WO2019204954A1 - Smart lock system - Google Patents

Smart lock system Download PDF

Info

Publication number
WO2019204954A1
WO2019204954A1 PCT/CN2018/084014 CN2018084014W WO2019204954A1 WO 2019204954 A1 WO2019204954 A1 WO 2019204954A1 CN 2018084014 W CN2018084014 W CN 2018084014W WO 2019204954 A1 WO2019204954 A1 WO 2019204954A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
terminal
verification
server
change
Prior art date
Application number
PCT/CN2018/084014
Other languages
French (fr)
Chinese (zh)
Inventor
裘炅
裘晃
Original Assignee
杭州全视软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 杭州全视软件有限公司 filed Critical 杭州全视软件有限公司
Priority to PCT/CN2018/084014 priority Critical patent/WO2019204954A1/en
Publication of WO2019204954A1 publication Critical patent/WO2019204954A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • the invention relates to a smart lock system.
  • the existing electronic code locks only use the generation of a password or a carrier (such as an electronic key such as an IC card).
  • the electronic key can also use a dynamic password.
  • the password in the non-volatile memory and the electronic key is dynamically updated by an algorithm or a random code during data exchange between the electronic key and the combination lock. It's not easy to copy or crack others.
  • encryption technology it has been widely used in hotels, office buildings and homes. However, the following problems exist:
  • the electronic lock basically adopts a chip with weak computing power such as single-chip microcomputer, and it is difficult to implement it by asymmetric encryption.
  • the process information auditing ability is not strong: it is impossible to verify the information of the relevant personnel who unlocked, and it is more difficult to use it as sufficient evidence to audit the process information. In addition, each time the opening and closing time needs to be registered.
  • a smart lock system including a smart lock terminal and a terminal processing system
  • the terminal processing system includes a first input module, a first login module, and a terminal server and a plurality of sub-servers, wherein the terminal server is configured to store identity information of a super user corresponding to each smart lock and super for all smart lock terminals.
  • the user manages; a sub-server corresponds to a smart lock terminal, which is used for information management of the user of the smart lock terminal (superuser information and authorized user information and update of the smart lock), unlock verification, and recording of unlocking events. .
  • the smart lock terminal includes a second input module, a second login module, and a lock core control module;
  • the second input module is configured to input a change request to change the authorized user; the change request includes the identification information and the change instruction, where the change instruction is to add an authorized user, delete the authorized user; and the change request is logged into the sub-server by the second login module.
  • the identification information is verified. If the verification condition is met, the verification is passed, and the authorized user is added or deleted according to the change instruction; and the child server generates a change log, including the time and the change request.
  • the verification condition is: including identification information of one or more super users;
  • the second input module is further configured to input the unlocking verification information, and include the identification information; the unlocking verification information is verified by the second login module to log in to the sub-server for unlocking, and if the verification condition is met, the verification is passed, and the sub-server sends a control information to control
  • the lock cylinder control module unlocks; at the same time, the sub-server generates an unlock log, including time and unlock verification information.
  • the verification condition is: including identification information of one or more unlocked users, and the unlocked user is an authorized user or a super user.
  • the first input module is configured to input a change request of the super user, including the identification information, the change instruction, and the change object (using the id of the smart lock terminal as an input), and the change request is performed by the first login module to log in to the terminal server to perform the identification information.
  • Verification if the verification condition is met, the verification is passed, and the super user information in the private chain corresponding to the designated smart lock terminal is changed according to the change instruction; and the terminal server generates the change log, including the time and the change request.
  • the verification condition is: including one or more identification information of the super user corresponding to the change object.
  • the terminal server further stores the identity information of the administrator.
  • the terminal server When the super user changes, if the change request originates from the administrator, the verification is passed, and according to the change instruction, the designated smart lock terminal corresponds to the super in the private chain. User information is changed; the terminal server generates a change log, including time and change requests.
  • the identification information is one or more of biometric information, an identity ID (eg, an ID number, etc.).
  • the information input of the first input module and the second input module is implemented by remote input, and the remote input mode is specifically: generating the summary (plain text) by using the SHA256 method, and using the key for the summary information. Encrypting generates a digest signature, and sends the input information + abstract (plaintext) + digest signature + public key to the first input module or the second input module together; the first input module or the second input module decrypts the digest signature with the public key to obtain the original Summary, compared with the abstract (plain text), consistently upload the input information to the terminal server or sub-server through the login module.
  • terminal server and the plurality of sub-servers are located in a blockchain system, and the terminal server is located on a public chain of the blockchain system, and the sub-servers are respectively located on a private chain of the blockchain system.
  • the public and private chains package the generated logs out of blocks.
  • the change instruction of the change authorized user further includes a clock instruction, where the clock instruction corresponds to a valid time for the newly authorized user.
  • the child server also stores a fund account of each authorized user, and the child server deducts the fee from the fund account according to the effective time of the user.
  • the sub-server queries the fund account balance, and when the balance is greater than the threshold, the unlocking verification step is entered.
  • the invention has the beneficial effects that the invention can realize the secondary encryption management combined with the intelligent terminal, realizes the transparent security management mechanism, can ensure the security of the lock under the autonomous management, and can realize the convenience of the lock security management: support for the transfer authorization , temporary users, paying users, and multi-coordination mechanisms to achieve multiple business models.
  • FIG. 1 is a schematic structural view of a smart lock system of the present invention.
  • the present invention relates to a smart lock system including a smart lock terminal and a terminal processing system;
  • the terminal processing system includes a first input module, a first login module, and a terminal server and a plurality of sub-servers, the terminal
  • the server is configured to store the identity information of the super user corresponding to each smart lock and manage the super users of all the smart lock terminals; one sub server corresponds to one smart lock terminal, and is used for information management of the user of the smart lock terminal ( Records the superuser information and authorized user information and updates of the smart lock), unlock verification, and unlocking events.
  • the smart lock terminal includes a second input module, a second login module, and a lock core control module.
  • a smart lock according to the present invention as a residence of a family of three, a family of three males as super users has advanced authority, and the hostess and the child are authorized users; the identity information of the male owner is stored in the terminal server.
  • a family of three identification information is stored in a sub-server; super users and authorized users are collectively referred to as legitimate users.
  • the manufacturer of the lock or the corresponding authority as an administrator is also stored in the terminal service.
  • the management of the smart lock system of the present invention includes the following aspects;
  • Unlocking verification a touch screen that can be set on the smart lock, or a face recognition device, a fingerprint recognition device, etc. (second input module) inputs the unlock verification information, including the identification information; the unlock verification information is passed through the second login module ( The wireless module built into the smart lock is used to log in to the sub-server for unlock verification. If the verification condition is met, the verification is passed, the sub-server sends a control message, and the lock core control module is controlled to unlock; and the sub-server generates an unlock log, including time and time. Unlock the verification information.
  • the verification condition is that the input verification information includes legal identification information, that is, the unlocking can be implemented only when the legal identification information is input.
  • the authentication information needs to include the identification information of multiple legitimate users before the unlocking can be implemented.
  • the above-mentioned unlocking verification information can be input through a touch screen disposed on the smart lock, or through a mobile phone wirelessly connected to the built-in processor of the smart lock.
  • This kind of remote input method can improve security by: inputting the information into the digest (clear text) by means of SHA256, and encrypting the digest information with the key to generate the digest signature, and input the information + abstract (clear text) + Abstract signature + public key is sent to the first input module or the second input module together; the first input module or the second input module decrypts the digest signature with the public key to obtain the original digest, compares with the abstract (plain text), and consistently logs in.
  • the module uploads the entered information to a terminal server or subserver.
  • the change request is input through the second input module, and the change request includes the identification information and the change instruction, where the change instruction is to add an authorized user, delete the authorized user; and the change request is submitted to the sub-server by the second login module to submit the change.
  • the requested user performs verification. If the user submitting the change request is a legitimate user, if the verification condition is met, the verification is passed, and the authorized user is added or deleted according to the change instruction; and the child server generates a change log, including the time and the change request. Changes to legitimate users in the child server can be achieved through simple form processing, which is common knowledge in the art.
  • a zero-time permission that is, add a user with a time command through the change request.
  • the user satisfies the legal user condition within a valid time frame and can be unlocked by entering an unlock request. Otherwise, it is an illegal user.
  • the smart lock according to the present invention can also be used to implement security protection and automatic charging, specifically: storing the legal user's fund account in the child server, and the child server is based on the effective time of the user. , deduct the fee from the fund account.
  • the sub-server usually needs to query the fund account balance, and when the balance is greater than the threshold, the unlock verification step is entered. The input of information such as the fund account can be completed at the time of user registration.
  • Super user changes super users as the main responsibility of smart locks, has an important position. Superuser changes can be changed from the application, or they can be changed by an administrator, such as the manufacturer of the lock or the appropriate authority.
  • the change verification occurs on the terminal server, and the change request is input through the first input module, and the terminal server verifies the change request. If the verification condition is met, the verification is passed, and the designated smart lock terminal corresponds to the private chain according to the change instruction.
  • the superuser information is changed; the terminal server generates a change log, including time and change requests.
  • the verification condition is: including one or more identification information of the super user corresponding to the change object, or the verification information of the administrator, and the verification information of the administrator may be pre-stored in the terminal server.
  • the information input of the first input module can also be realized by remote input.
  • the terminal server and the plurality of sub-servers are located in a blockchain system, and the terminal server is located on a public chain of the blockchain system, and the sub-servers are respectively located on a private chain of the blockchain system.
  • the public and private chains package the generated logs out of blocks.
  • the identification information of the present invention is one or more of biometric information (such as fingerprint, facial features, retina, etc.), identity ID (eg, ID number, etc.).
  • a terminal (software) having identification of biological information such as fingerprints or face recognition, a lock having a wireless connection function, a lock, a microprocessor, a memory, a wireless connection unit, and an unlocking device.
  • the biometric identification information can be stored in the lock, registered at the time of initialization, or newly registered by the super user registered at the time of initialization.
  • the manufacturer of the lock or the corresponding authoritative department has a special blockchain that can register the superuser's authority. When purchasing, it registers multiple superusers, and registers the registration information, biometric information and public key in the blockchain. Register as a super user when locking the network (such as via a mobile phone).
  • the blockchain can be checked for example, such as the number of super users who are currently locked, and related registration information.
  • the terminal will collect biometric information, generate a digest (plain text) by means of SHA256, etc., and encrypt the digest information with a key to generate a digest signature, and send the biometric information + abstract (plain text) + digest signature + public key to the lock, lock
  • the public key is used to decrypt the digest signature to obtain the original digest, which is consistent with the abstract (plain text), and then the biometric information is compared with the biometric information registered in the lock and unlocked, and the lock is unanimous.
  • the relevant unlock record is sent to the terminal.
  • the super user can authorize the biometric identification of the relevant authority, collect the newly registered biometric information, and then generate the digest 1 (plain text) by means of SHA256 according to the unlocking method, and simultaneously encrypt the digest 1 with the key to generate the digest signature 1; At the same time, the biometric information is used again, and the digest 2 (plain text) is generated by the digest method such as SHA256, and the digest 2 is encrypted by the key to generate the digest signature 2.
  • the two pieces of information are respectively sent to the lock, and after the lock is received and verified, the biometric identification information is confirmed to be an administrative user, and then the registration may be performed, otherwise the rejection may be made; when the transmission is set, the management user may be set, that is, the newly registered creature may be The identification information is marked as an administrative user.
  • the registration information is sent to the terminal.
  • the registered personnel can be obtained remotely, and the deletion can be performed by the person who has verified the relevant authority, and the administrator is not allowed to delete.
  • the deletion operation process is also registered.
  • the key with biometric identification such as fingerprint (with no chip inside)
  • the relevant fingerprint information is sent to the lock after short-distance wireless method, the lock is received, and the comparison is made inside, and the registration can be started after confirming registration.
  • the person who needs administrator rights can authorize to open, that is, the administrator + administrator agrees that the authorized person can open, and the authorized person can be allowed to register or not.
  • the authorized person opens the biometric information of the person, generates the digest 1 (plain text) by means of SHA256, etc., and encrypts the digest 1 with the key to generate the digest signature 1; at the same time, adds the biometric information of the authorizer, and summarizes with SHA256, etc.
  • the mode generates summary 2 (plaintext), and the digest 2 is encrypted with a key to generate a digest signature 2. Send the above information to the lock separately:
  • the lock verifies the biometric information of the authorized person, and if the verification passes, the lock is opened, and the biometric information of the authorized person and the authorized person is registered.
  • the lock After the lock verifies the biometric information of the authorized person, it also needs to verify the current time. If the time is not within the allowable range, the prompt cannot be opened.
  • the public security or manufacturer remote maintenance interface can also be set, and the trusted blockchain remote unlocking and remote maintenance can be realized through the interface.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Lock And Its Accessories (AREA)

Abstract

A smart lock system, comprising a smart lock terminal and a terminal processing system. The terminal processing system comprises an input module, a terminal server, and a plurality of sub-servers, the terminal server being used for storing identity information of super users corresponding to each smart lock and managing the super users of all of the smart lock terminals. One sub-server corresponds to one smart terminal and is used for management of the information of the user of each smart lock terminal, unlocking verification, and recording unlocking events.

Description

一种智能锁系统Intelligent lock system 技术领域Technical field
本发明涉及一种智能锁系统。The invention relates to a smart lock system.
背景技术Background technique
目前,现有的电子密码锁,只是采用密码的产生或载体(如IC卡等电子钥匙)。电子钥匙还可以使用动态密码,随着电子钥匙的每次使用,在电子钥匙和密码锁进行数据交换的过程中,通过算法或随机码动态更新非易失性存储器和电子钥匙中的密码,使之不易别他人仿制或破解。通过加密技术的发展,已经在宾馆、写字楼和家庭中广泛使用。但是存在以下问题:At present, the existing electronic code locks only use the generation of a password or a carrier (such as an electronic key such as an IC card). The electronic key can also use a dynamic password. With each use of the electronic key, the password in the non-volatile memory and the electronic key is dynamically updated by an algorithm or a random code during data exchange between the electronic key and the combination lock. It's not easy to copy or crack others. Through the development of encryption technology, it has been widely used in hotels, office buildings and homes. However, the following problems exist:
1.加、解密强度不大:电子锁基本采用单片机等运算能力较弱的芯片,很难采用非对称加密方式来执行;1. The strength of addition and decryption is not great: the electronic lock basically adopts a chip with weak computing power such as single-chip microcomputer, and it is difficult to implement it by asymmetric encryption.
2.过程信息审计能力不强:无法验证开锁的相关人员信息,更难于做为充分的证据来进行过程信息的审计,另外每次开和关门时间都需要登记详尽。2. The process information auditing ability is not strong: it is impossible to verify the information of the relevant personnel who unlocked, and it is more difficult to use it as sufficient evidence to audit the process information. In addition, each time the opening and closing time needs to be registered.
3.必须要有实体钥匙:基本需要采用实体钥匙,一旦实体钥匙被复制,很难确保安全。3. There must be a physical key: the physical key is basically required, and once the physical key is copied, it is difficult to ensure security.
4.临时授权无法实现:当多方协同才能开锁时,很难实现。4. Temporary authorization cannot be realized: it is difficult to achieve when multiple parties can work together to unlock.
发明内容Summary of the invention
本发明的目的在于针对现有技术的不足,提供一种智能锁系统。It is an object of the present invention to provide a smart lock system in view of the deficiencies of the prior art.
本发明的目的是通过以下技术方案实现的;一种智能锁系统,包括智能锁终端和终端处理系统;The object of the present invention is achieved by the following technical solutions; a smart lock system, including a smart lock terminal and a terminal processing system;
所述终端处理系统包括第一输入模块、第一登录模块以及终端服务器和多个子服务器,所述终端服务器用于存储对应于每一个智能锁的超级用户的身份信息和对所有智能锁终端的超级用户进行管理;一个子服务器对应一个智能锁终端,用于对该智能锁终端的用户的信息管理(存储该智能锁的超级用户信息和授权用户信息及更新)、开锁验证、以及开锁事件的记录。The terminal processing system includes a first input module, a first login module, and a terminal server and a plurality of sub-servers, wherein the terminal server is configured to store identity information of a super user corresponding to each smart lock and super for all smart lock terminals. The user manages; a sub-server corresponds to a smart lock terminal, which is used for information management of the user of the smart lock terminal (superuser information and authorized user information and update of the smart lock), unlock verification, and recording of unlocking events. .
所述智能锁终端包括第二输入模块、第二登录模块和锁芯控制模块;The smart lock terminal includes a second input module, a second login module, and a lock core control module;
第二输入模块用于输入变更请求,以变更授权用户;变更请求包含身份识别信息和变更指令,所述变更指令为增加授权用户、删除授权用户;该变更请求经第二登录模块登录子服务器对身份识别信息进行验证,若满足验证条件,则验证通过,并依据变更指令增加或删除 授权用户;同时子服务器生成变更日志,包括时间和变更请求。其中验证条件为:包含一个或多个超级用户的身份识别信息;The second input module is configured to input a change request to change the authorized user; the change request includes the identification information and the change instruction, where the change instruction is to add an authorized user, delete the authorized user; and the change request is logged into the sub-server by the second login module. The identification information is verified. If the verification condition is met, the verification is passed, and the authorized user is added or deleted according to the change instruction; and the child server generates a change log, including the time and the change request. The verification condition is: including identification information of one or more super users;
第二输入模块还用于输入开锁验证信息,包含身份识别信息;该开锁验证信息经第二登录模块登录子服务器进行开锁验证,若满足验证条件,则验证通过,子服务器发送一控制信息,控制锁芯控制模块进行开锁;同时子服务器生成解锁日志,包括时间和开锁验证信息。其中验证条件为:包含一个或多个开锁用户的身份识别信息,开锁用户为授权用户或超级用户。The second input module is further configured to input the unlocking verification information, and include the identification information; the unlocking verification information is verified by the second login module to log in to the sub-server for unlocking, and if the verification condition is met, the verification is passed, and the sub-server sends a control information to control The lock cylinder control module unlocks; at the same time, the sub-server generates an unlock log, including time and unlock verification information. The verification condition is: including identification information of one or more unlocked users, and the unlocked user is an authorized user or a super user.
第一输入模块用于输入超级用户的变更请求,包含身份识别信息、变更指令和变更对象(以智能锁终端的id作为输入),该变更请求经第一登录模块登录终端服务器对身份识别信息进行验证,若满足验证条件,则验证通过,并依据变更指令对指定的智能锁终端所对应对私链中的超级用户信息进行变更;同时终端服务器生成变更日志,包括时间和变更请求。其中验证条件为:包含一个或多个对应于变更对象的超级用户的身份识别信息。The first input module is configured to input a change request of the super user, including the identification information, the change instruction, and the change object (using the id of the smart lock terminal as an input), and the change request is performed by the first login module to log in to the terminal server to perform the identification information. Verification, if the verification condition is met, the verification is passed, and the super user information in the private chain corresponding to the designated smart lock terminal is changed according to the change instruction; and the terminal server generates the change log, including the time and the change request. The verification condition is: including one or more identification information of the super user corresponding to the change object.
进一步地,终端服务器还存储管理员的身份识别信息,在超级用户变更时,若变更请求来源于管理员,则验证通过,并依据变更指令对指定的智能锁终端所对应对私链中的超级用户信息进行变更;同时终端服务器生成变更日志,包括时间和变更请求。Further, the terminal server further stores the identity information of the administrator. When the super user changes, if the change request originates from the administrator, the verification is passed, and according to the change instruction, the designated smart lock terminal corresponds to the super in the private chain. User information is changed; the terminal server generates a change log, including time and change requests.
进一步地,身份识别信息为生物识别信息、身份ID(如、身份证号等)中的一种或多种。Further, the identification information is one or more of biometric information, an identity ID (eg, an ID number, etc.).
进一步地,第一输入模块和第二输入模块的信息输入是通过远程输入来实现,远程输入方式具体为:将输入的信息,用SHA256等方式生成摘要(明文),同时将摘要信息用密钥加密生成摘要签名,将输入的信息+摘要(明文)+摘要签名+公钥一起发给第一输入模块或第二输入模块;第一输入模块或第二输入模块用公钥解密摘要签名获得原摘要,与摘要(明文)比对,一致通过登录模块将输入的信息上传至终端服务器或子服务器。Further, the information input of the first input module and the second input module is implemented by remote input, and the remote input mode is specifically: generating the summary (plain text) by using the SHA256 method, and using the key for the summary information. Encrypting generates a digest signature, and sends the input information + abstract (plaintext) + digest signature + public key to the first input module or the second input module together; the first input module or the second input module decrypts the digest signature with the public key to obtain the original Summary, compared with the abstract (plain text), consistently upload the input information to the terminal server or sub-server through the login module.
进一步地,终端服务器和多个子服务器位于一区块链系统中,终端服务器位于区块链系统的公链上,所述子服务器分别位于区块链系统的一私链上。公链和私链对生成的日志打包出块。Further, the terminal server and the plurality of sub-servers are located in a blockchain system, and the terminal server is located on a public chain of the blockchain system, and the sub-servers are respectively located on a private chain of the blockchain system. The public and private chains package the generated logs out of blocks.
进一步地,在变更授权用户的变更指令中还包括时钟指令,该时钟指令对应于对新增授权用户的有效时间。Further, the change instruction of the change authorized user further includes a clock instruction, where the clock instruction corresponds to a valid time for the newly authorized user.
进一步地,子服务器还保存有每个授权用户的资金账户,子服务器根据该用户的有效时间,从资金账户中扣除费用。Further, the child server also stores a fund account of each authorized user, and the child server deducts the fee from the fund account according to the effective time of the user.
进一步地,在开锁前,子服务器查询资金账户余额,当余额大于阈值,则进入开锁验证步骤。Further, before unlocking, the sub-server queries the fund account balance, and when the balance is greater than the threshold, the unlocking verification step is entered.
本发明的有益效果在于:本发明可实现智能终端结合的二级加密管理,实现透明式安全 管理机制;可以确保锁在自治管理下的安全性;可以实现锁安全管理的便利性:支持转授权、临时用户、付费用户、多协同机制,从而实现多种商业模式。The invention has the beneficial effects that the invention can realize the secondary encryption management combined with the intelligent terminal, realizes the transparent security management mechanism, can ensure the security of the lock under the autonomous management, and can realize the convenience of the lock security management: support for the transfer authorization , temporary users, paying users, and multi-coordination mechanisms to achieve multiple business models.
附图说明DRAWINGS
图1为本发明智能锁系统的结构示意图。1 is a schematic structural view of a smart lock system of the present invention.
具体实施方式detailed description
如图1所示,本发明涉及一种智能锁系统,包括智能锁终端和终端处理系统;所述终端处理系统包括第一输入模块、第一登录模块以及终端服务器和多个子服务器,所述终端服务器用于存储对应于每一个智能锁的超级用户的身份信息和对所有智能锁终端的超级用户进行管理;一个子服务器对应一个智能锁终端,用于对该智能锁终端的用户的信息管理(存储该智能锁的超级用户信息和授权用户信息及更新)、开锁验证、以及开锁事件的记录。所述智能锁终端包括第二输入模块、第二登录模块和锁芯控制模块。As shown in FIG. 1 , the present invention relates to a smart lock system including a smart lock terminal and a terminal processing system; the terminal processing system includes a first input module, a first login module, and a terminal server and a plurality of sub-servers, the terminal The server is configured to store the identity information of the super user corresponding to each smart lock and manage the super users of all the smart lock terminals; one sub server corresponds to one smart lock terminal, and is used for information management of the user of the smart lock terminal ( Records the superuser information and authorized user information and updates of the smart lock), unlock verification, and unlocking events. The smart lock terminal includes a second input module, a second login module, and a lock core control module.
以一家三口所在的居所采用本发明所述的智能锁为例,一家三口中男主人作为超级用户,具有高级权限,女主人和孩子为授权用户;男主人的身份识别信息存储于终端服务器中,一家三口的身份识别信息存储于子服务器中;超级用户和授权用户以下统称合法用户。Taking a smart lock according to the present invention as a residence of a family of three, a family of three males as super users has advanced authority, and the hostess and the child are authorized users; the identity information of the male owner is stored in the terminal server. A family of three identification information is stored in a sub-server; super users and authorized users are collectively referred to as legitimate users.
此外,锁的生产厂家或相应权威部门作为管理员,其相关身份识别信息也存储于终端服务中。In addition, the manufacturer of the lock or the corresponding authority as an administrator, its associated identification information is also stored in the terminal service.
本发明智能锁系统的管理包括以下几个方面;The management of the smart lock system of the present invention includes the following aspects;
1.开锁验证:可以设置在智能锁上的触摸屏、或人脸识别装置、指纹识别装置等(第二输入模块)输入开锁验证信息,包含身份识别信息;该开锁验证信息经第二登录模块(内置于智能锁中的无线模块)登录子服务器进行开锁验证,若满足验证条件,则验证通过,子服务器发送一控制信息,控制锁芯控制模块进行开锁;同时子服务器生成解锁日志,包括时间和开锁验证信息。其中验证条件为:输入的验证信息中,包含合法的身份识别信息,即当且仅当输入合法的身份识别信息时,方可实现开锁。1. Unlocking verification: a touch screen that can be set on the smart lock, or a face recognition device, a fingerprint recognition device, etc. (second input module) inputs the unlock verification information, including the identification information; the unlock verification information is passed through the second login module ( The wireless module built into the smart lock is used to log in to the sub-server for unlock verification. If the verification condition is met, the verification is passed, the sub-server sends a control message, and the lock core control module is controlled to unlock; and the sub-server generates an unlock log, including time and time. Unlock the verification information. The verification condition is that the input verification information includes legal identification information, that is, the unlocking can be implemented only when the legal identification information is input.
对于安全级别的场所,需要多个合法用户一同开锁,此时,需要验证信息中包含多个合法用户的身份识别信息,方可实现开锁。For a security-level location, multiple legitimate users need to be unlocked together. In this case, the authentication information needs to include the identification information of multiple legitimate users before the unlocking can be implemented.
上述开锁验证信息的输入可以通过设置在智能锁上的触摸屏,也可以通过于智能锁内置的处理器无线连接的手机进行输入。这种远程输入的方式,可以采用以下手段提高安全性:将输入的信息,用SHA256等方式生成摘要(明文),同时将摘要信息用密钥加密生成摘要签名,将输入的信息+摘要(明文)+摘要签名+公钥一起发给第一输入模块或第二输入模块;第一输入模块或第二输入模块用公钥解密摘要签名获得原摘要,与摘要(明文)比对,一致通过登录模块将输入的信息上传至终端服务器或子服务器。The above-mentioned unlocking verification information can be input through a touch screen disposed on the smart lock, or through a mobile phone wirelessly connected to the built-in processor of the smart lock. This kind of remote input method can improve security by: inputting the information into the digest (clear text) by means of SHA256, and encrypting the digest information with the key to generate the digest signature, and input the information + abstract (clear text) + Abstract signature + public key is sent to the first input module or the second input module together; the first input module or the second input module decrypts the digest signature with the public key to obtain the original digest, compares with the abstract (plain text), and consistently logs in. The module uploads the entered information to a terminal server or subserver.
对于上述开锁验证,超级用户和授权用户具有相同权限。For the above unlock verification, the super user and the authorized user have the same permissions.
2.授权用户的变更:同上,在授权用户的变更上,超级用户和授权用户具有相同权限。变更方法如下:通过第二输入模块输入变更请求,变更请求包含身份识别信息和变更指令,所述变更指令为增加授权用户、删除授权用户;该变更请求经第二登录模块登录子服务器对提交变更请求的用户进行验证,若提交变更请求的用户为合法用户,则满足验证条件,则验证通过,并依据变更指令增加或删除授权用户;同时子服务器生成变更日志,包括时间和变更请求。子服务器中合法用户的变更可通过简单的表格处理实现,为本领域的公知常识。2. Authorized User Change: Same as above, the super user and the authorized user have the same authority on the change of the authorized user. The change method is as follows: the change request is input through the second input module, and the change request includes the identification information and the change instruction, where the change instruction is to add an authorized user, delete the authorized user; and the change request is submitted to the sub-server by the second login module to submit the change. The requested user performs verification. If the user submitting the change request is a legitimate user, if the verification condition is met, the verification is passed, and the authorized user is added or deleted according to the change instruction; and the child server generates a change log, including the time and the change request. Changes to legitimate users in the child server can be achieved through simple form processing, which is common knowledge in the art.
对于临时用户,则设置一零时权限,即通过变更请求增加一具有时间指令的用户。该用户在有效的时间范围内满足合法用户条件,可通过输入开锁请求进行开锁。否则,为非法用户。For temporary users, set a zero-time permission, that is, add a user with a time command through the change request. The user satisfies the legal user condition within a valid time frame and can be unlocked by entering an unlock request. Otherwise, it is an illegal user.
对于消费型的自行车、胶囊酒店等,也可以采用本发明所述的智能锁实现安全保障及自动收费,具体为:将合法用户的资金账户存储于子服务器中,子服务器根据该用户的有效时间,从资金账户中扣除费用。作为本领域的公知常识,子服务器通常需要查询资金账户余额,当余额大于阈值,则进入开锁验证步骤。资金账户等信息的输入可在用户注册时完成。For a consumer bicycle, a capsule hotel, etc., the smart lock according to the present invention can also be used to implement security protection and automatic charging, specifically: storing the legal user's fund account in the child server, and the child server is based on the effective time of the user. , deduct the fee from the fund account. As is common knowledge in the art, the sub-server usually needs to query the fund account balance, and when the balance is greater than the threshold, the unlock verification step is entered. The input of information such as the fund account can be completed at the time of user registration.
3.超级用户变更,超级用户作为智能锁的主要责任人,具有重要地位。超级用户的变更可以自申请变更,也可以通过管理员,例如锁的生产厂家或相应权威部门进行他变更。该变更验证发生在终端服务器上,需要通过第一输入模块输入变更请求,终端服务器验证变更请求,若满足验证条件,则验证通过,并依据变更指令对指定的智能锁终端所对应对私链中的超级用户信息进行变更;同时终端服务器生成变更日志,包括时间和变更请求。其中验证条件为:包含一个或多个对应于变更对象的超级用户的身份识别信息,或包含管理员的验证信息,管理员的验证信息可以预先存储于终端服务器。3. Super user changes, super users as the main responsibility of smart locks, has an important position. Superuser changes can be changed from the application, or they can be changed by an administrator, such as the manufacturer of the lock or the appropriate authority. The change verification occurs on the terminal server, and the change request is input through the first input module, and the terminal server verifies the change request. If the verification condition is met, the verification is passed, and the designated smart lock terminal corresponds to the private chain according to the change instruction. The superuser information is changed; the terminal server generates a change log, including time and change requests. The verification condition is: including one or more identification information of the super user corresponding to the change object, or the verification information of the administrator, and the verification information of the administrator may be pre-stored in the terminal server.
同第二输入模块,第一输入模块的信息输入也可以通过远程输入来实现。With the second input module, the information input of the first input module can also be realized by remote input.
对于本发明,可以引入区块链技术,进一步提高安全性。上述的终端服务器和多个子服务器位于一区块链系统中,终端服务器位于区块链系统的公链上,所述子服务器分别位于区块链系统的一私链上。公链和私链对生成的日志打包出块。For the present invention, blockchain technology can be introduced to further improve security. The terminal server and the plurality of sub-servers are located in a blockchain system, and the terminal server is located on a public chain of the blockchain system, and the sub-servers are respectively located on a private chain of the blockchain system. The public and private chains package the generated logs out of blocks.
本发明所述的身份识别信息为生物识别信息(如指纹、面部特征、视网膜等)、身份ID(如、身份证号等)中的一种或多种。The identification information of the present invention is one or more of biometric information (such as fingerprint, facial features, retina, etc.), identity ID (eg, ID number, etc.).
实例:Example:
有指纹或人脸识别等生物信息识别的终端(软件),一把具有无线连接功能的锁,锁还有微处理器、存储器、无线连接单元、开锁装置。A terminal (software) having identification of biological information such as fingerprints or face recognition, a lock having a wireless connection function, a lock, a microprocessor, a memory, a wireless connection unit, and an unlocking device.
可以在锁里存储相关生物识别信息,初始化时可进行登记,也可以用初始化时登记的超 级用户来新登记。The biometric identification information can be stored in the lock, registered at the time of initialization, or newly registered by the super user registered at the time of initialization.
锁的生产厂家或相应权威部门有专门的区块链可以登记超级用户权限的人员,购买时并登记多个超级用户,将登记信息、生物识别信息和公钥登记在区块链中,同时在锁联网(如通过手机联网)时登记成超级用户。The manufacturer of the lock or the corresponding authoritative department has a special blockchain that can register the superuser's authority. When purchasing, it registers multiple superusers, and registers the registration information, biometric information and public key in the blockchain. Register as a super user when locking the network (such as via a mobile phone).
该区块链可以备查,比如查出当前锁的超级用户数、相关登记信息。The blockchain can be checked for example, such as the number of super users who are currently locked, and related registration information.
一旦需要增加、删除时,经区块链管理组织和锁主(自然人、法人)同意后,即可进行增、删,同时要求锁进行联网(可通过手机联网)同步增、删。Once it needs to be added or deleted, it can be added or deleted after the blockchain management organization and the lock master (natural person, legal person) agree, and the lock is required to be connected to the network (can be connected via mobile phone).
1、有权限的人开锁1. Authorized person unlocks
终端将采集生物识别信息,用SHA256等方式生成摘要(明文),同时将摘要信息用密钥加密生成摘要签名,将生物识别信息+摘要(明文)+摘要签名+公钥一起发给锁,锁接收到,用公钥解密摘要签名获得原摘要,与摘要(明文)比对一致,再将生物识别信息与锁中的有登记可开锁的进行生物识别信息进行对比,一致则开锁。同时将相关开锁记录发送到终端中。The terminal will collect biometric information, generate a digest (plain text) by means of SHA256, etc., and encrypt the digest information with a key to generate a digest signature, and send the biometric information + abstract (plain text) + digest signature + public key to the lock, lock Upon receiving, the public key is used to decrypt the digest signature to obtain the original digest, which is consistent with the abstract (plain text), and then the biometric information is compared with the biometric information registered in the lock and unlocked, and the lock is unanimous. At the same time, the relevant unlock record is sent to the terminal.
2、有权限的人登记(管理)2. Authorized person registration (management)
超级用户,可以授权登记相关权限的生物识别,将新登记生物识别信息采集过来,然后按开锁方式,用SHA256等方式生成摘要1(明文),同时将摘要1用密钥加密生成摘要签名1;同时再用自身的生物识别信息,用SHA256等摘要方式生成摘要2(明文),同时将摘要2用密钥加密生成摘要签名2。将二段信息分别发送到锁中,锁接收后经验证无识,确认自身生物识别信息为管理用户,则可以进行登记,否则拒绝;发送时可设定管理用户,即可以将此新登记生物识别信息标为管理用户。The super user can authorize the biometric identification of the relevant authority, collect the newly registered biometric information, and then generate the digest 1 (plain text) by means of SHA256 according to the unlocking method, and simultaneously encrypt the digest 1 with the key to generate the digest signature 1; At the same time, the biometric information is used again, and the digest 2 (plain text) is generated by the digest method such as SHA256, and the digest 2 is encrypted by the key to generate the digest signature 2. The two pieces of information are respectively sent to the lock, and after the lock is received and verified, the biometric identification information is confirmed to be an administrative user, and then the registration may be performed, otherwise the rejection may be made; when the transmission is set, the management user may be set, that is, the newly registered creature may be The identification information is marked as an administrative user.
新登记生物识别信息+摘要1(明文)+摘要1签名New registration biometric information + summary 1 (plain text) + summary 1 signature
自身生物识别信息+摘要2(明文)+摘要2签名Self biometric information + summary 2 (plain text) + abstract 2 signature
同时登记信息发送到终端上。At the same time, the registration information is sent to the terminal.
3、有权限的人删除(管理)3, the person with authority to delete (management)
可以远程获取有登记的人员,可以在验证有相关权限的人员进行删除操作,管理员不允许删除。The registered personnel can be obtained remotely, and the deletion can be performed by the person who has verified the relevant authority, and the administrator is not allowed to delete.
删除操作过程也登记上。The deletion operation process is also registered.
4、有生物识别的相关钥匙结合4, the key combination of biometric identification
带指纹等生物识别的钥匙(内部无芯片),经过短距离无线方式将相关指纹信息发送给锁,锁接收,并在里面进行比对,确认有登记后才可以开启。The key with biometric identification such as fingerprint (with no chip inside), the relevant fingerprint information is sent to the lock after short-distance wireless method, the lock is received, and the comparison is made inside, and the registration can be started after confirming registration.
5、安全式远程授权登记管理5. Secure remote authorization registration management
远程打开时,需要管理员权限的人授权才能打开,即管理员+管理员同意授权的人员才能 打开,可以允许授权的人员已登记,也可以不登记。When remotely opening, the person who needs administrator rights can authorize to open, that is, the administrator + administrator agrees that the authorized person can open, and the authorized person can be allowed to register or not.
采集被授权人打开人员的生物识别信息,用SHA256等方式生成摘要1(明文),同时将摘要1用密钥加密生成摘要签名1;同时再加上授权人的生物识别信息,用SHA256等摘要方式生成摘要2(明文),同时将摘要2用密钥加密生成摘要签名2。将以上信息分别发送到锁中:The authorized person opens the biometric information of the person, generates the digest 1 (plain text) by means of SHA256, etc., and encrypts the digest 1 with the key to generate the digest signature 1; at the same time, adds the biometric information of the authorizer, and summarizes with SHA256, etc. The mode generates summary 2 (plaintext), and the digest 2 is encrypted with a key to generate a digest signature 2. Send the above information to the lock separately:
被授权人生物识别信息+摘要1(明文)+摘要1签名+授权人生物识别信息+摘要2(明文)+摘要2签名Licensee Biometric Information + Abstract 1 (Clear Text) + Abstract 1 Signature + Authorizer Biometric Information + Abstract 2 (Clear Text) + Abstract 2 Signature
锁验证授权人的生物识别信息,验证通过,则打开锁,并把授权人和被授权人的生物信息登记上。The lock verifies the biometric information of the authorized person, and if the verification passes, the lock is opened, and the biometric information of the authorized person and the authorized person is registered.
另外在锁关闭时,也需要登记。Also, when the lock is closed, registration is also required.
这样确保了二锁(二人)才能打开锁。This ensures that the second lock (two people) can open the lock.
6、远程授权登记管理(临时用户管理)6, remote authorization registration management (temporary user management)
为了避免以上情况永久有信(只要信息重播即可),只在一段时间内授权,则需要加上时间信息,即:In order to avoid the above situation, there is a permanent letter (as long as the information is replayed), and only authorized for a period of time, you need to add time information, namely:
被授权人生物识别信息+摘要1(明文)+摘要1签名+授权人生物识别信息+授权时间范围+摘要2(明文)+摘要2签名Authorized person biometric information + abstract 1 (plain text) + abstract 1 signature + author biometric information + authorization time range + abstract 2 (plain text) + abstract 2 signature
锁验证授权人的生物识别信息后,同时需要验证当前时间,如果时间不在允许范围内,则提示无法打开。After the lock verifies the biometric information of the authorized person, it also needs to verify the current time. If the time is not within the allowable range, the prompt cannot be opened.
7、区块链式管理(公安及相关验证)7. Blockchain management (public security and related verification)
通过对锁的联网功能,可以实现用户登记、用户删除、用户授权及锁开关状态的区块链管理。Through the networking function of the lock, blockchain management of user registration, user deletion, user authorization, and lock switch status can be realized.
同时也可以设置公安或厂商远程维护接口,通过接口实现可信的区块链远程开锁及远程维护。At the same time, the public security or manufacturer remote maintenance interface can also be set, and the trusted blockchain remote unlocking and remote maintenance can be realized through the interface.

Claims (8)

  1. 一种智能锁系统,其特征在于,包括智能锁终端和终端处理系统;所述终端处理系统包括第一输入模块、第一登录模块以及终端服务器和多个子服务器,所述终端服务器用于存储对应于每一个智能锁的超级用户的身份信息和对所有智能锁终端的超级用户进行管理;一个子服务器对应一个智能锁终端,用于对该智能锁终端的用户的信息管理(存储该智能锁的超级用户信息和授权用户信息及更新)、开锁验证、以及开锁事件的记录;A smart lock system, comprising: a smart lock terminal and a terminal processing system; the terminal processing system comprises a first input module, a first login module, and a terminal server and a plurality of sub-servers, wherein the terminal server is configured to store a corresponding The identity information of the super user of each smart lock and the super user of all the smart lock terminals are managed; one sub server corresponds to one smart lock terminal, and is used for information management of the user of the smart lock terminal (storing the smart lock Superuser information and authorized user information and updates), unlock verification, and recording of unlocking events;
    所述智能锁终端包括第二输入模块、第二登录模块和锁芯控制模块;The smart lock terminal includes a second input module, a second login module, and a lock core control module;
    第二输入模块用于输入变更请求,以变更授权用户;变更请求包含身份识别信息和变更指令,所述变更指令为增加授权用户、删除授权用户;该变更请求经第二登录模块登录子服务器对身份识别信息进行验证,若满足验证条件,则验证通过,并依据变更指令增加或删除授权用户;同时子服务器生成变更日志,包括时间和变更请求;其中验证条件为:包含一个或多个超级用户的身份识别信息;The second input module is configured to input a change request to change the authorized user; the change request includes the identification information and the change instruction, where the change instruction is to add an authorized user, delete the authorized user; and the change request is logged into the sub-server by the second login module. The identification information is verified. If the verification condition is met, the verification is passed, and the authorized user is added or deleted according to the change instruction; and the sub-server generates a change log, including the time and the change request; wherein the verification condition is: one or more super users are included Identification information;
    第二输入模块还用于输入开锁验证信息,包含身份识别信息;该开锁验证信息经第二登录模块登录子服务器进行开锁验证,若满足验证条件,则验证通过,子服务器发送一控制信息,控制锁芯控制模块进行开锁;同时子服务器生成解锁日志,包括时间和开锁验证信息;其中验证条件为:包含一个或多个开锁用户的身份识别信息,开锁用户为授权用户或超级用户;The second input module is further configured to input the unlocking verification information, and include the identification information; the unlocking verification information is verified by the second login module to log in to the sub-server for unlocking, and if the verification condition is met, the verification is passed, and the sub-server sends a control information to control The lock core control module performs unlocking; at the same time, the sub-server generates an unlock log, including time and unlock verification information; wherein the verification condition is: including identification information of one or more unlocked users, and the unlocked user is an authorized user or a super user;
    第一输入模块用于输入超级用户的变更请求,包含身份识别信息、变更指令和变更对象(以智能锁终端的id作为输入),该变更请求经第一登录模块登录终端服务器对身份识别信息进行验证,若满足验证条件,则验证通过,并依据变更指令对指定的智能锁终端所对应对私链中的超级用户信息进行变更;同时终端服务器生成变更日志,包括时间和变更请求;其中验证条件为:包含一个或多个对应于变更对象的超级用户的身份识别信息。The first input module is configured to input a change request of the super user, including the identification information, the change instruction, and the change object (using the id of the smart lock terminal as an input), and the change request is performed by the first login module to log in to the terminal server to perform the identification information. Verification, if the verification condition is met, the verification is passed, and the superuser information in the private chain corresponding to the designated smart lock terminal is changed according to the change instruction; and the terminal server generates the change log, including the time and the change request; wherein the verification condition Is: Contains one or more identification information of the superuser corresponding to the change object.
  2. 根据权利要求1所述的系统,其特征在于,终端服务器还存储管理员的身份识别信息,在超级用户变更时,若变更请求来源于管理员,则验证通过,并依据变更指令对指定的智能锁终端所对应对私链中的超级用户信息进行变更;同时终端服务器生成变更日志,包括时间和变更请求。The system according to claim 1, wherein the terminal server further stores the identification information of the administrator. When the super user changes, if the change request is from the administrator, the verification is passed, and the specified smart is determined according to the change instruction. The lock terminal corresponds to the change of the super user information in the private chain; at the same time, the terminal server generates a change log, including the time and the change request.
  3. 根据权利要求1所述的系统,其特征在于,身份识别信息为生物识别信息、身份ID中的一种或多种;所述生物识别信息包括但不限于指纹、面部特征、视网膜;身份ID包括但不限于身份证号。The system according to claim 1, wherein the identification information is one or more of biometric information, an identity ID; the biometric information includes but is not limited to a fingerprint, a facial feature, a retina; and the identity ID includes But not limited to the ID number.
  4. 根据权利要求1所述的系统,其特征在于,第一输入模块和第二输入模块的信息输入 是通过远程输入来实现,远程输入方式具体为:将输入的信息,用SHA256等方式生成摘要(明文),同时将摘要信息用密钥加密生成摘要签名,将输入的信息+摘要(明文)+摘要签名+公钥一起发给第一输入模块或第二输入模块;第一输入模块或第二输入模块用公钥解密摘要签名获得原摘要,与摘要(明文)比对,一致通过登录模块将输入的信息上传至终端服务器或子服务器。The system according to claim 1, wherein the information input of the first input module and the second input module is implemented by remote input, and the remote input mode is specifically: generating the summary by using the input information, such as SHA256 ( Clearly), the summary information is encrypted by the key to generate a digest signature, and the input information + abstract (plain text) + digest signature + public key is sent to the first input module or the second input module together; the first input module or the second The input module decrypts the digest signature with the public key to obtain the original digest, compares it with the digest (plain text), and uploads the input information to the terminal server or subserver through the login module.
  5. 根据权利要求1所述的系统,其特征在于,终端服务器和多个子服务器位于一区块链系统中,终端服务器位于区块链系统的公链上,所述子服务器分别位于区块链系统的一私链上;公链和私链对生成的日志打包出块。The system according to claim 1, wherein the terminal server and the plurality of sub-servers are located in a blockchain system, and the terminal server is located on a public chain of the blockchain system, the sub-servers being respectively located in the blockchain system On a private chain; the public and private chains package the generated logs.
  6. 根据权利要求1所述的系统,其特征在于,在变更授权用户的变更指令中还包括时钟指令,该时钟指令对应于对新增授权用户的有效时间。The system of claim 1 further comprising a clock command in the change instruction of the change authorized user, the clock command corresponding to a valid time for the newly authorized user.
  7. 根据权利要求6所述的系统,其特征在于,子服务器还保存有每个授权用户的资金账户,子服务器根据该用户的有效时间,从资金账户中扣除费用。The system of claim 6 wherein the sub-server further maintains a funds account for each authorized user, and the sub-server deducts the fee from the funds account based on the effective time of the user.
  8. 根据权利要求7所述的系统,其特征在于,在开锁前,子服务器查询资金账户余额,当余额大于阈值,则进入开锁验证步骤。The system according to claim 7, wherein the sub-server queries the fund account balance before unlocking, and when the balance is greater than the threshold, the unlocking verification step is entered.
PCT/CN2018/084014 2018-04-23 2018-04-23 Smart lock system WO2019204954A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/084014 WO2019204954A1 (en) 2018-04-23 2018-04-23 Smart lock system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/084014 WO2019204954A1 (en) 2018-04-23 2018-04-23 Smart lock system

Publications (1)

Publication Number Publication Date
WO2019204954A1 true WO2019204954A1 (en) 2019-10-31

Family

ID=68294337

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/084014 WO2019204954A1 (en) 2018-04-23 2018-04-23 Smart lock system

Country Status (1)

Country Link
WO (1) WO2019204954A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111431965A (en) * 2020-02-21 2020-07-17 浙江吉利控股集团有限公司 Vehicle operation authority management method, terminal and system
CN112702413A (en) * 2020-12-21 2021-04-23 梓昆(杭州)押运安保服务有限公司 Intelligent escort cash box system, control method, computer equipment and storage medium
CN112702412A (en) * 2020-12-21 2021-04-23 梓昆(杭州)押运安保服务有限公司 Batch multi-dimensional switch money box control system, control method, equipment and medium
CN112910886A (en) * 2021-01-29 2021-06-04 中国电力科学研究院有限公司 Method and system for verifying identity of lock
CN113963464A (en) * 2021-10-11 2022-01-21 安徽中科晶格技术有限公司 Bank safe deposit box unlocking system and method based on block chain
CN114758433A (en) * 2022-02-23 2022-07-15 珠海汇金科技股份有限公司 Cloud-based dynamic password generation method and system and intelligent lock

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0744843B1 (en) * 1995-05-26 2005-05-04 SimonsVoss Technologies AG Data communication system
US20150199863A1 (en) * 2014-01-15 2015-07-16 HLT Domestic IP, LLC Systems and methods for use in acquiring credentials from a portable user device in unlocking door lock systems
CN105205898A (en) * 2015-10-22 2015-12-30 深圳优方网络技术有限公司 Electronic code permission management system for intelligent lock
CN105261096A (en) * 2015-10-26 2016-01-20 东莞市点开网络科技有限公司 Network smart lock system
CN205899637U (en) * 2016-07-22 2017-01-18 深圳市凯迪仕智能科技有限公司 Wireless tool to lock control system based on intelligent terminal
CN107578519A (en) * 2017-10-24 2018-01-12 北京樱桃智心科技有限公司 A kind of intelligent access control system and intelligent entrance guard method for unlocking
CN108712389A (en) * 2018-04-23 2018-10-26 杭州全视软件有限公司 A kind of intelligent lock system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0744843B1 (en) * 1995-05-26 2005-05-04 SimonsVoss Technologies AG Data communication system
US20150199863A1 (en) * 2014-01-15 2015-07-16 HLT Domestic IP, LLC Systems and methods for use in acquiring credentials from a portable user device in unlocking door lock systems
CN105205898A (en) * 2015-10-22 2015-12-30 深圳优方网络技术有限公司 Electronic code permission management system for intelligent lock
CN105261096A (en) * 2015-10-26 2016-01-20 东莞市点开网络科技有限公司 Network smart lock system
CN205899637U (en) * 2016-07-22 2017-01-18 深圳市凯迪仕智能科技有限公司 Wireless tool to lock control system based on intelligent terminal
CN107578519A (en) * 2017-10-24 2018-01-12 北京樱桃智心科技有限公司 A kind of intelligent access control system and intelligent entrance guard method for unlocking
CN108712389A (en) * 2018-04-23 2018-10-26 杭州全视软件有限公司 A kind of intelligent lock system

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111431965A (en) * 2020-02-21 2020-07-17 浙江吉利控股集团有限公司 Vehicle operation authority management method, terminal and system
CN112702413A (en) * 2020-12-21 2021-04-23 梓昆(杭州)押运安保服务有限公司 Intelligent escort cash box system, control method, computer equipment and storage medium
CN112702412A (en) * 2020-12-21 2021-04-23 梓昆(杭州)押运安保服务有限公司 Batch multi-dimensional switch money box control system, control method, equipment and medium
CN112702413B (en) * 2020-12-21 2023-04-07 梓昆(杭州)押运安保服务有限公司 Intelligent escort cash box system, control method, computer equipment and storage medium
CN112702412B (en) * 2020-12-21 2023-05-09 梓昆(杭州)押运安保服务有限公司 Batch multi-dimensional switch money box control system, control method, equipment and medium
CN112910886A (en) * 2021-01-29 2021-06-04 中国电力科学研究院有限公司 Method and system for verifying identity of lock
CN113963464A (en) * 2021-10-11 2022-01-21 安徽中科晶格技术有限公司 Bank safe deposit box unlocking system and method based on block chain
CN114758433A (en) * 2022-02-23 2022-07-15 珠海汇金科技股份有限公司 Cloud-based dynamic password generation method and system and intelligent lock

Similar Documents

Publication Publication Date Title
WO2019204954A1 (en) Smart lock system
CN108712389B (en) Intelligent lock system
US11947649B2 (en) Locking device biometric access
US8947200B2 (en) Method of distributing stand-alone locks
US7979716B2 (en) Method of generating access keys
CN103561034B (en) A kind of secure file shared system
CN101375259B (en) Data security system
CN109448197A (en) A kind of cloud intelligent lock system and key management method based on multi-enciphering mode
US7716489B1 (en) Access control method for disconnected automation systems
US7694330B2 (en) Personal authentication device and system and method thereof
US8499147B2 (en) Account management system, root-account management apparatus, derived-account management apparatus, and program
CN105122265B (en) Data safety service system
US9300639B1 (en) Device coordination
JP5710439B2 (en) Template delivery type cancelable biometric authentication system and method
US20110274273A1 (en) Generation of registration codes, keys and passcodes using non-determinism
CN111478918A (en) Device with access control function
TWI569230B (en) Control system with mobile devices
JP2011012511A (en) Electric lock control system
US20230412400A1 (en) Method for suspending protection of an object achieved by a protection device
US10148433B1 (en) Private key/public key resource protection scheme
CN207123882U (en) A kind of antitheft cloud service door-locking system of multiple intelligent
CN112530053B (en) Control method and system of intelligent lock, lock equipment, server and storage medium
CN108345801B (en) Ciphertext database-oriented middleware dynamic user authentication method and system
CN110335373A (en) Intelligent door lock and intelligent access control system
CN111292444A (en) Real estate as tradable digital assets via blockchain integration

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18915973

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18915973

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 18915973

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 07.04.2021)