CN104217477B - Bluetooth security system - Google Patents
Bluetooth security system Download PDFInfo
- Publication number
- CN104217477B CN104217477B CN201410382734.0A CN201410382734A CN104217477B CN 104217477 B CN104217477 B CN 104217477B CN 201410382734 A CN201410382734 A CN 201410382734A CN 104217477 B CN104217477 B CN 104217477B
- Authority
- CN
- China
- Prior art keywords
- data
- identification data
- blue
- tooth
- tooth device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Lock And Its Accessories (AREA)
Abstract
The open a kind of bluetooth security system of the present invention, issues unit, action blue-tooth device including identification data and receives device.Identification data issues unit, for producing and transmitting electronic cards, this electronic cards includes the identification data being encrypted with Crypted password, action blue-tooth device receives the identification data of encryption by transmission channel, and may choose whether importation clear crytpographic key, electronic cards after allowing deciphering when clear crytpographic key is consistent with Crypted password is built in action blue-tooth device, and action blue-tooth device has the first bluetooth module.Receiving device have the second bluetooth module and be provided with storage element, storage element stores reception device data.Wherein, receive and set up communication link optionally through first and second bluetooth module between device and action blue-tooth device, action blue-tooth device carries out instructing forwarding step by communication link, and this instruction forwarding step at least transmits the identity code of encrypted key encryption to receiving device.The present invention is without storing all right of access data in device to be verified, and right of access data is without carrying out contrast verification one by one.
Description
Technical field
The present invention is relevant with Bluetooth system, in particular to a kind of bluetooth security system.
Background technology
Door turnover is the primary emphasis of home safety, and general gate or various door body are provided with antitheft door mostly
Lock and the corresponding safety key used, door lock is that one is located between door-plate and doorframe, by being respectively arranged on door
Plate cooperates with buckling parts with the locking plate on doorframe, reaches the door-plate mesh with the relative position between doorframe that locks
, in preventing the enabling easily of the thieves or robbers who act under cover of night from entering, cause the careless omission of home safety.
Conventional door lock portion the most in the inner is provided with a locking plate, this locking plate can by key or the driving of knob court
Projection outside door lock, additionally can be further with the pushing and withstanding of spring to assist locking plate to be positioned to lock or unblank
Position.But, this type of door lock is heaviness and anti-theft effect is the most not satisfactory, and need to carry with stupid
The key of weight.
At present, having had the door lock of electronic induction function, available less radio-frequency card senses to carry out door lock
Unlatching, be therefore not required to carry with the key of heaviness, greatly improve the convenience that door lock uses.So, this
Class door lock need to store each default identity code presetting the sensing card that can pass through and Encryption Key in advance, and needs
Store all right of access data of each default sensing card that can pass through in the lump (such as: can pass through reception dress
Put title and reception device group name of can passing through, enable period data, other auxiliary confirmation data, effectively
Period data, period data of can passing through and can access times data etc.), and under identical storage area,
The data set number of the storable default sensing card that can pass through of this door lock is less, and in addition, door lock is to sensing
The each project of right of access data of card all needs comparison one by one, verify the most time-consuming slowly, and,
This type of door lock and the sensing purposes of card, security verified or other Verification Projects cannot the most safely but also simple
Easily change, if additionally, the sensing card of multiple correspondence need to then be needed to carry by many door locks, because of
This is the most inconvenient.
Therefore, it is necessary to provide a kind of novelty and there is the bluetooth security system of progressive, to solve above-mentioned asking
Topic.
Summary of the invention
Present invention is primarily targeted at a kind of bluetooth security system of offer, it is only necessary to store in action blue-tooth device
There are default identity code and Encryption Key, separately store all rights of access money without in each device to be verified
Material, the most single reception device can store the passed through user data of more groups;Additionally, all right-of-ways
Limit data is directly integrated in the identification data of electronic cards, it is only necessary to by action blue-tooth device according to the data of identification
In right of access data compare judgement, can complete the checking of tight security, and carry out opening the door,
The program such as unblank, antitheft.
It is another object of the present invention to be selectively established the project of the right of access data of identification data, with suitable
For different purposes, the demand that safety or verifying speed set;Same electronic cards is that enabling first next time is excellent
First select, the checking of an electronic cards can be completed quickly and easily.
For reaching above-mentioned purpose, the present invention by the following technical solutions:
A kind of bluetooth security system, it includes that an identification data issues unit, an action blue-tooth device and connects
Receiving apparatus;This identification data issues unit, and for producing and transmitting an electronic cards, this electronic cards includes adding with one
The identification data that password is encrypted, this Crypted password includes multidigit tuple, the one of these bit groups
Part can be defined bit group by the user of user self-defining, and this identification data at least includes one group of identity
Code (Card ID code), Encryption Key and right of access data.This action blue-tooth device is by a transmission
Path receives this identification data encrypted through this Crypted password, and may choose whether importation clear crytpographic key,
This electronic cards after allowing deciphering when this clear crytpographic key is consistent with this Crypted password is built into this action bluetooth
In device, this action blue-tooth device also has one first bluetooth module.This reception device has one second bluetooth
Module and be provided with a storage element, this storage element stores a reception device data.Wherein, this reception dress
Put and set up a communication link optionally through this first and second bluetooth module between this action blue-tooth device
Knot, this action blue-tooth device carries out an instruction forwarding step by this communication link, and this instruction forwarding step is
At least transmit this identity code encrypted through this Encryption Key to this reception device.
Further,
Described identification data is issued unit and is also included that an encryption enables module and and enables module even with this encryption
The input module connect, this encryption enable module be provided with one preset enable code, when this encryption enable module receive come
When freely the input code of this input module input is preset with this and enabled code-phase symbol, described identification data issues unit
Allow to carry out the foundation of described identification data.
Described identification data also includes that one can pass through reception device name, and described reception device has one and presets dress
Put title, receive device name phase when described action blue-tooth device judges that this default device name and this can pass through
Fu Shi, sets up this communication link, described action bluetooth between described action blue-tooth device and described reception device
Device can carry out described instruction forwarding step.
Described identification data also includes that one enables period data, and described action blue-tooth device has a first device
Time data, enables in the time interval that period data is defined when this first device time data falls within this
Time, the most described action blue-tooth device begins to be built into described electronic cards.
Described identification data also includes one first auxiliary confirmation data, and described action blue-tooth device has an equipment
Identification data, when described action blue-tooth device judges this first auxiliary confirmation data and this equipment identification data phase
Fu Shi, carries out described instruction forwarding step by described action blue-tooth device.
Described identification data is issued unit and is included one for the encryption module being encrypted described identification data, institute
State identification data and also include one second auxiliary confirmation data, this second auxiliary confirmation data and this encryption module pair
Crypted password that described identification data is encrypted is bound in groups, described identification data issue unit judges from
Whether one input auxiliary confirmation data of described action blue-tooth device is consistent with this second auxiliary confirmation data, if
Be consistent, the most described action blue-tooth device can decipher encrypted after described identification data.
Described identification data also includes that a valid period data, described action blue-tooth device have a first device
Time data, when this first device time data falls within the time interval that this valid period data is defined
Time, described action blue-tooth device carries out this instruction forwarding step.
Described identification data also include one can access times data, when by described action blue-tooth device with described
The number of times that identification data and described reception device carry out verifying exceedes this can making of defining of access times data
When using number of times, described action blue-tooth device can not carry out described instruction forwarding step.
Described identification data also includes that authority data during a school, described action blue-tooth device have a first device
Time data, described reception device has one second setup time data, and described reception device receives described row
It is changed to this second setup time data after the transmission instruction of dynamic blue-tooth device provide with this first device time
Expect identical.
Described identification data also include electronic cards version, electronic cards title, electronic cards type, electronic cards purposes,
Bluetooth logins password;Described identification data also includes a reception device lead code, and described reception device has one
For the default device lead code compared with described reception device lead code;Described identification data also include to
The few one reception device name and at least that can pass through can pass through reception device group name, and described reception device has
Have for and this can pass through reception device name and this at least one can pass through reception device group name compare
One preset device name and and preset device group name;Described identification data also includes that one enables period money
Material, this action blue-tooth device has one for enabling, with this, the first device time money that period data is compared
Material;Described identification data also include one first auxiliary confirmation data, described action blue-tooth device have one for
The equipment identification data that this first auxiliary confirmation data is compared;Described identification data also includes that one second is auxiliary
Help confirmation data, the encryption that this identification data is encrypted by this second auxiliary confirmation data with an encryption module
In groups, this second auxiliary confirmation data is for comparing with this password for cryptographic binding;Described identification data is also wrapped
Including a valid period data, described action blue-tooth device has one for comparing with this valid period data
First device time data;Described identification data also includes that one can pass through period data, this period money of can passing through
Material was compared for the time with this first device time data;Described identification data also includes that one can use time
Number data;Described identification data also includes authority data during a school, when this reception device has second device
Between data, during this school, authority data is provided with this first device time data and carries out this second setup time data
During school.
When following all conditions meets the most simultaneously, described action blue-tooth device can carry out described instruction
Forwarding step:
Described reception device lead code is consistent with described default device lead code;Described reception device name of passing through
Title and described at least one can pass through and receive device group name and described default device name and described default dress
Put group name to be consistent;Described first device time data enables, described in falling within, the time that period data is defined
In interval;Described action blue-tooth device judges described first auxiliary confirmation data and described equipment identification data phase
Symbol;Described identification data is issued unit and can be judged to confirm money from an input auxiliary of described action blue-tooth device
Expect to be consistent with described second auxiliary confirmation data;Described first device time data falls within money of described valid period
In the time interval that material is defined;Described first device time data falls within described period data institute circle of can passing through
In the fixed period;And, entered with described reception device with described identification data by described action blue-tooth device
Row checking number of times not less than described can access times data define can access times.
Described identification data also includes that one adds depreciation service profile, and described reception device is one to add depreciation service system
Unite and be provided with at least one and add depreciation service profile for adding the default of depreciation service profile comparison with this.
It is an advantage of the current invention that:
The present invention is without storing all right of access data in each device to be verified, and single reception device can store
The passed through user data of more groups;All right of access data are directly integrated in the identification data of electronic cards
In, it is only necessary to compared judgement according to the right of access data in identification data by action blue-tooth device, i.e.
The checking of tight security can be completed.
Accompanying drawing explanation
Fig. 1 and Fig. 2 is the electronic cards hair fastener schematic diagram of a preferred embodiment of the present invention.
Fig. 3 and Fig. 4 is the bluetooth security system application schematic diagram that the present invention one preferably implements.
Fig. 5 is the bluetooth security System Operation flow chart of a preferred embodiment of the present invention.
Detailed description of the invention
Hereinafter only with embodiment, the embodiment that the present invention is possible is described, so and be not used to limit the present invention and be intended to protect
The category protected, states in advance.
Refer to Fig. 1 to Fig. 5, a preferred embodiment of its display present invention, the bluetooth security system of the present invention
System includes that an identification data is issued unit 10, action blue-tooth device 20 and and received device 30.Wherein,
Bluetooth security system such as can be applicable to general gate inhibition, patrol, ferrum rolling door, saves from damage, adds the fields such as depreciation,
So any other system that can be controlled by Bluetooth system is the most applicable.
Identification data is issued unit 10 and for generation and is transmitted an electronic cards, and this electronic cards includes with an encryption close
The identification data that code is encrypted, this Crypted password includes that multidigit tuple is (such as: 16 bit groups
(byte)), a part (such as: 4 bit groups) for these bit groups can be by user self-defining
User definition bit group, identification data at least includes one group of identity code (Card ID code), encryption gold
Key and right of access data.Identification data issues unit 10 for example, manager's computer, storage has individual
The computer system of data, high in the clouds management system, smart mobile phone or any similar managing device, this identity code can
It is set as 16 or other figure place passwords according to need, this Encryption Key for example, high-order encryption standard
(Advanced Encryption Standard, AES KEY) or other encryption standards, right of access data example
As include transitable device name, device group, the period, effective term, can number of passing through, be
No have docking receiving apparatus 30 to be calibrated authority, add depreciation etc., but is not limited.Identification data is issued
Unit 10 can by any approach (as wired/Wi-Fi, bluetooth, e-mail, IMU software or its
His mode), will identify that data transmission is to action blue-tooth device 20.
Action blue-tooth device 20 is by the identification data of a transmission channel encrypted password encryption of reception, action
Blue-tooth device 20 may choose whether that importation clear crytpographic key is (such as: front the 12 of 16 bit group encryption passwords
Bit group is for pre-entering, and the password of rear 4 bit groups can be inputted voluntarily by user or use systemic presupposition
Value), the electronic cards after allowing deciphering when clear crytpographic key is consistent with Crypted password is built into action blue-tooth device
In 20, action blue-tooth device 20 also has one first bluetooth module 21.Action blue-tooth device 20 is e.g.
One has the mobile phone of Bluetooth function, computer or other running gears.Action blue-tooth device 20 and reception device
30 preferably utilize bluetooth 4.0 to carry out communication, automatically can complete line with reception device 30, but also can profit
Use other versions.
Receiving a device 30 e.g. Bluetooth switch, Bluetooth switch can have read head and controller merit simultaneously
Can, receive device 30 and there is one second bluetooth module 31 and be provided with a storage element 32, receive device 30
And there is a confession process, comparison and judge the data processing unit 33 of data, storage element 32 stores one
Receive device data.Storage element 32 can have the white list of least one set identity code and blacklist and
Encryption Key, reception device 30 data (data of device itself) such as device name, device group,
The time etc. of device itself.Wherein, receive device 30 and action blue-tooth device 20 between optionally through
First bluetooth module 21 and the second bluetooth module 31 set up a communication link, and action blue-tooth device 20 passes through
Communication link carries out an instruction forwarding step, and this instruction forwarding step is at least to transmit the encryption of encrypted key
Identity code is to receiving device 30.
It is preferred that identification data issues unit 10 also includes that an encryption enables module 11 and and opens with this encryption
The input module 12 connected with module 11, input module 12 for example, keyboard or touch control screen, encryption enables
Module 11 be provided with one preset enable code, when this encryption enable module 11 receive come Freely input module 12 defeated
The input code entered with preset enable code-phase symbol time, identification data is issued unit 10 and is allowed to be identified data
Set up.In other words, when identification data to be used is issued before unit 10 sets up electronic cards, need first via
Input module 12 input enables, with presetting, the data that code-phase accords with, and begins to enable the function setting up this electronic cards,
Can prevent the non-personnel with authority from arbitrarily setting up electronic cards and increasing safety.
It is preferred that identification data also includes that one enables period data, action blue-tooth device 20 has one first
Setup time data (the display time on action blue-tooth device 20), when first device time data falls within
Time in the time interval that during enabling, data is defined, then action blue-tooth device 20 begins to be built into electronic cards,
If first device time data does not falls within when enabling in the period time interval that defined of data, then bluetooth of taking action
Device 20 i.e. can not be built into electronic cards or electronic cards fails to use immediately.It is noted that and works as
In action blue-tooth device 20 input clear crytpographic key incorrect or in enable period import electronic cards, then this
Rear electronic cards i.e. cannot import action blue-tooth device 20 and go out of use need not.
In the present embodiment, identification data also includes one first auxiliary confirmation data, blue-tooth device 20 of taking action
There is an equipment identification data, when action blue-tooth device 20 judges that the first auxiliary confirms data and equipment identification
When data is consistent, begin to carry out instructing forwarding step by action blue-tooth device 20.First auxiliary confirms money
Material and equipment identification data e.g. international mobile device identification code (International Mobile Equipment
Identity number, IMEI) or telephone number, if wherein action blue-tooth device 20 mobile phone, then its tool
There are unique IMEI code and telephone number, if therefore the first auxiliary confirmation data and equipment identification data
When not corresponding, then cannot carry out instructing forwarding step by action blue-tooth device 20, so can increase checking
Safety.
Wherein, when receiving after device 30 receives group encryption key and identity code, if receive device 30 have with
Encryption Key that Encryption Key and identity code are consistent and identity code, receive device 30 can carry out one corresponding to
The permission operation program of the instruction that instruction forwarding step is sent is (such as: opening-closing door;Patrol confirms;Ferrum
Rolling door upper and lower, stop action;Antitheft setting, antitheft releasing, enabling;Or transmit again CARD ID and
Related data is to other device (such as access controller)).
Optionally adding strong security according to different demands, such as, identification data is issued unit 10 and can be included
The identification data issuing action blue-tooth device 20, for the encryption module being encrypted identification data, is entered by one
Row encryption (such as AES KEY), identification data also includes one second auxiliary confirmation data, and this is second auxiliary
The Crypted password helping confirmation data and encryption module to be encrypted identification data is bound in groups, and identification data is sent out
Can judge from whether an input auxiliary confirmation data of action blue-tooth device 20 assists with second to unit 10
Confirmation data is consistent, if being consistent, then action blue-tooth device 20 begin to decipher encrypted after identification data.
A second auxiliary confirmation data for example, e-mail address, identification data is issued unit 10 and can be led to further
Cross the Crypted password with encryption and bind groups of e-mail address, confirm whether user is electronic cards
Real holder.
For convenience of description, in the present embodiment, electronic cards is defined as a BCard (BluetoothCard),
Identification data also includes electronic cards version (BCard version, A to Z), (BCard is pre-for electronic cards title
If title), electronic cards type (1: newly-increased;2: displacement AES KEY;3: replace whole BCard),
Electronic cards purposes (1: general gate inhibition;2: patrol;3: ferrum rolling door;4: save from damage;5: add depreciation),
Bluetooth logins password (login password);Identification data also include reception device 30 lead code (such as:
The first two code of door district coding), receive device 30 and have one for pre-with what reception device lead code was compared
If device lead code;Identification data also includes that at least one reception device name and at least that can pass through can pass through and connects
Receiving apparatus group name, receives device 30 and has for passing through with the reception device name and at least that can pass through
Receive that device group name compares one presets device name and and presets device group name;Identify money
Material includes enabling period data, and (the effective of application software (App) that Bcard imports on such as mobile phone rises
Time beginning, the date little time-division;BCard imports effective end time of App, date little time-division),
Blue-tooth device 20 of taking action has for and enables the first device time data that period data is compared;Identify
Data includes that the first auxiliary confirms that data, action blue-tooth device 20 have for entering with the first auxiliary confirmation data
The equipment identification data of row comparison;Identification data includes that the second auxiliary confirms data, the second auxiliary confirmation data
The Crypted password being encrypted identification data with encryption module is bound in groups, the second auxiliary confirmation data for
Password is compared;Identification data also include a valid period data (the effective from date of BCard data,
The date little time-division;BCard data effective Close Date, the date little time-division), blue-tooth device 20 of taking action
Have one for the first device time data compared with valid period data;Identification data also includes that one can
Current period data (time started+end time+pressure input personal identification number), period data of can passing through supplies
Compare with the time of first device time data;Identification data also includes that one can access times data;Know
Other data also includes authority data during a school, receives device 30 and has one second setup time data, time
Difference standard is provided with first device time data and is calibrated the second setup time data, receives device 30 and connects
After receiving the transmission instruction of action blue-tooth device 20, second setup time data is changed to and the first device time
Data is identical.
Whether the identification data of above-described electronic cards can arrange tabular as with following table one, wherein " can be empty "
Field in " N " represent "No", " Y " represents "Yes":
(table one)
In an embodiment including as above the identification data shown in (table one), wherein when following all conditions
When meeting, action blue-tooth device 20 begins to carry out instructing forwarding step: before receiving device the most simultaneously
Leading code is consistent with default device lead code;The reception device name and at least that can pass through can pass through and receive device group
Group name is consistent with default device name and default device group name;First device time data falls within and enables
In the time interval that period data is defined;Action blue-tooth device 20 judges that the first auxiliary confirms data and sets
Standby identification data is consistent;Identification data issues unit 10 can judge the input from action blue-tooth device 20
Auxiliary confirmation data is consistent with the second auxiliary confirmation data;First device time data falls within valid period data
In the time interval defined;First device time data falls within the period that period data of can passing through is defined
In;And, carry out the number of times verified not with identification data with receiving device 30 by action blue-tooth device 20
Exceed can access times data define can access times.Wherein, if receiving the data of device 30 (such as
Device name, device group etc.) with action blue-tooth device 20 identification data in right of access data in
When transitable device name, device group do not correspond and are not depicted on action blue-tooth device 20, action
Blue-tooth device 20 then can not send instruction;But, if leading in the identification data of action blue-tooth device 20
The device name of row, device group are " empty ", i.e. do not set any device name, device group, then go
Dynamic blue-tooth device 20 does not filter the reception device name of device 30, device group, can directly with reception device
30 communications connect, but must further judge in right of access data, whether other data are consistent,
Instruction can be sent.
It addition, the bluetooth security system of the present invention also can have additional adds depreciation service correlation function, such as: know
Other data can include adding depreciation service profile, receive device 30 be one add depreciation service system (such as one with
Bank can carry out automation or the cloud server etc. of the services such as amount of money remittance and/or remittance abroad) and be provided with
At least one for add the default of depreciation service profile comparison and add depreciation service profile, be applied to include Stored Value or
/ and program of withholing.
Being noted that spirit based on the present invention, the framework of bluetooth security system can be varied design,
The right of access data of identification data can be different, such as according to different demands or safety: receive device leading
Code, the reception device name and at least that can pass through can pass through and receive device group name, enable period data remittance
Enter the effective initial time of application software (App) on action blue-tooth device 20, the first auxiliary confirms money
Material, second auxiliary confirmation data, valid period data, period data of can passing through or can access times data,
Can be all selectivity data (not essential), such definable goes out to have the electronic cards of different safety.
The present invention at least can realize following functions:
Basic function:
1. can deposit 32 groups or the electronic cards of more groups on action blue-tooth device (such as bluetooth cellular phone)
(BCard)。
2. receive device lead code: the key frame of action blue-tooth device only shows and meets in action blue-tooth device
The reception device (such as door zone device) receiving device lead code title of all electronic cards, if there being electronic cards
Lead code is empty, does not the most filter reception device name.
3. show different corresponding button in action blue-tooth device, as shown in the following chart according to the purposes of electronic cards:
| Purposes code | Purposes title | Corresponding button |
| 1 | General gate inhibition | Open the door |
| 2 | Patrol | Patrol |
| 3 | Ferrum rolling door | Upper and lower, stop |
| 4 | Save from damage | Antitheft setting, antitheft releasing, enabling |
| 5 | Add depreciation | Add depreciation |
4. telephone number, takes last 8 yards and judges during checking.
It is 6 yards that the identifying code in letter is sent in 5.EMAIL checking.
Application software (App) is newly-increased/change function:
1. electronic cards (BCard) displacement
2.BCard is newly-increased to be limited:
(1) can pass through the period limit: distribution BCard time can set and can pass through the period, but one or more period,
Initial adding, terminates totally 8 yards of 24 hours systems;When sending door open command, carry mobile phone the machine time secretly, if receiving
Time phase difference more than 10 minutes (can set in tool program) between device and action blue-tooth device,
Then prompting " time error is excessive, please school time ";
(2) force input personal identification number: hold, whether can need to input personal identification number according to slot setup and just can lead to
OK, " 0 " for being not required to input, " 1 " for needing input;It is stored in App, 6 to 12 figure places;Preset password is
000000。
(3) can number of passing through: the transitable total degree of this BCard can be limited.
(4) limiting a district of can passing through: with the entitled restrictive condition of device, can limit in multi-door district, blank is unlimited
System.
3. a group of district
(1) device name that can arrange suitable prefix word string in App is group of same door district, such as: have
Four door zone devices, title is respectively as follows: SY1-DOOR1, SY1-DOOR2, SY2-FRONT,
SY3-BACK, wherein, sets SY1 as group's prefix word, then SY1-DOOR1 and SY1-DOOR2,
It is considered as group of same door district, by that analogy.
(2) group of door district can arrange another name.
(3) 16 groups can at most be set.
The free BCard of 4.App opens the door
(1) after selecting door district, clicking enabling, App can automatic decision action blue-tooth device (such as bluetooth cellular phone)
In whether have the BCard of any correspondence, if there being corresponding BCard, and be to have permission enabling instantly,
Just send identification data to receiving device.
(2) Rule of judgment a: group of district of can passing through, the Men Qu that can pass through, time zone of can passing through, it is judged that foundation can
With reference to following table:
| Can be passed through group of a district YES | Can be passed through group of a district NO | |
| Can be passed through a district YES | Group of door district | Door district |
| Can be passed through a district NO | Group of door district | All can pass through (unrestrictedly) in door district |
(3), after opening the door successfully, open the door successful BCard ID by record, first preferentially selects for opening the door next time
BCard.
5. addition is counter coerces password setting
(1) counter coerce password must not identical with personal identification number (such as: anti-password of coercing is preset as 888888,
Preferably more than 6).
(2) when user input counter coerce password time, i.e. transmit counter coerce instruction to door zone device.
6. district's quantity limits
(1) the App key frame of action blue-tooth device can show 1024 or more door zone device.
(2) action blue-tooth device only shows the door zone device meeting lead code.
7. transmit requirement/response (REQUEST for sending Bcard/RESPONSE to of electronic cards
send Bcard)
The requirement of transmission electronic cards:
Electronic cards instruction sends form (in this example: fixing 32Byte)
Purposes (Type): (1: gate inhibition/2: patrol/3: ferrum rolling door/4: save/5 from damage: add depreciation)
Instruction (Cmd): (1: general/ferrum rolling door (1: open/2: stop/3: close)/save (1: set from damage
Fixed/2: release)
State (Status): (1: general/2: password OK/3: counter coerce OK)
Bluetooth communication pairing password (BT-PIN): such as: " 8888 "
Simulation card number (UID): such as: 0x00 0x80 0x20 0xB6 0xEA 0x8A 0x57 0x04
Simulation password (PIN): such as: 0x12 0x34 0xFF 0xFF 0xFF 0xFF 0xFF 0xFF
Authority (Admin) during school: (0: without authority/1 during school: authority when having school);Such as: 0x01
Time (DateTime): Y (2) M D H N S during school;Such as: 0x07 0xDE 0x06 0x1E 0xB
0x00 0x00;Wherein, Y M D H N S represents " the little Hour Minute Second of date " respectively
The response of transmission electronic cards:
Form (in this example: fixing 24Byte) is responded in electronic cards instruction
Purposes (Type): (1: card reader pattern/2: director mode/3: ferrum rolling door pattern)
Function (Func): (1: general/2: need password)
State (Status): (0: without/1: correct/2: need password)
Device model (Mode): such as: 0x0604
Device sequence number (S/N): such as: 0x14170001
Setup time (DateTime): Y (2) M D H N S W;Such as: 0x07 0xDE 0x06 0x1E
0xB 0x00 0x00 0x01;Wherein, Y M D H N SW represents " date little Hour Minute Second week " respectively
Wherein, the content of the requirement/response of above-mentioned transmission electronic cards by way of example only, actually can be according to not
With demand design for change.
By the bluetooth security system of the present invention, action blue-tooth device only needs to store default identity code, adds
Close key and right of access data, separately store all right of access data without in each device to be verified
(such as: can pass through reception device name and can pass through reception device group name, enable period data, its
He assist confirmation data, valid period data, period data of can passing through and can access times data), because of
This single reception device can store the passed through user data of more groups;Additionally, all right of access data
Directly it is integrated in the identification data of electronic cards, it is only necessary to by action blue-tooth device according to leading in identification data
Row authority data is compared judgement, can complete the checking of tight security, and carry out opening the door, unblank,
Antitheft add the programs such as depreciation.
Further, the project of the right of access data of identification data can selectivity be built according to different demands or safety
Vertical, electronic cards safety or the verifying speed that can be suitable for according to different application field or Systematic selection set.
Additionally, identification data i.e. includes can pass through reception device name and reception device group name of can passing through
Claim, enable period data, other auxiliary confirmation data, valid period data, period data of can passing through and
Can access times data, therefore can complete quickly and easily one electronic cards checking.What is more, action bluetooth dress
Put the identity code that can record electronic cards after an electronic cards is by checking, when next time is verified, be first
The preferential electronic cards selected, and directly carry out the identification of other data, more can accelerate verifying speed.
In sum, in the overall construction design of the present invention, practicality and benefit, strictly comply fully with product
In industry, development is required, and disclosed architecture invention is also to have unprecedented innovative structure, so its tool
Have " novelty " should without doubt, again the present invention can the enhancement of relatively known structure more effect, the most also have
" progressive ".
Claims (12)
1. bluetooth security system, it is characterised in that including:
One identification data issues unit, and for producing and transmitting an electronic cards, this electronic cards includes with an encryption close
The identification data that code is encrypted, this Crypted password includes multidigit tuple, the one of these bit groups
Part can be defined bit group by the user of user self-defining, and this identification data at least includes one group
Identity code, Encryption Key and right of access data;
One action blue-tooth device, receives this identification data encrypted through this Crypted password by a transmission channel,
Can importation clear crytpographic key, when this part clear crytpographic key is consistent with the corresponding position of this Crypted password
Time allow will deciphering after this electronic cards be built in this action blue-tooth device, this action blue-tooth device has
One first bluetooth module;
One receives device, has one second bluetooth module and is provided with a storage element, and this storage element stores
One receives device data;
Wherein, between this reception device and this action blue-tooth device optionally through this first bluetooth module,
Second bluetooth module sets up a communication link, and this action blue-tooth device carries out a finger by this communication link
Making forwarding step, this instruction forwarding step at least transmits this identity code encrypted through this Encryption Key extremely should
Receive device.
2. bluetooth security system as claimed in claim 1, it is characterised in that described identification data is issued
Unit also includes that an encryption enables module and and enables the input module that module is connected with this encryption, and this encryption is opened
It is provided with one with module to preset and enable code, receives the defeated of freely this input module input when this encryption enables module
Entering code and this is preset when enabling code-phase symbol, described identification data is issued unit and is allowed to carry out described identification data
Set up.
3. bluetooth security system as claimed in claim 1, it is characterised in that described identification data is also wrapped
Including one can pass through reception device name, described reception device has presets device name, when described action indigo plant
Tooth device judges this default device name reception device name that can pass through with this when being consistent, and described action bluetooth fills
Putting and set up this communication link between described reception device, described action blue-tooth device can carry out described instruction and send out
Send step.
4. bluetooth security system as claimed in claim 1, it is characterised in that described identification data is also wrapped
Including one and enable period data, described action blue-tooth device has a first device time data, when this first dress
The time data of putting fall within this when enabling in the period time interval that defined of data, the most described action blue-tooth device
Begin to be built into described electronic cards.
5. bluetooth security system as claimed in claim 1, it is characterised in that described identification data is also wrapped
Including one first auxiliary confirmation data, described action blue-tooth device has an equipment identification data, when described action
Blue-tooth device judges when this first auxiliary confirmation data is consistent with this equipment identification data, by described action indigo plant
Tooth device carries out described instruction forwarding step.
6. bluetooth security system as claimed in claim 1, it is characterised in that described identification data is issued
Unit includes one for the encryption module that is encrypted described identification data, and described identification data also includes one the
Two auxiliary confirmation data, described identification data is encrypted by this second auxiliary confirmation data with this encryption module
Crypted password bind in groups, described identification data issues unit judges from the one of described action blue-tooth device
Whether input auxiliary confirmation data is consistent with this second auxiliary confirmation data, if being consistent, and the most described action bluetooth
Device can decipher encrypted after described identification data.
7. bluetooth security system as claimed in claim 1, it is characterised in that described identification data is also wrapped
Including a valid period data, described action blue-tooth device has a first device time data, when this first dress
When the time data of putting falls within the time interval that this valid period data is defined, described action blue-tooth device enters
This instruction forwarding step of row.
8. bluetooth security system as claimed in claim 1, it is characterised in that described identification data is also wrapped
Include one can access times data, when by described action blue-tooth device with described identification data with described receive dress
Put the number of times carrying out verifying exceed this can access times data define can access times time, described action bluetooth
Device can not carry out described instruction forwarding step.
9. bluetooth security system as claimed in claim 1, it is characterised in that described identification data is also wrapped
Authority data when including a school, described action blue-tooth device has a first device time data, and described reception fills
Putting and have one second setup time data, described reception device receives the transmission instruction of described action blue-tooth device
After this second setup time data is changed to identical with this first device time data.
10. bluetooth security system as claimed in claim 1, it is characterised in that described identification data is also wrapped
Include electronic cards version, electronic cards title, electronic cards type, electronic cards purposes, bluetooth login password;Described
Identification data also includes a reception device lead code, described reception device have one for described reception device before
The default device lead code that leading code is compared;Described identification data also includes that at least one can pass through reception device
Title and at least one can be passed through and be received device group name, and described reception device has confession and this reception of can passing through
Device name and this at least one can pass through receive device group name compare one preset device name and
One presets device group name;Described identification data also includes that one enables period data, this action blue-tooth device
Have one for enabling, with this, the first device time data that period data is compared;Described identification data is also wrapped
Including one first auxiliary confirmation data, described action blue-tooth device has one for entering with this first auxiliary confirmation data
The equipment identification data of row comparison;Described identification data also includes one second auxiliary confirmation data, and this is second auxiliary
The Crypted password helping confirmation data and an encryption module to be encrypted this identification data is bound in groups, and this is second years old
Auxiliary confirmation data is for comparing with this password;Described identification data also includes a valid period data, institute
State action blue-tooth device and have one for the first device time data compared with this valid period data;Institute
State identification data and also include that one can pass through period data, this can pass through period data for and this first device time
The time of data compares;Described identification data also includes that one can access times data;Described identification data
Also including authority data during a school, this reception device has one second setup time data, authority money during this school
Material is provided with this first device time data and is calibrated this second setup time data.
11. bluetooth security systems as claimed in claim 10, it is characterised in that when following all conditions
When meeting, described action blue-tooth device can carry out described instruction forwarding step the most simultaneously:
Described reception device lead code is consistent with described default device lead code;Described reception device name of passing through
Title and described at least one can pass through and receive device group name and described default device name and described default dress
Put group name to be consistent;Described first device time data enables, described in falling within, the time that period data is defined
In interval;Described action blue-tooth device judges described first auxiliary confirmation data and described equipment identification data phase
Symbol;Described identification data is issued unit and can be judged to confirm money from an input auxiliary of described action blue-tooth device
Expect to be consistent with described second auxiliary confirmation data;Described first device time data falls within money of described valid period
In the time interval that material is defined;Described first device time data falls within described period data institute circle of can passing through
In the fixed period;And, entered with described reception device with described identification data by described action blue-tooth device
Row checking number of times not less than described can access times data define can access times.
The 12. bluetooth security systems as described in claim 1 or 10, it is characterised in that described identification provides
Material also includes that one adds depreciation service profile, and described reception device is one to add depreciation service system and be provided with at least one
Depreciation service profile is added for adding the default of depreciation service profile comparison with this.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201410382734.0A CN104217477B (en) | 2014-08-06 | 2014-08-06 | Bluetooth security system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201410382734.0A CN104217477B (en) | 2014-08-06 | 2014-08-06 | Bluetooth security system |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN104217477A CN104217477A (en) | 2014-12-17 |
| CN104217477B true CN104217477B (en) | 2016-08-10 |
Family
ID=52098916
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201410382734.0A Expired - Fee Related CN104217477B (en) | 2014-08-06 | 2014-08-06 | Bluetooth security system |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN104217477B (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109285247B (en) * | 2015-07-06 | 2021-03-09 | 福建省新泽尔资讯科技有限公司 | Bluetooth unlocking method capable of simultaneously activating one-card function |
Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1946912A (en) * | 2004-02-24 | 2007-04-11 | 塔格马斯特股份公司 | Method of authorization |
| CN101315710A (en) * | 2007-06-01 | 2008-12-03 | 霍尼韦尔国际公司 | Mobile-based identification in security and asset management systems |
| CN201562306U (en) * | 2009-09-11 | 2010-08-25 | 王远洲 | Intelligent door lock control system |
| CN202331600U (en) * | 2011-11-11 | 2012-07-11 | 珠海市银东科技有限公司 | Intelligent access control management system with two-way communication and multilayer authorized approval |
| CN102682506A (en) * | 2012-05-25 | 2012-09-19 | 北京华大信安科技有限公司 | Intelligent Bluetooth door access control method and device based on symmetric cryptographic technique |
| CN103026682A (en) * | 2010-06-16 | 2013-04-03 | 德尔斐系统有限公司 | Wireless device enabled locking system |
| CN103578169A (en) * | 2013-11-19 | 2014-02-12 | 南京品佳科技开发有限公司 | Intelligent informationized passive electronic lockset |
| CN103874061A (en) * | 2012-12-14 | 2014-06-18 | 通用汽车环球科技运作有限责任公司 | Method and system for secure and authorized communication between a vehicle and wireless communication devices or key fobs |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2004102682A (en) * | 2002-09-10 | 2004-04-02 | Nec Corp | Terminal lock system and terminal lock method |
| WO2013164032A1 (en) * | 2012-05-03 | 2013-11-07 | Huawei Technologies Sweden Ab | Sending access information from physical access control system to user terminal |
-
2014
- 2014-08-06 CN CN201410382734.0A patent/CN104217477B/en not_active Expired - Fee Related
Patent Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1946912A (en) * | 2004-02-24 | 2007-04-11 | 塔格马斯特股份公司 | Method of authorization |
| CN101315710A (en) * | 2007-06-01 | 2008-12-03 | 霍尼韦尔国际公司 | Mobile-based identification in security and asset management systems |
| CN201562306U (en) * | 2009-09-11 | 2010-08-25 | 王远洲 | Intelligent door lock control system |
| CN103026682A (en) * | 2010-06-16 | 2013-04-03 | 德尔斐系统有限公司 | Wireless device enabled locking system |
| CN202331600U (en) * | 2011-11-11 | 2012-07-11 | 珠海市银东科技有限公司 | Intelligent access control management system with two-way communication and multilayer authorized approval |
| CN102682506A (en) * | 2012-05-25 | 2012-09-19 | 北京华大信安科技有限公司 | Intelligent Bluetooth door access control method and device based on symmetric cryptographic technique |
| CN103874061A (en) * | 2012-12-14 | 2014-06-18 | 通用汽车环球科技运作有限责任公司 | Method and system for secure and authorized communication between a vehicle and wireless communication devices or key fobs |
| CN103578169A (en) * | 2013-11-19 | 2014-02-12 | 南京品佳科技开发有限公司 | Intelligent informationized passive electronic lockset |
Also Published As
| Publication number | Publication date |
|---|---|
| CN104217477A (en) | 2014-12-17 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12328316B2 (en) | Systems and methods for managing electronic transactions using electronic tokens and tokenized vehicles | |
| US10929832B2 (en) | Method and system for electronic wallet access | |
| KR102263895B1 (en) | Trusted device | |
| US11238681B2 (en) | Access control system with local mobile key distribution | |
| EP3228107B1 (en) | Access control system with virtual card data | |
| US8078885B2 (en) | Identity authentication and secured access systems, components, and methods | |
| US10607211B2 (en) | Method for authenticating a user to a machine | |
| US10251059B2 (en) | Authentication device and method | |
| CN100533459C (en) | Data safe reading method and safe storage device thereof | |
| US20100022239A1 (en) | Portable telephone and access control method | |
| CN107422838B (en) | Wearable device, unlocking control system and unlocking control method | |
| JP2010518499A (en) | Method for authenticating access to at least one automated component of an industrial facility | |
| KR101804182B1 (en) | Online financial transactions, identity authentication system and method using real cards | |
| US10277404B2 (en) | Communication system for the detection of a driving license | |
| WO2022221262A1 (en) | Multi-purpose physical smartcard | |
| KR20190011620A (en) | Authentication System and Device for Unmanned Sales Kiosk | |
| CN106157409A (en) | Communication means between intelligent terminal and gate inhibition and device | |
| CN104217477B (en) | Bluetooth security system | |
| TWM461081U (en) | Control system using portable electrical apparatus | |
| US20210295624A1 (en) | Wireless access control using an electromagnet | |
| TWI519114B (en) | Bluetooth safety system | |
| US20250046138A1 (en) | Server Device, Method, And Program | |
| US20250356705A1 (en) | Digital identification-based systems and methods | |
| TWI871873B (en) | Electronic access control system and operation method thereof | |
| KR102376420B1 (en) | Method for Controlling Login by Using Smart Phone |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant | ||
| CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160810 Termination date: 20210806 |
|
| CF01 | Termination of patent right due to non-payment of annual fee |