user corresponding to the physiological feature identification information is not an authorized user.
- Embodiment 2 is a diagrammatic representation of Embodiment 1:
- FIG. 5 is a schematic structural diagram of a cabinet management system according to Embodiment 2 of the present invention.
- the cabinet and the remote authentication device 5 the cabinet includes a cabinet body 1, a cabinet door disposed on the cabinet body, an electronic lock device 3 for locking the cabinet door, and a cabinet
- the collecting device 4 on the main body or the cabinet door, the collecting device 4 and the electronic lock device 3 are respectively connected in a remote communication with the authentication device 5.
- the collecting device 4, the authenticating device 5 and the electronic lock device 3 in this embodiment can specifically adopt the collecting device, the authentication device and the electronic lock device described in the first embodiment; wherein:
- the collecting device 4 collects physiological feature identification information for identifying the current user identity, and transmits the physiological feature identification information to the authentication device 5 through remote communication;
- the authentication device 5 receives the physiological feature identification information sent by the collecting device 4 through the remote communication, and matches the physiological feature identification information with the preset authorized user physiological feature identification information list, and determines whether the user corresponding to the physiological feature identification information is authorized. a user; if yes, sending a remote unlocking command to the electronic lock device 3;
- the electronic lock device 3 receives the remote unlocking command sent by the authentication device according to the physiological feature identification information when the corresponding user is an authorized user, and unlocks according to the remote unlocking command; so that the user opens the cabinet door 2.
- the security cabinet based on the pattern recognition system provides the identification and identification of the physiological characteristic identification information, effectively preventing the damage and operation of the cabinet by unauthorized personnel, and improving the safety of the cabinet. .
- the manual maintenance information of the cabinet equipment is recorded, the maintenance efficiency of the equipment is improved, and the backtracking means after the occurrence of the safety quality accident is provided.
- Embodiment 3 is a diagrammatic representation of Embodiment 3
- the specific application of the present invention is illustrated by taking fingerprint recognition as an example on the basis of the second embodiment.
- the collection device at this time may be fingerprint information collection.
- the terminal is mainly used for collecting fingerprint information of the user.
- the specific application process is as follows:
- FIG. 6 is a schematic diagram of a fingerprint information input process of an authorized user according to Embodiment 3 of the present invention.
- the fingerprint information input process of the authorized user includes:
- Step 601 The authorized personnel input fingerprint information by using a fingerprint information collecting terminal installed on the cabinet door.
- Step 602 The fingerprint information collecting terminal encrypts the fingerprint information and transmits the fingerprint information to the remote authentication device through the remote communication interface.
- Step 603 The authorized user list maintenance module in the authentication device stores the fingerprint information of the authorized person and the identity information such as the name into the authorized user physiological characteristic identification information list in the fingerprint information database, and completes the fingerprint information input.
- FIG. 7 is a schematic diagram of a process for an authorized person to open a cabinet door according to Embodiment 3 of the present invention.
- the process of authorizing personnel to open the cabinet door includes:
- Step 701 The authorized personnel input fingerprint information by using a fingerprint information collecting terminal installed on the cabinet door.
- Step 702 The fingerprint information collecting terminal encrypts the fingerprint information and transmits the fingerprint information to the authentication device through the remote communication interface.
- Step 703 The authentication module in the authentication device decrypts the fingerprint information collected by the fingerprint information collecting terminal and matches the information of the authorized user's physiological feature identification information list, and determines that the user corresponding to the fingerprint is an authorized person; notifying the electronic lock control The module issues a remote unlocking command and notifies the event recording module;
- Step 704 The event recording module records information such as the identity of the operator and the time associated with the event;
- Step 705 After receiving the notification, the electronic lock control module sends a remote unlocking instruction to the electronic lock device through the remote communication interface.
- Step 706 The electronic lock device installed on the cabinet door receives the remote unlocking command through the remote communication interface, and opens the door lock according to the instruction.
- FIG. 8 is a schematic diagram of a process for an unauthorized person to open a cabinet door according to Embodiment 3 of the present invention.
- the process of opening an enclosure door by an unauthorized person includes:
- Step 801 The authorized personnel input fingerprint information by using a fingerprint information collecting terminal installed on the cabinet door.
- Step 802 The fingerprint information collecting terminal encrypts the fingerprint information and transmits the fingerprint information to the authentication device through the remote communication interface.
- Step 803 The authentication module in the authentication device decrypts the fingerprint information collected by the fingerprint information collecting terminal and matches the information of the authorized user's physiological feature identification information list, and determines that the user corresponding to the fingerprint is an unauthorized person; the notification alarm module And an event recording module, and recording the unauthorized fingerprint information into the list of illegal user physiological characteristic identification information;
- Step 804 The event recording module records information such as an operator identity (unauthorized personnel) and an event-related time;
- Step 805 The alarm module triggers an alarm and issues an alarm sound.
- FIG. 9 is a schematic diagram of an event query process according to Embodiment 3 of the present invention.
- the process of event query includes:
- Step 901 Log in on the authentication device
- Step 902 query conditions input through the event query module
- Step 903 The event query module queries the operator of the event recording module, the operation time, and the like, and returns the query result.
- Step 904 further query the unauthorized personnel information through the event query module; as shown in FIG. 10, the queried information includes the user name, the operation start time, the operation end time, the operation duration, and whether the alarm is reported (when an unauthorized person is found) When you want to open the cabinet);
- Step 905 The event query module queries the fingerprint information of the unauthorized person in the list of the physiological feature identification information of the illegal user in the fingerprint information database and returns the query result.
- all or part of the steps of the foregoing embodiments may also be implemented by using an integrated circuit, and the steps may be separately fabricated into integrated circuit modules, or multiple modules thereof or The steps are made into a single integrated circuit module.
- the invention is not limited to any specific combination of hardware and software.
- the devices/function modules/functional units in the above embodiments may be implemented by a general-purpose computing device, which may be centralized on a single computing device or distributed over a network of multiple computing devices.
- each device/function module/functional unit in the above embodiment When each device/function module/functional unit in the above embodiment is implemented in the form of a software function module and sold or used as a stand-alone product, it can be stored in a computer readable storage medium.
- the above mentioned computer readable storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
- the embodiment of the invention discloses an authentication method, a collecting device, an authentication device and a system, a cabinet and an unlocking method thereof, and the collecting device and the authentication device are separately set, and the physiological feature identification information of the authorized user is not stored on the collecting device. Rather, the authorized user's physiological feature identification information is stored on the remote authentication device side, which can prevent other users from destroying, stealing or tampering the authorized user's physiological feature identification information stored in the exposed collection device, thereby improving the authentication management. Security.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
Abstract
L'invention concerne un procédé d'authentification, un dispositif de collecte, un dispositif et un système d'authentification, et une armoire ainsi qu'un procédé de déverrouillage associé. Le procédé comprend les étapes consistant à : recueillir, au moyen d'un dispositif de collecte, des informations d'identification de caractéristiques physiologiques concernant une identité d'utilisateur courant, et les envoyer à un dispositif d'authentification par l'intermédiaire d'une communication à distance; recevoir, par le dispositif d'authentification, les informations d'identification de caractéristiques physiologiques envoyées par le dispositif de collecte, et mettre en correspondance les informations d'identification de caractéristiques physiologiques avec une liste prédéterminée d'informations d'identification de caractéristiques physiologiques concernant des utilisateurs autorisés pour terminer l'authentification; ne pas stocker les informations d'identification de caractéristiques physiologiques concernant les utilisateurs autorisés dans le dispositif de collecte; stocker les informations d'identification de caractéristiques physiologiques concernant les utilisateurs autorisés dans un dispositif d'authentification à distance; et agencer le dispositif de collecte et le dispositif d'authentification séparément. Cette solution peut empêcher d'autres utilisateurs d'endommager, ou de violer ou voler des informations d'identification de caractéristiques physiologiques concernant les utilisateurs autorisés dans un dispositif de collecte, et d'améliorer la sécurité de gestion d'authentification.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410353811.X | 2014-07-23 | ||
CN201410353811.XA CN105320865A (zh) | 2014-07-23 | 2014-07-23 | 鉴权方法、采集装置、鉴权装置及系统、机柜及解锁方法 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015117507A1 true WO2015117507A1 (fr) | 2015-08-13 |
Family
ID=53777312
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2014/094000 WO2015117507A1 (fr) | 2014-07-23 | 2014-12-16 | Procédé d'authentification, dispositif de collecte, dispositif et système d'authentification, et armoire et son procédé de déverrouillage |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105320865A (fr) |
WO (1) | WO2015117507A1 (fr) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017041458A1 (fr) * | 2015-09-08 | 2017-03-16 | 京东方科技集团股份有限公司 | Procédé de reconnaissance d'identité, terminal d'émission, terminal de réception, dispositif pouvant être porté et système de reconnaissance d'identité |
CN109522696A (zh) * | 2018-12-20 | 2019-03-26 | 金航数码科技有限责任公司 | 一种基于双因子生物识别方式的安全机柜及其管控方法 |
CN111061579A (zh) * | 2019-12-31 | 2020-04-24 | 安徽智恒信科技股份有限公司 | 一种多状态机事件驱动智能柜流转信息的方法和系统 |
CN112819670A (zh) * | 2021-01-08 | 2021-05-18 | 北京嘀嘀无限科技发展有限公司 | 信息处理方法、装置、可读存储介质和电子设备 |
CN116049790A (zh) * | 2022-06-28 | 2023-05-02 | 荣耀终端有限公司 | 一种解锁方法、装置及电子设备 |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190114858A1 (en) * | 2017-10-16 | 2019-04-18 | Raritan Americas, Inc. | System for controlling access to an equipment rack and intelligent power distribution unit and control unit used therein |
CN111734221B (zh) * | 2020-06-23 | 2022-02-11 | 上海市信息管线有限公司 | 井盖开锁方法、装置、设备、存储介质和系统 |
CN113970895A (zh) * | 2021-10-25 | 2022-01-25 | 国网天津市电力公司电力科学研究院 | 一种用于信息机房的智能机柜系统 |
CN114500107B (zh) * | 2022-04-02 | 2022-06-17 | 公安部信息通信中心 | 一种跨平台的服务协同与鉴权系统 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1492375A (zh) * | 2003-09-04 | 2004-04-28 | 杰 陈 | 一种指纹识别技术应用于银行柜员内控管理的方法 |
CN101748939A (zh) * | 2009-12-17 | 2010-06-23 | 上海电机学院 | 指纹遥控锁及其控制方法 |
CN103106736A (zh) * | 2012-12-28 | 2013-05-15 | 华为软件技术有限公司 | 一种身份认证方法、终端及服务器 |
CN203573385U (zh) * | 2013-11-16 | 2014-04-30 | 福州广发电气设备有限公司 | 基于指纹安全识别的开关柜 |
-
2014
- 2014-07-23 CN CN201410353811.XA patent/CN105320865A/zh not_active Withdrawn
- 2014-12-16 WO PCT/CN2014/094000 patent/WO2015117507A1/fr active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1492375A (zh) * | 2003-09-04 | 2004-04-28 | 杰 陈 | 一种指纹识别技术应用于银行柜员内控管理的方法 |
CN101748939A (zh) * | 2009-12-17 | 2010-06-23 | 上海电机学院 | 指纹遥控锁及其控制方法 |
CN103106736A (zh) * | 2012-12-28 | 2013-05-15 | 华为软件技术有限公司 | 一种身份认证方法、终端及服务器 |
CN203573385U (zh) * | 2013-11-16 | 2014-04-30 | 福州广发电气设备有限公司 | 基于指纹安全识别的开关柜 |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017041458A1 (fr) * | 2015-09-08 | 2017-03-16 | 京东方科技集团股份有限公司 | Procédé de reconnaissance d'identité, terminal d'émission, terminal de réception, dispositif pouvant être porté et système de reconnaissance d'identité |
CN109522696A (zh) * | 2018-12-20 | 2019-03-26 | 金航数码科技有限责任公司 | 一种基于双因子生物识别方式的安全机柜及其管控方法 |
CN111061579A (zh) * | 2019-12-31 | 2020-04-24 | 安徽智恒信科技股份有限公司 | 一种多状态机事件驱动智能柜流转信息的方法和系统 |
CN111061579B (zh) * | 2019-12-31 | 2024-02-02 | 安徽智恒信科技股份有限公司 | 一种多状态机事件驱动智能柜流转信息的方法和系统 |
CN112819670A (zh) * | 2021-01-08 | 2021-05-18 | 北京嘀嘀无限科技发展有限公司 | 信息处理方法、装置、可读存储介质和电子设备 |
CN116049790A (zh) * | 2022-06-28 | 2023-05-02 | 荣耀终端有限公司 | 一种解锁方法、装置及电子设备 |
Also Published As
Publication number | Publication date |
---|---|
CN105320865A (zh) | 2016-02-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2015117507A1 (fr) | Procédé d'authentification, dispositif de collecte, dispositif et système d'authentification, et armoire et son procédé de déverrouillage | |
CN107038777B (zh) | 一种基于智能门锁系统的安全通信方法及其智能门锁系统 | |
CN107993326A (zh) | 基于身份证识别和人脸识别的开锁方法、装置及系统 | |
CN105261096A (zh) | 一种网络智能锁系统 | |
CN103473844A (zh) | 公租房智能控制方法及系统 | |
CN202003425U (zh) | 一种智能锁监控中央管理系统 | |
CN109711126A (zh) | 一种计算机信息安全管理系统及方法 | |
US20200098208A1 (en) | Security control device, security control method, security system and storage medium | |
CN103580872A (zh) | 一种用于密钥生成与管理的系统及方法 | |
CN101406350A (zh) | 一种指纹文件柜系统及其控制方法 | |
CN110310406A (zh) | 一种智能门锁的开锁方法及智能门锁 | |
CN111767583A (zh) | 基于区块链的企业内部信息安全保障方法及系统 | |
CN110298196A (zh) | 一种电子信息安全存储系统及存储方法 | |
US20150186677A1 (en) | Server chassis physical security enforcement | |
CN106292646B (zh) | 一种电网控制端数据端口监控系统及方法 | |
CN109684804A (zh) | 一种bmc串口的安全保护方法与系统 | |
CN104680670A (zh) | 银行卡和atm机关键控制点(再)加密技术解决方案 | |
CN112699987B (zh) | 一种利用锁具的工作任务监控方法及系统 | |
CN201343952Y (zh) | 一种综合柜 | |
CN109285256A (zh) | 基于区块链身份验证的机房进门权限给定方法 | |
CN106150271A (zh) | 一种防盗装置、系统和保险柜 | |
CN106982204A (zh) | 可信安全平台 | |
CN112100662A (zh) | 一种区域数据安全监控系统 | |
CN109584421A (zh) | 一种基于国产安全芯片的智能门锁认证管理系统 | |
CN112637172A (zh) | 一种新型数据安全与保密方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14881477 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 14881477 Country of ref document: EP Kind code of ref document: A1 |