CN110298950B - Fingerprint lock working system based on two-dimensional code and method thereof - Google Patents
Fingerprint lock working system based on two-dimensional code and method thereof Download PDFInfo
- Publication number
- CN110298950B CN110298950B CN201910616764.6A CN201910616764A CN110298950B CN 110298950 B CN110298950 B CN 110298950B CN 201910616764 A CN201910616764 A CN 201910616764A CN 110298950 B CN110298950 B CN 110298950B
- Authority
- CN
- China
- Prior art keywords
- unit
- code
- fingerprint
- dimensional code
- time
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
- G06K17/0025—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0846—Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00412—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention discloses a fingerprint lock working system based on a two-dimensional code and a method thereof, wherein the working system comprises a mobile terminal, a fingerprint lock and a server, the fingerprint lock comprises a display screen and a fingerprint acquisition module which are sequentially and electrically connected, the server comprises a receiving module, a processing module, a database and a sending module, the display screen and the fingerprint acquisition module are respectively and electrically connected with the receiving module, the processing module and the sending module are sequentially and electrically connected, and the processing module is electrically connected with the database; the mobile terminal is in wireless communication with the display screen and the sending module respectively. The fingerprint lock working system and the fingerprint lock working method based on the two-dimensional code are designed, the module design is reasonable, the steps are simple and effective, multiple identification of the fingerprint lock is realized, the accuracy of user identity judgment is improved, meanwhile, information leakage is avoided to a great extent, and the fingerprint lock working system and the fingerprint lock working method based on the two-dimensional code have high practicability.
Description
Technical Field
The invention relates to the technical field of fingerprint locks, in particular to a fingerprint lock working system based on a two-dimensional code and a method thereof.
Background
With the progress and development of science and technology, the biometric identification technology gradually enters our lives, wherein the most common in the lives should be called a fingerprint lock, the fingerprint lock is an intelligent lock taking the fingerprint of the finger part of a human body as an identification carrier and means, and the fingerprint lock is a perfect crystal of a computer information technology, an electronic technology, a mechanical technology and a modern Wujin technology. Fingerprint locks generally consist of two parts, an electronic identification and control part and a mechanical linkage system. The uniqueness and the irreproducibility of the live fingerprints determine that the fingerprint lock is the safest lock variety of all the locks at present.
However, in actual operation, the fingerprint of the user is very easy to reveal, the user can unlock the lock through the fingerprint singly, the safety of the fingerprint lock is difficult to be guaranteed, and meanwhile, the personal and property threats can be brought to people.
In view of the above situation, a two-dimensional code-based fingerprint lock working system and a method thereof are designed, so that the identification security of a fingerprint lock is effectively improved, which is one of the problems to be solved urgently.
Disclosure of Invention
The invention aims to provide a fingerprint lock working system based on a two-dimensional code and a method thereof, so as to solve the problems in the prior art.
In order to achieve the purpose, the invention provides the following technical scheme:
the utility model provides a fingerprint lock operating system based on two-dimensional code, operating system includes mobile terminal, fingerprint lock and server, the fingerprint lock includes display screen and fingerprint collection module, the server includes receiving module, processing module, database and sending module, fingerprint collection module is connected with the receiving module electricity, receiving module, processing module and sending module electricity in proper order are connected, processing module is connected with the database electricity, sending module is connected with the display screen electricity, mobile terminal respectively with display screen, sending module, receiving module wireless communication.
The invention designs a fingerprint lock working system based on a two-dimensional code, which comprises a mobile terminal, a fingerprint lock and a server, wherein the server is arranged in a door and used for receiving a signal of the fingerprint lock and sending a corresponding command signal; the mobile terminal is a user terminal, generally a mobile phone, a computer and other terminal products, and is actually selected as the mobile phone in the technical scheme; the fingerprint lock comprises a display screen and a fingerprint acquisition module which are sequentially and electrically connected, the fingerprint acquisition module is used for acquiring fingerprint information of a visitor, the display screen can display each data information, and when the fingerprint acquisition module acquires a fingerprint, the display screen can display an acquisition progress and an acquisition simulation image, so that the visitor can conveniently realize the complete acquisition of the fingerprint; the server comprises a receiving module, a processing module, a database and a sending module, wherein the receiving module is used for receiving the data information transmitted by each module, and the processing module can analyze and process the data information transmitted by the receiving module; the identity information of the person who has the authority to enter the house is pre-recorded in the database, and the identity of the visitor can be judged through the preset identity information in the database.
According to an optimized scheme, the receiving module comprises a first receiving unit and a second receiving unit, the first receiving unit is electrically connected with the fingerprint acquisition module, and the second receiving unit is in wireless communication with the mobile terminal; the processing module comprises a first time judging unit, a first analyzing unit, a first matching unit, an encrypting unit, a coding unit and a second matching unit, wherein the first receiving unit is electrically connected with the first analyzing unit, the second receiving unit is electrically connected with the first time judging unit, and the first time judging unit is electrically connected with the first analyzing unit; the first analysis unit is electrically connected with the first matching unit, the encryption unit and the second matching unit respectively, and the first analysis unit is electrically connected with the database; the encryption unit and the coding unit are electrically connected, and the first matching unit, the coding unit and the second matching unit are respectively and electrically connected with the sending module.
The receiving module comprises a first receiving unit and a second receiving unit, wherein the first receiving unit is used for receiving the acquired fingerprint information, and the second receiving unit is used for receiving the feedback information of the mobile terminal; the processing module comprises a first time judging unit, a first analyzing unit, a first matching unit, an encrypting unit, a coding unit and a second matching unit; after the fingerprint identification is successful, the database extracts and generates a random dynamic code a and a time information code T1, the mobile terminal sends a time information code T2 after data analysis and processing, and the first time judgment unit can judge whether the random dynamic code a exceeds a limited time period through the time information code T1 and the time information code T2 so as to determine the subsequent steps; the encryption unit can encrypt the random dynamic code a, the encryption algorithm adopts the coordination of public key encryption/private key decryption and private key encryption/public key decryption, and any encryption mode can be randomly selected in the operation; the coding unit can code the encrypted random dynamic code a to form a two-dimensional code and display the two-dimensional code on the display screen, so that a visitor can conveniently perform subsequent scanning operation.
According to an optimized scheme, the mobile terminal comprises a two-dimensional code acquisition unit, a third receiving unit, a second time judgment unit, a second analysis unit, a decoding unit, a decryption unit, a sending unit and a display unit, wherein the sending module and the third receiving unit are in wireless communication, the two-dimensional code acquisition unit is in wireless communication with a display screen, the two-dimensional code acquisition unit and the third receiving unit are respectively and electrically connected with the second time judgment unit, and the second time judgment unit is electrically connected with the second analysis unit; the second analysis unit, the decoding unit, the decryption unit and the sending unit are electrically connected in sequence, the second analysis unit is electrically connected with the display unit, and the sending unit is in wireless communication with the second receiving unit; the mobile terminal further comprises a cloud storage unit, and the cloud storage unit is connected with the second analysis unit.
The mobile terminal comprises a third receiving unit, a two-dimensional code acquisition unit, a second time judgment unit, a second analysis unit, a decoding unit, a decryption unit, a sending unit and a display unit, wherein the two-dimensional code acquisition unit can acquire a two-dimensional code displayed on a display screen; the two-dimensional code A contains time domain information, the time domain information contains a user preset time period, the time period is an effective time period of the two-dimensional code A, and the second time judging unit can sequentially judge whether the two-dimensional code exceeds a limited time; the decoding unit and the decryption unit can decode and decrypt the collected two-dimensional code to obtain an encrypted plaintext, the plaintext can be compared and matched with the random dynamic code a to judge whether the two-dimensional code a is consistent or not, if so, the fingerprint lock is opened, and if not, the fingerprint lock is still in a closed state.
According to an optimized scheme, the system further comprises an alarm unit, the fingerprint acquisition module, the alarm unit and the third receiving unit are sequentially connected, and the first analysis unit, the alarm unit and the third receiving unit are sequentially connected.
According to an optimized scheme, the fingerprint lock working method based on the two-dimensional code comprises the following steps of:
1) the fingerprint acquisition module acquires visitor fingerprint information, obtains the times n of acquiring the fingerprint information by the fingerprint acquisition module within the time t, judges whether the value of n is consistent with n being less than or equal to 5, and if YES, turns to the step 2), and if NO, turns to the step 14);
2) the server starts to work, the first receiving unit receives the fingerprint information and transmits the fingerprint information to the first analyzing unit, the first analyzing unit extracts the stored fingerprint template from the database, and the acquired fingerprint information and the fingerprint module are transmitted to the first matching unit together;
3) the first matching unit receives the acquired fingerprint information and the fingerprint module, performs identification matching, and if the identification prompt is "TRUE", the step 4) is performed, and if the identification prompt is "FALSE", the step 1) is performed;
4) the fingerprint identification is successful, the database extracts and generates a random dynamic code a and a time information code T1, the time information code T1 and the random dynamic code a are stored and transmitted to the first analysis unit, the time information code T1 is transmitted to the first time judgment unit, and the random dynamic code a is transmitted to the encryption unit for encryption; meanwhile, the first analysis unit records the generation number m of the random dynamic codes a within the time t1, judges whether the value m is consistent with m being less than or equal to 3, if the value m is prompted to be "TRUE", the step 5 is carried out, and if the value m is prompted to be "FALSE", the step 14 is carried out);
5) a public key P and a private key Q are preset in the encryption unit, the public key P or the private key Q is randomly selected by the random dynamic code a for encryption to generate a microgroove a1, and the obtained microgroove a1 is transmitted to the encoding unit;
6) the encoding unit receives the microgroove a1, encodes the microgroove a1 and generates a two-dimensional code A, wherein the two-dimensional code A contains time domain information, the time domain information contains a user preset time period, and the time period is an effective time period of the two-dimensional code A; then the two-dimensional code A is transmitted to a display, and the display displays a 'secret key state' and the two-dimensional code A, wherein the 'secret key state' comprises a 'public key state' and a 'private key state';
7) the mobile terminal receives the two-dimensional code A and transmits the two-dimensional code A to the second time judging unit, the time domain information in the two-dimensional code A is judged, and if the judgment result is 'YES', the step 8) is carried out; if the judgment result is NO, the sending unit sends prompt information to the second receiving unit, the prompt information is transmitted to the first analyzing unit by the second receiving unit, and then the step 4) is carried out;
8) the second analysis unit receives the two-dimensional code A, decodes the two-dimensional code through the decoding unit to obtain a ciphertext a2, and then transmits the ciphertext a2 to the decryption unit for decryption; a public key Q1 and a private key P1 are preset in the decryption unit, and if the public key P is selected for encryption by the random dynamic code a in the step 5), the step 9) is carried out; if the random dynamic code a selects the private key Q for encryption, turning to the step 10);
9) the decryption unit receives the ciphertext a2, decrypts the ciphertext by using a private key P1 to obtain an object code and a time information code T2, sends the object code and the time information code T2 to a second receiving unit of the server through the sending unit, and then goes to step 11);
10) the decryption unit receives the ciphertext a2, decrypts the ciphertext by using the public key Q1 to obtain an object code and a time information code T2, sends the object code and the time information code T2 to a second receiving unit of the server through the sending unit, and then goes to step 11);
11) the second receiving unit receives the information and sends the time information code T2 to the first time judging unit, the first time judging unit judges whether the target code in the mobile terminal can be used continuously or not through the time information code T1 and the time information code T2, if the judgment result is YES, the step 12 is carried out, and if the judgment result is NO, the step 4 is carried out);
12) the first analysis unit receives the target code and matches the target code with the random dynamic code a through the second matching unit, if the matching prompts 'TRUE', the step is carried out, and if the matching prompts 'FALSE', the step is carried out, and the step is carried out;
13) the fingerprint lock is successfully identified, the fingerprint lock is opened, and the operation is finished;
14) and if the fingerprint lock fails to be identified, the alarm unit sends an alarm to the mobile terminal to finish the operation.
According to an optimized scheme, GPS modules are arranged in the server and the mobile terminal and used for measuring the distance K between the server and the mobile terminal, in the step 7), if the distance K is 0-5m, the two-dimension code A on the display screen is collected through the two-dimension code collecting unit, and otherwise, the two-dimension code A is sent to a third receiving unit of the mobile terminal through a sending module of the server.
Preferably, in the step 11), if the determination value of the first time determination unit is T, T is T2-T1, if T is 0-5min, it is determined to be "YES", otherwise, it is determined to be "NO".
In an optimized scheme, in the step 1), the time t is 5 min; in the step 4), the time t1 is 5 min.
Compared with the prior art, the invention has the beneficial effects that:
when the system is used, firstly, the fingerprint of a visitor is acquired through the fingerprint acquisition module, wherein the fingerprint acquisition module comprises a fingerprint acquisition device, and the structure of the fingerprint acquisition device is a common structure in the market and is used for acquiring the fingerprint, and the detailed description is omitted; the method comprises the steps of collecting a user fingerprint, recording the number n of times of collecting the fingerprint by a fingerprint collecting module within 5min, meeting the requirement that n is less than or equal to 5, prompting that the number is YES, and transmitting fingerprint information to a first receiving unit; if n is more than 5, the fingerprint acquisition module stops working, so that the situation that visitors with unknown identities acquire fingerprints for many times is avoided, and the safety is improved.
The first receiving unit transmits fingerprint information to the first analyzing unit, fingerprint templates of a householder and relatives and friends of the householder are prestored in the database before work, the first analyzing unit extracts the stored fingerprint templates from the database, transmits the fingerprint modules and the acquired fingerprint information to the first matching unit for comparison and matching, if the fingerprint templates are unsuccessfully matched with the fingerprint templates, the result is 'NO', the visitor can acquire the fingerprint again, and the whole system operation is stopped until the acquisition times are 5, so that the fault tolerance rate is improved, and the condition that the visitor is unsuccessfully matched with the fingerprint due to improper operation is avoided; if the random dynamic code a and the time information code T1 are successfully matched, the database randomly generates a random dynamic code a and a time information code T1, records the generation times m of the random dynamic code in 3min, and prompts 'TRUE' if m is less than or equal to 3 for subsequent operation; if m is more than 3, the system prompts 'FALSE', the whole unlocking operation is finished, so that the situation that lawbreakers obtain fingerprint information of the householder and successfully pass fingerprint verification and identification but can not pass subsequent identification is avoided, and the working efficiency and the safety of the system are ensured.
Then the database transmits the time information code T1 to the first time judgment unit for recording, the random dynamic code a is sent to the encryption unit for encryption, the encryption unit is internally provided with a public key P and a private key Q, any one of the random dynamic code a can be randomly selected for encryption to obtain a ciphertext a1, the coding unit codes the ciphertext a1 to obtain a corresponding two-dimensional code A, the two-dimensional code A is displayed through a display screen, and a 'secret key state' is displayed at the same time, wherein the 'secret key state' comprises a 'public key state' and a 'private key state'.
If the user is in front of the fingerprint lock, the two-dimensional code A displayed on the display screen can be collected through the two-dimensional code collecting unit, if the user is located at a far position, the two-dimensional code A and the 'secret key state' can be transmitted to the third receiving unit through the sending module, the time domain information of the two-dimensional code A is judged through the second time judging unit, if the effective time period of the two-dimensional code A is exceeded, the mobile terminal sends a signal to the database, the database provides the random dynamic code again, and the two-dimensional code is regenerated until the generation frequency of the random dynamic code exceeds 3 times within 5 min; in the technical scheme, the effective time of the two-dimensional code is designed to be 1 min; if the two-dimensional code A is still in the valid time period of the two-dimensional code A, the two-dimensional code A is transmitted to a second analysis unit, the two-dimensional code A is decoded through a decoding unit to obtain a ciphertext a2, the ciphertext a2 is decrypted through a decryption unit, the decryption unit comprises a public key Q1 and a private key P1, the public key Q1 is arranged corresponding to the private key Q, the private key P1 is arranged corresponding to the public key P, a corresponding decryption mode can be selected according to the 'key state' to obtain a target code, and a time information code T2 at the moment is recorded; the design improves the operability of the system, improves the difficulty of acquiring the target code by lawbreakers, and further improves the safety of the system.
The time information code T2 and the target code are sent to the server, the first time judgment unit judges the time, the judgment value is T, T is T2-T1, if T is 0-5min, the judgment is YES, the target code is sent to the second matching unit, the target code is matched with the random dynamic code a, and if the T and the random dynamic code a are the same, the TRUE is prompted, and the fingerprint lock is unlocked; if the two codes are different, the database provides the random dynamic code again, and the two-dimensional code recognition operation is carried out again until the generation times of the random dynamic code exceed 3 times within 5 min.
And if the first time judgment unit judges that the code is NO, the database provides the random dynamic code again, and the two-dimensional code recognition operation is carried out again until the generation times of the random dynamic code exceeds 3 times within 5 min.
According to the technical scheme, the random dynamic code and the encryption algorithm are combined, multiple identification verification of the user identity is achieved, the validity of user identity judgment is improved, meanwhile, the maximum trial times within a certain time are set for each step, the fault tolerance rate is guaranteed, meanwhile, the safety of the fingerprint lock is improved, and a protection effect is achieved; in the technical scheme, the two-dimensional code design is combined, so that the information leakage is avoided to a great extent.
The fingerprint lock working system and the fingerprint lock working method based on the two-dimensional code are designed, the module design is reasonable, the steps are simple and effective, multiple identification of the fingerprint lock is realized, the accuracy of user identity judgment is improved, meanwhile, information leakage is avoided to a great extent, and the fingerprint lock working system and the fingerprint lock working method based on the two-dimensional code have high practicability.
Drawings
In order that the present invention may be more readily and clearly understood, a more particular description of the invention briefly described above will be rendered by reference to specific embodiments that are illustrated in the appended drawings.
FIG. 1 is a schematic diagram of an overall module of a fingerprint lock working system based on two-dimensional codes according to the present invention;
FIG. 2 is a schematic diagram of an overall module of a fingerprint lock working system based on two-dimensional codes according to the present invention;
FIG. 3 is a schematic diagram of an overall module of a two-dimensional code-based fingerprint lock working system according to the present invention;
FIG. 4 is a schematic diagram of a processing module of a two-dimensional code-based fingerprint lock operating system according to the present invention;
FIG. 5 is a schematic diagram of a mobile terminal module of a fingerprint lock working system based on two-dimensional codes according to the present invention;
fig. 6 is a schematic diagram of the connection of alarm unit modules of a fingerprint lock working system based on two-dimensional codes according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1-6, a fingerprint lock operating system based on two-dimensional code, operating system includes mobile terminal, fingerprint lock and server, the fingerprint lock includes display screen and fingerprint collection module, the server includes receiving module, processing module, database and sending module, fingerprint collection module is connected with the receiving module electricity, receiving module, processing module and sending module electricity are connected in proper order, processing module is connected with the database electricity, sending module is connected with the display screen electricity, mobile terminal respectively with display screen, sending module, receiving module wireless communication.
The invention designs a fingerprint lock working system based on a two-dimensional code, which comprises a mobile terminal, a fingerprint lock and a server, wherein the server is arranged in a door and used for receiving a signal of the fingerprint lock and sending a corresponding command signal; the mobile terminal is a user terminal, generally a mobile phone, a computer and other terminal products, and is actually selected as the mobile phone in the technical scheme; the fingerprint lock comprises a display screen and a fingerprint acquisition module which are sequentially and electrically connected, the fingerprint acquisition module is used for acquiring fingerprint information of a visitor, the display screen can display each data information, and when the fingerprint acquisition module acquires a fingerprint, the display screen can display an acquisition progress and an acquisition simulation image, so that the visitor can conveniently realize the complete acquisition of the fingerprint; the server comprises a receiving module, a processing module, a database and a sending module, wherein the receiving module is used for receiving the data information transmitted by each module, and the processing module can analyze and process the data information transmitted by the receiving module; the identity information of the person who has the authority to enter the house is pre-recorded in the database, and the identity of the visitor can be judged through the preset identity information in the database.
The receiving module comprises a first receiving unit and a second receiving unit, the first receiving unit is electrically connected with the fingerprint acquisition module, and the second receiving unit is in wireless communication with the mobile terminal; the processing module comprises a first time judging unit, a first analyzing unit, a first matching unit, an encrypting unit, a coding unit and a second matching unit, wherein the first receiving unit is electrically connected with the first analyzing unit, the second receiving unit is electrically connected with the first time judging unit, and the first time judging unit is electrically connected with the first analyzing unit; the first analysis unit is electrically connected with the first matching unit, the encryption unit and the second matching unit respectively, and the first analysis unit is electrically connected with the database; the encryption unit and the coding unit are electrically connected, and the first matching unit, the coding unit and the second matching unit are respectively and electrically connected with the sending module.
The receiving module comprises a first receiving unit and a second receiving unit, wherein the first receiving unit is used for receiving the acquired fingerprint information, and the second receiving unit is used for receiving the feedback information of the mobile terminal; the processing module comprises a first time judging unit, a first analyzing unit, a first matching unit, an encrypting unit, a coding unit and a second matching unit; after the fingerprint identification is successful, the database extracts and generates a random dynamic code a and a time information code T1, the mobile terminal sends a time information code T2 after data analysis and processing, and the first time judgment unit can judge whether the random dynamic code a exceeds a limited time period through the time information code T1 and the time information code T2 so as to determine the subsequent steps; the encryption unit can encrypt the random dynamic code a, the encryption algorithm adopts the coordination of public key encryption/private key decryption and private key encryption/public key decryption, and any encryption mode can be randomly selected in the operation; the coding unit can code the encrypted random dynamic code a to form a two-dimensional code and display the two-dimensional code on the display screen, so that a visitor can conveniently perform subsequent scanning operation.
The mobile terminal comprises a two-dimensional code acquisition unit, a third receiving unit, a second time judging unit, a second analyzing unit, a decoding unit, a decryption unit, a transmitting unit and a display unit, wherein the transmitting module and the third receiving unit are in wireless communication, the two-dimensional code acquisition unit is in wireless communication with a display screen, the two-dimensional code acquisition unit and the third receiving unit are respectively and electrically connected with the second time judging unit, and the second time judging unit is electrically connected with the second analyzing unit; the second analysis unit, the decoding unit, the decryption unit and the sending unit are electrically connected in sequence, the second analysis unit is electrically connected with the display unit, and the sending unit is in wireless communication with the second receiving unit; the mobile terminal further comprises a cloud storage unit, and the cloud storage unit is connected with the second analysis unit.
The mobile terminal comprises a third receiving unit, a two-dimensional code acquisition unit, a second time judgment unit, a second analysis unit, a decoding unit, a decryption unit, a sending unit and a display unit, wherein the two-dimensional code acquisition unit can acquire a two-dimensional code displayed on a display screen; the two-dimensional code A contains time domain information, the time domain information contains a user preset time period, the time period is an effective time period of the two-dimensional code A, and the second time judging unit can sequentially judge whether the two-dimensional code exceeds a limited time; the decoding unit and the decryption unit can decode and decrypt the collected two-dimensional code to obtain an encrypted plaintext, the plaintext can be compared and matched with the random dynamic code a to judge whether the two-dimensional code a is consistent or not, if so, the fingerprint lock is opened, and if not, the fingerprint lock is still in a closed state.
The system further comprises an alarm unit, the fingerprint acquisition module, the alarm unit and the third receiving unit are sequentially connected, and the first analysis unit, the alarm unit and the third receiving unit are sequentially connected.
According to the technical scheme, the random dynamic code and the encryption algorithm are combined, multiple identification verification of the user identity is achieved, the validity of user identity judgment is improved, meanwhile, the maximum trial times within a certain time are set for each step, the fault tolerance rate is guaranteed, meanwhile, the safety of the fingerprint lock is improved, and a protection effect is achieved; in the technical scheme, the two-dimensional code design is combined, so that the information leakage is avoided to a great extent.
The fingerprint lock working system and the fingerprint lock working method based on the two-dimensional code are designed, the module design is reasonable, the steps are simple and effective, multiple identification of the fingerprint lock is realized, the accuracy of user identity judgment is improved, meanwhile, information leakage is avoided to a great extent, and the fingerprint lock working system and the fingerprint lock working method based on the two-dimensional code have high practicability.
A fingerprint lock working method based on two-dimension codes comprises the following steps:
1) the fingerprint acquisition module acquires visitor fingerprint information, obtains the times n of acquiring the fingerprint information by the fingerprint acquisition module within the time t, judges whether the value of n is consistent with n being less than or equal to 5, and if YES, turns to the step 2), and if NO, turns to the step 14);
2) the server starts to work, the first receiving unit receives the fingerprint information and transmits the fingerprint information to the first analyzing unit, the first analyzing unit extracts the stored fingerprint template from the database, and the acquired fingerprint information and the fingerprint module are transmitted to the first matching unit together;
3) the first matching unit receives the acquired fingerprint information and the fingerprint module, performs identification matching, and if the identification prompt is "TRUE", the step 4) is performed, and if the identification prompt is "FALSE", the step 1) is performed;
4) the fingerprint identification is successful, the database extracts and generates a random dynamic code a and a time information code T1, the time information code T1 and the random dynamic code a are stored and transmitted to the first analysis unit, the time information code T1 is transmitted to the first time judgment unit, and the random dynamic code a is transmitted to the encryption unit for encryption; meanwhile, the first analysis unit records the generation number m of the random dynamic codes a within the time t1, judges whether the value m is consistent with m being less than or equal to 3, if the value m is prompted to be "TRUE", the step 5 is carried out, and if the value m is prompted to be "FALSE", the step 14 is carried out);
5) a public key P and a private key Q are preset in the encryption unit, the public key P or the private key Q is randomly selected by the random dynamic code a for encryption to generate a microgroove a1, and the obtained microgroove a1 is transmitted to the encoding unit;
6) the encoding unit receives the microgroove a1, encodes the microgroove a1 and generates a two-dimensional code A, wherein the two-dimensional code A contains time domain information, the time domain information contains a user preset time period, and the time period is an effective time period of the two-dimensional code A; then the two-dimensional code A is transmitted to a display, and the display displays a 'secret key state' and the two-dimensional code A, wherein the 'secret key state' comprises a 'public key state' and a 'private key state'; 7) the mobile terminal receives the two-dimensional code A and transmits the two-dimensional code A to the second time judging unit, the time domain information in the two-dimensional code A is judged, and if the judgment result is 'YES', the step 8) is carried out; if the judgment result is NO, the sending unit sends prompt information to the second receiving unit, the prompt information is transmitted to the first analyzing unit by the second receiving unit, and then the step 4) is carried out;
8) the second analysis unit receives the two-dimensional code A, decodes the two-dimensional code through the decoding unit to obtain a ciphertext a2, and then transmits the ciphertext a2 to the decryption unit for decryption; a public key Q1 and a private key P1 are preset in the decryption unit, and if the public key P is selected for encryption by the random dynamic code a in the step 5), the step 9) is carried out; if the random dynamic code a selects the private key Q for encryption, turning to the step 10);
9) the decryption unit receives the ciphertext a2, decrypts the ciphertext by using a private key P1 to obtain an object code and a time information code T2, sends the object code and the time information code T2 to a second receiving unit of the server through the sending unit, and then goes to step 11);
10) the decryption unit receives the ciphertext a2, decrypts the ciphertext by using the public key Q1 to obtain an object code and a time information code T2, sends the object code and the time information code T2 to a second receiving unit of the server through the sending unit, and then goes to step 11);
11) the second receiving unit receives the information and sends the time information code T2 to the first time judging unit, the first time judging unit judges whether the target code in the mobile terminal can be used continuously or not through the time information code T1 and the time information code T2, if the judgment result is YES, the step 12 is carried out, and if the judgment result is NO, the step 4 is carried out);
12) the first analysis unit receives the target code and matches the target code with the random dynamic code a through the second matching unit, if the matching prompts 'TRUE', the step is carried out, and if the matching prompts 'FALSE', the step is carried out, and the step is carried out;
13) the fingerprint lock is successfully identified, the fingerprint lock is opened, and the operation is finished;
14) and if the fingerprint lock fails to be identified, the alarm unit sends an alarm to the mobile terminal to finish the operation.
And in the step 7), if K is 0-5m, the two-dimensional code A on the display screen is acquired through the two-dimensional code acquisition unit, otherwise, the two-dimensional code A is transmitted to a third receiving unit of the mobile terminal through a transmitting module of the server.
In the step 11), if the determination value of the first time determination unit is T, T is T2-T1, if T is 0-5min, YES is determined, otherwise, NO is determined.
In the step 1), the time t is 5 min; in the step 4), the time t1 is 5 min.
When the system is used, firstly, the fingerprint of a visitor is acquired through the fingerprint acquisition module, wherein the fingerprint acquisition module comprises a fingerprint acquisition device, and the structure of the fingerprint acquisition device is a common structure in the market and is used for acquiring the fingerprint, and the detailed description is omitted; the method comprises the steps of collecting a user fingerprint, recording the number n of times of collecting the fingerprint by a fingerprint collecting module within 5min, meeting the requirement that n is less than or equal to 5, prompting that the number is YES, and transmitting fingerprint information to a first receiving unit; if n is more than 5, the fingerprint acquisition module stops working, so that the situation that visitors with unknown identities acquire fingerprints for many times is avoided, and the safety is improved.
The first receiving unit transmits fingerprint information to the first analyzing unit, fingerprint templates of a householder and relatives and friends of the householder are prestored in the database before work, the first analyzing unit extracts the stored fingerprint templates from the database, transmits the fingerprint modules and the acquired fingerprint information to the first matching unit for comparison matching, if the fingerprint templates are unsuccessfully matched, the result is 'FALSE', and a visitor can acquire the fingerprint again until the acquisition frequency is 5, so that the operation of the whole system is stopped, the fault tolerance rate is improved, and the condition that the fingerprint matching of the visitor is unsuccessful due to improper operation is avoided; if the random dynamic code a and the time information code T1 are successfully matched, the database randomly generates a random dynamic code a and a time information code T1, records the generation times m of the random dynamic code in 3min, and prompts 'TRUE' if m is less than or equal to 3 for subsequent operation; if m is more than 3, the system prompts 'FALSE', the whole unlocking operation is finished, so that the situation that lawbreakers obtain fingerprint information of the householder and successfully pass fingerprint verification and identification but can not pass subsequent identification is avoided, and the working efficiency and the safety of the system are ensured.
Then the database transmits the time information code T1 to the first time judgment unit for recording, the random dynamic code a is sent to the encryption unit for encryption, the encryption unit is internally provided with a public key P and a private key Q, any one of the random dynamic code a can be randomly selected for encryption to obtain a ciphertext a1, the coding unit codes the ciphertext a1 to obtain a corresponding two-dimensional code A, the two-dimensional code A is displayed through a display screen, and a 'secret key state' is displayed at the same time, wherein the 'secret key state' comprises a 'public key state' and a 'private key state'.
If the user is in front of the fingerprint lock, the two-dimensional code A displayed on the display screen can be collected through the two-dimensional code collecting unit, if the user is located at a far position, the two-dimensional code A and the 'secret key state' can be transmitted to the third receiving unit through the sending module, the time domain information of the two-dimensional code A is judged through the second time judging unit, if the effective time period of the two-dimensional code A is exceeded, the mobile terminal sends a signal to the database, the database provides the random dynamic code again, and the two-dimensional code is regenerated until the generation frequency of the random dynamic code exceeds 3 times within 5 min; in the technical scheme, the effective time of the two-dimensional code is designed to be 1 min; if the two-dimensional code A is still in the valid time period of the two-dimensional code A, the two-dimensional code A is transmitted to a second analysis unit, the two-dimensional code A is decoded through a decoding unit to obtain a ciphertext a2, the ciphertext a2 is decrypted through a decryption unit, the decryption unit comprises a public key Q1 and a private key P1, the public key Q1 is arranged corresponding to the private key Q, the private key P1 is arranged corresponding to the public key P, a corresponding decryption mode can be selected according to the 'key state' to obtain a target code, and a time information code T2 at the moment is recorded; the design improves the operability of the system, improves the difficulty of acquiring the target code by lawbreakers, and further improves the safety of the system.
The time information code T2 and the target code are sent to the server, the first time judgment unit judges the time, the judgment value is T, T is T2-T1, if T is 0-5min, the judgment is YES, the target code is sent to the second matching unit, the target code is matched with the random dynamic code a, and if the T and the random dynamic code a are the same, the TRUE is prompted, and the fingerprint lock is unlocked; if the two codes are different, the database provides the random dynamic code again, and the two-dimensional code recognition operation is carried out again until the generation times of the random dynamic code exceed 3 times within 5 min.
And if the first time judgment unit judges that the code is NO, the database provides the random dynamic code again, and the two-dimensional code recognition operation is carried out again until the generation times of the random dynamic code exceeds 3 times within 5 min.
Example 1: the limiting conditions are as follows: the visitor is a stranger.
1. Before the visitor arrived at the door, gather fingerprint information 1 time through fingerprint collection module, fingerprint information matches unsuccessfully, and the fingerprint lock is in the closed condition.
2. Before the visitor arrived at the door, gather 6 fingerprint information within 5min, the fingerprint matching is unsuccessful, and the fingerprint lock is in the closed condition, and alarm unit sends out the police dispatch newspaper to mobile terminal.
Example 2: the limiting conditions are as follows: the visitor is a stranger, but the visitor obtains fingerprint information of the householder.
1. Before a visitor arrives at a door, fingerprint identification is carried out through fingerprint information of a householder, the identification is successful, a two-dimensional code appears on a display screen for 1 time, the visitor identifies the two-dimensional code, decryption cannot be carried out, a target code cannot be obtained, and a fingerprint lock is in a closed state;
2. before the visitor arrived at the door, fingerprint identification was carried out through householder's fingerprint information, and the discernment is successful, appears 4 times two-dimensional code on the display screen in 5min, and visitor identification two-dimensional code all can't obtain the target code, and the fingerprint lock is in the closed condition, and alarm unit sends out the police dispatch newspaper to mobile terminal.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
Claims (4)
1. The utility model provides a fingerprint lock operating system based on two-dimensional code which characterized in that: the working system comprises a mobile terminal, a fingerprint lock and a server, wherein the fingerprint lock comprises a display screen and a fingerprint acquisition module, the server comprises a receiving module, a processing module, a database and a sending module, the fingerprint acquisition module is electrically connected with the receiving module, the processing module and the sending module are sequentially and electrically connected, the processing module is electrically connected with the database, the sending module is electrically connected with the display screen, and the mobile terminal is in wireless communication with the display screen, the sending module and the receiving module respectively;
the receiving module comprises a first receiving unit and a second receiving unit, the first receiving unit is electrically connected with the fingerprint acquisition module, and the second receiving unit is in wireless communication with the mobile terminal; the processing module comprises a first time judging unit, a first analyzing unit, a first matching unit, an encrypting unit, a coding unit and a second matching unit, wherein the first receiving unit is electrically connected with the first analyzing unit, the second receiving unit is electrically connected with the first time judging unit, and the first time judging unit is electrically connected with the first analyzing unit; the first analysis unit is electrically connected with the first matching unit, the encryption unit and the second matching unit respectively, and the first analysis unit is electrically connected with the database; the encryption unit and the coding unit are electrically connected, and the first matching unit, the coding unit and the second matching unit are respectively electrically connected with the sending module;
the mobile terminal comprises a two-dimensional code acquisition unit, a third receiving unit, a second time judging unit, a second analyzing unit, a decoding unit, a decryption unit, a transmitting unit and a display unit, wherein the transmitting module and the third receiving unit are in wireless communication, the two-dimensional code acquisition unit is in wireless communication with a display screen, the two-dimensional code acquisition unit and the third receiving unit are respectively and electrically connected with the second time judging unit, and the second time judging unit is electrically connected with the second analyzing unit; the second analysis unit, the decoding unit, the decryption unit and the sending unit are electrically connected in sequence, the second analysis unit is electrically connected with the display unit, and the sending unit is in wireless communication with the second receiving unit; the mobile terminal further comprises a cloud storage unit, and the cloud storage unit is connected with the second analysis unit;
the system also comprises an alarm unit, the fingerprint acquisition module, the alarm unit and the third receiving unit are sequentially connected, and the first analysis unit, the alarm unit and the third receiving unit are sequentially connected;
a working method of a fingerprint lock working system based on a two-dimensional code comprises the following steps:
1) the fingerprint acquisition module acquires visitor fingerprint information, obtains the times n of acquiring the fingerprint information by the fingerprint acquisition module within the time t, judges whether the value of n is consistent with n being less than or equal to 5, and if YES, turns to the step 2), and if NO, turns to the step 14);
2) the server starts to work, the first receiving unit receives the fingerprint information and transmits the fingerprint information to the first analyzing unit, the first analyzing unit extracts the stored fingerprint template from the database, and the acquired fingerprint information and the fingerprint module are transmitted to the first matching unit together;
3) the first matching unit receives the acquired fingerprint information and the fingerprint module, performs identification matching, and if the identification prompt is "TRUE", then the step 4) is performed, and if the identification prompt is "FALSE", then the step 1) is performed;
4) the fingerprint identification is successful, the database extracts and generates a random dynamic code a and a time information code T1, the time information code T1 and the random dynamic code a are stored and transmitted to the first analysis unit, the time information code T1 is transmitted to the first time judgment unit, and the random dynamic code a is transmitted to the encryption unit for encryption; meanwhile, the first analysis unit records the generation number m of the random dynamic codes a within the time t1, judges whether the value m is consistent with m being less than or equal to 3, if the value m is prompted to be "TRUE", the step 5 is carried out, and if the value m is prompted to be "FALSE", the step 14 is carried out);
5) a public key P and a private key Q are preset in the encryption unit, the public key P or the private key Q is randomly selected by the random dynamic code a for encryption to generate a microgroove a1, and the obtained microgroove a1 is transmitted to the encoding unit;
6) the encoding unit receives the microgroove a1, encodes the microgroove a1 and generates a two-dimensional code A, wherein the two-dimensional code A contains time domain information, the time domain information contains a user preset time period, and the time period is an effective time period of the two-dimensional code A; then the two-dimensional code A is transmitted to a display, and the display displays a 'secret key state' and the two-dimensional code A, wherein the 'secret key state' comprises a 'public key state' and a 'private key state';
7) the mobile terminal receives the two-dimensional code A and transmits the two-dimensional code A to the second time judging unit, the time domain information in the two-dimensional code A is judged, and if the judgment result is 'YES', the step 8) is carried out; if the judgment result is NO, the sending unit sends prompt information to the second receiving unit, the prompt information is transmitted to the first analyzing unit by the second receiving unit, and then the step 4) is carried out;
8) the second analysis unit receives the two-dimensional code A, decodes the two-dimensional code through the decoding unit to obtain a ciphertext a2, and then transmits the ciphertext a2 to the decryption unit for decryption; a public key Q1 and a private key P1 are preset in the decryption unit, and if the public key P is selected for encryption by the random dynamic code a in the step 5), the step 9) is carried out; if the random dynamic code a selects the private key Q for encryption, turning to the step 10);
9) the decryption unit receives the ciphertext a2, decrypts the ciphertext by using a private key P1 to obtain an object code and a time information code T2, sends the object code and the time information code T2 to a second receiving unit of the server through the sending unit, and then goes to step 11);
10) the decryption unit receives the ciphertext a2, decrypts the ciphertext by using the public key Q1 to obtain an object code and a time information code T2, sends the object code and the time information code T2 to a second receiving unit of the server through the sending unit, and then goes to step 11);
11) the second receiving unit receives the information and sends the time information code T2 to the first time judging unit, the first time judging unit judges whether the target code in the mobile terminal can be used continuously or not through the time information code T1 and the time information code T2, if the judgment result is YES, the step 12 is carried out, and if the judgment result is NO, the step 4 is carried out);
12) the first analysis unit receives the target code and matches the target code with the random dynamic code a through the second matching unit, if the matching prompts 'TRUE', the step is carried out, and if the matching prompts 'FALSE', the step is carried out, and the step is carried out;
13) the fingerprint lock is successfully identified, the fingerprint lock is opened, and the operation is finished;
14) and if the fingerprint lock fails to be identified, the alarm unit sends an alarm to the mobile terminal to finish the operation.
2. The fingerprint lock working system based on the two-dimensional code as claimed in claim 1, wherein: and in the step 7), if K is 0-5m, the two-dimensional code A on the display screen is acquired through the two-dimensional code acquisition unit, otherwise, the two-dimensional code A is transmitted to a third receiving unit of the mobile terminal through a transmitting module of the server.
3. The fingerprint lock working system based on the two-dimensional code as claimed in claim 1, wherein: in the step 11), if the determination value of the first time determination unit is T, T is T2-T1, if T is 0-5min, YES is determined, otherwise, NO is determined.
4. The fingerprint lock working system based on the two-dimensional code as claimed in claim 1, wherein: in the step 1), the time t is 5 min; in the step 4), the time t1 is 5 min.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910616764.6A CN110298950B (en) | 2019-07-09 | 2019-07-09 | Fingerprint lock working system based on two-dimensional code and method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910616764.6A CN110298950B (en) | 2019-07-09 | 2019-07-09 | Fingerprint lock working system based on two-dimensional code and method thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110298950A CN110298950A (en) | 2019-10-01 |
CN110298950B true CN110298950B (en) | 2021-04-30 |
Family
ID=68030865
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910616764.6A Active CN110298950B (en) | 2019-07-09 | 2019-07-09 | Fingerprint lock working system based on two-dimensional code and method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110298950B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105069876A (en) * | 2015-08-04 | 2015-11-18 | 珠海格力电器股份有限公司 | Intelligent access control method and system |
CN106327652A (en) * | 2016-09-14 | 2017-01-11 | 深圳市欧瑞博电子有限公司 | System and method for protecting electronic intelligent door locks and fingerprint locks |
CN108510626A (en) * | 2018-02-23 | 2018-09-07 | 深圳同心科技有限公司 | A kind of dynamic password access control management method and its management system |
KR101937200B1 (en) * | 2018-08-27 | 2019-01-10 | 김동관 | System for managing worker using Application |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9894066B2 (en) * | 2014-07-30 | 2018-02-13 | Master Lock Company Llc | Wireless firmware updates |
US9626814B2 (en) * | 2014-12-23 | 2017-04-18 | Vivint, Inc. | Smart door lock |
CN109919269A (en) * | 2019-03-08 | 2019-06-21 | 大唐东营发电有限公司 | A kind of faulty action preventing system based on two dimensional code |
CN109979068A (en) * | 2019-04-11 | 2019-07-05 | 宋翔 | A kind of verification method for opening bar code lock |
-
2019
- 2019-07-09 CN CN201910616764.6A patent/CN110298950B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105069876A (en) * | 2015-08-04 | 2015-11-18 | 珠海格力电器股份有限公司 | Intelligent access control method and system |
CN106327652A (en) * | 2016-09-14 | 2017-01-11 | 深圳市欧瑞博电子有限公司 | System and method for protecting electronic intelligent door locks and fingerprint locks |
CN108510626A (en) * | 2018-02-23 | 2018-09-07 | 深圳同心科技有限公司 | A kind of dynamic password access control management method and its management system |
KR101937200B1 (en) * | 2018-08-27 | 2019-01-10 | 김동관 | System for managing worker using Application |
Also Published As
Publication number | Publication date |
---|---|
CN110298950A (en) | 2019-10-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105069876B (en) | Intelligent access control method and system | |
CN1860724B (en) | Method for identification | |
US9189612B2 (en) | Biometric verification with improved privacy and network performance in client-server networks | |
CN107967741A (en) | Double-channel testimony of a witness in-one intelligent lock control method and system | |
CN105939197B (en) | A kind of identity identifying method and system | |
US20050226475A1 (en) | Method of, and system for, accessing a home or dwelling | |
CN102262793A (en) | Entrance guard control method and entrance guard control system | |
CN103544746A (en) | Electronic access control system of dynamic bar code | |
CN105871874A (en) | Mobile Internet virtual key authorizing system and hardware door lock control method thereof | |
CN102567686A (en) | Security authentication method of application software of mobile terminal based on human body stable characteristics | |
CN107734158A (en) | The method and system of remote management is carried out using intelligent hand-held terminal Lock device with two same action member | |
CN108711209A (en) | dynamic password generation and verification method and system | |
CN108109242B (en) | Hardware encryption method and system based on fingerprint unlocking and intelligent cloud lock | |
CN105261100A (en) | Entrance guard unlocking method and system | |
CN108712389A (en) | A kind of intelligent lock system | |
CN110930574A (en) | Access control method and system and intelligent device | |
CN104735168A (en) | Unlocking method of network-based password generation and decryption | |
CN106056713A (en) | Remote authorization method for combination locks | |
CN109035499A (en) | A kind of electronic password lock authentication method based on dynamic password | |
CN103035049A (en) | FPGA (Field Programmable Gate Array)-based face recognition entrance guard device and FPGA-based face recognition entrance guard method | |
CN113971849A (en) | Dynamic coded lock with management system | |
CN104135480A (en) | Entrance guard authorization system and entrance guard authorization method | |
CN104361667B (en) | A kind of access control system and its entrance guard authorization method based on 4G communications | |
CN115690969A (en) | Non-contact fingerprint authentication method, terminal, access control equipment and storage medium | |
CN109087418A (en) | A kind of intelligent unlocking method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |