CN109272617B - Unlocking verification method, server, door lock, electronic device and storage medium - Google Patents
Unlocking verification method, server, door lock, electronic device and storage medium Download PDFInfo
- Publication number
- CN109272617B CN109272617B CN201811015487.5A CN201811015487A CN109272617B CN 109272617 B CN109272617 B CN 109272617B CN 201811015487 A CN201811015487 A CN 201811015487A CN 109272617 B CN109272617 B CN 109272617B
- Authority
- CN
- China
- Prior art keywords
- door lock
- code
- validity period
- activation code
- check code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012795 verification Methods 0.000 title claims abstract description 116
- 238000000034 method Methods 0.000 title claims abstract description 62
- 230000004913 activation Effects 0.000 claims abstract description 170
- 238000004422 calculation algorithm Methods 0.000 claims description 45
- 238000004590 computer program Methods 0.000 claims description 3
- 230000008569 process Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 238000006467 substitution reaction Methods 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/08—With time considerations, e.g. temporary activation, valid time window or time limitations
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention provides an unlocking verification method, a door lock server and a door lock, wherein the method comprises the following steps: acquiring order information, wherein the order information comprises an order validity period and a target door lock; acquiring a door lock key corresponding to the target door lock; determining whether the network state of the target door lock is in an offline state; and under the condition that the target door lock is in an offline state, generating an activation code according to the order validity period and the door lock key, and sending the activation code to a third-party system, wherein the activation code is used for verifying the target door lock and unlocking the target door lock after the verification is passed. Can be when producing new order of living in, and the lock is in the off-line, inform the user through the third party and use the activation code to unblank, can avoid the potential safety hazard that the use of former password exists after the house user changes.
Description
Technical Field
The embodiment of the invention relates to the technical field of intelligent door locks, in particular to an unlocking verification method, a server, a door lock, electronic equipment and a storage medium.
Background
The intelligent door lock can gradually replace the traditional door lock due to the advantages of higher safety and convenient use. Unlocking and management of the intelligent door lock rely on a door lock server located at a remote location. When the intelligent door lock is on line, the intelligent door lock can communicate with a remote door lock server, so that a real-time password can be obtained from the remote door lock server to unlock; when the intelligent door lock is offline, the intelligent door lock cannot communicate with the far-end door lock server, so that the real-time password cannot be acquired from the far-end door lock server. At the moment, the standby password written in the intelligent door lock in advance is used for unlocking.
However, due to the long validity period of the standby password, the standby password can be unlocked all the time when the intelligent door lock is off-line for a long time. For hotel rooms, if the house user changes, potential safety hazards exist.
Disclosure of Invention
The invention provides an unlocking verification method and device, which are used for solving the problems in the prior art.
According to a first aspect of the present invention, there is provided an unlocking verification method, the method including:
acquiring order information, wherein the order information comprises an order validity period and a target door lock;
acquiring a door lock key corresponding to the target door lock;
determining whether the network state of the target door lock is in an offline state;
and under the condition that the target door lock is in an offline state, generating an activation code according to the order validity period and the door lock key, and sending the activation code to a third-party system, wherein the activation code is used for verifying the target door lock and unlocking the target door lock after the verification is passed.
Optionally, the step of generating an activation code according to the order validity period and the door lock key includes:
generating a first validity period ciphertext according to the order validity period and the door lock key;
generating a first check code according to the order validity period and the door lock key;
and splicing the first validity period ciphertext and the first check code into an activation code.
Optionally, the step of generating a first validity period ciphertext according to the order validity period and the door lock key includes:
calculating a difference value between the order validity period and a preset reference time to obtain a first relative validity period;
and after the first relative validity period and the door lock secret key are spliced, encrypting by adopting a symmetric algorithm to obtain a first validity period ciphertext.
Optionally, the step of generating a first check code according to the order validity period and the door lock key includes:
after the order validity period and the door lock secret key are spliced, encrypting by adopting a digest algorithm to obtain a first password;
and encrypting the first password by adopting a digest algorithm to obtain a first check code.
According to a second aspect of the present invention, there is provided an unlocking verification method, the method including:
receiving an identity verification code input by a user;
judging whether a real-time password with an appointed validity period is acquired, wherein the validity period comprises the current moment;
determining whether the identity verification code input by the user is an activation code or not under the condition that the real-time password with the appointed validity period is not acquired;
and under the condition that the identity verification code is an activation code, verifying the activation code, and unlocking after the verification is passed.
Optionally, the step of verifying the activation code includes:
extracting a second check code and a third check code from the activation code;
if the second check code is consistent with the third check code, the activation code passes verification;
and if the second check code is inconsistent with the third check code, the activation code verification is not passed.
Optionally, the step of extracting the second check code and the third check code from the activation code includes:
acquiring data of a preset first segment in the activation code to obtain a second check code;
acquiring data of a preset second segment in the activation code to obtain a second validity period ciphertext;
and generating a third check code according to the second validity period ciphertext and a preset door lock secret key.
Optionally, the step of generating a third check code according to the second validity period ciphertext and a preset door lock key includes:
decrypting the second validity period ciphertext by adopting a symmetric algorithm according to a preset door lock secret key to obtain a second relative validity period;
calculating the sum of the second relative validity period and preset reference time to obtain an absolute validity period;
after the absolute validity period and the door lock secret key are spliced, encrypting by adopting a digest algorithm to obtain a second password;
and encrypting the second password by adopting a digest algorithm to obtain a third check code.
Optionally, the method further comprises:
and under the condition that the activation code passes verification, saving the second password and the absolute validity period.
Optionally, the method further comprises:
and under the condition that the identity verification code is a password, verifying the password according to the second password and the absolute validity period, and unlocking after the verification is passed.
According to a third aspect of the present invention, there is provided a door lock server comprising:
the order information acquisition module is used for acquiring order information, and the order information comprises an order validity period and a target door lock;
the door lock key acquisition module is used for acquiring a door lock key corresponding to the target door lock;
the network state determining module is used for determining whether the network state of the target door lock is in an offline state;
and the activation code generation module is used for generating an activation code according to the order validity period and the door lock secret key under the condition that the target door lock is in an off-line state, and sending the activation code to a third party system, wherein the activation code is used for verifying the target door lock and unlocking the target door lock after the verification is passed.
According to a fourth aspect of the present invention, there is provided an intelligent door lock, comprising:
the identity verification code receiving module is used for receiving an identity verification code input by a user;
the real-time password judgment module is used for judging whether a real-time password with the appointed validity period is acquired;
the activation code determining module is used for determining whether the identity verification code input by the user is the activation code or not under the condition that the real-time password with the appointed validity period is not acquired;
and the verification unlocking module is used for verifying the activation code under the condition that the identity verification code is the activation code and unlocking after the verification is passed.
According to a fifth aspect of the present invention, there is provided an electronic apparatus comprising:
a processor, a memory and a computer program stored on the memory and executable on the processor, the processor implementing the aforementioned method when executing the program.
According to a sixth aspect of the invention, there is provided a readable storage medium having instructions which, when executed by a processor of an electronic device, enable the electronic device to perform the aforementioned method.
The embodiment of the invention provides an unlocking verification method, a door lock server and an intelligent door lock, wherein the method comprises the following steps: acquiring order information, wherein the order information comprises an order validity period and a target door lock; acquiring a door lock key corresponding to the target door lock; determining whether the network state of the target door lock is in an offline state; and under the condition that the target door lock is in an offline state, generating an activation code according to the order validity period and the door lock key, and sending the activation code to a third-party system, wherein the activation code is used for verifying the target door lock and unlocking the target door lock after the verification is passed. Can be when producing new order of living in, and the lock is in the off-line, inform the user through the third party and use the activation code to unblank, can avoid the potential safety hazard that the use of former password exists after the house user changes.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive labor.
Fig. 1 is a flowchart illustrating specific steps of an unlocking verification method according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating specific steps of an unlocking verification method according to a second embodiment of the present invention;
fig. 3 is a flowchart illustrating specific steps of an unlocking verification method according to a third embodiment of the present invention;
fig. 4 is a flowchart illustrating specific steps of an unlocking verification method according to a fourth embodiment of the present invention;
fig. 5 is a block diagram of a door lock server according to a fifth embodiment of the present invention;
fig. 6 is a structural diagram of an intelligent door lock according to a sixth embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example one
Referring to fig. 1, a flowchart of specific steps of an unlocking verification method according to an embodiment of the present invention is shown.
Step 101, obtaining order information, wherein the order information comprises an order validity period and a target door lock.
The embodiment of the invention is applied to a door lock server, and the server can respectively generate the real-time password and the activation code according to whether the target door lock is on line.
A typical application scenario in the embodiment of the present invention is door lock management of hotel rooms, where a hotel management system generates order information according to check-in information of a user, and sends the order information to a door lock server.
Wherein, the order validity period can be the cut-off time of the user in the room.
The target door lock can be a door lock corresponding to a room where the user enters, and the door lock has a unique identifier. In practical applications, the identifier is set at the time of factory shipment, or determined according to hotel and room numbers.
And 102, acquiring a door lock key corresponding to the target door lock.
The door lock key is a hardware identifier of the door lock. Each door lock corresponds to a unique door lock key.
It can be understood that the door lock key may be carried in the order information, may be obtained from a database of the door lock server, or may be obtained from other specified servers.
The network state refers to whether the target door lock can be communicated with a door lock server through a network or not, and if the target door lock cannot be communicated with the door lock server through the network, the target door lock is in an offline state; if so, the target door lock is in an online state.
It can be understood that, in an online state, the target door lock can directly receive information, such as a real-time password, sent by the door lock server, so that the door lock can verify the password input by the user through the password; in an offline state, the target door lock cannot receive the information sent by the door lock server, and therefore the user identity needs to be verified in other ways.
In practical application, the door lock server can send detection information to the target door lock, and if the feedback information is not received within a certain time period, the target door lock is determined to be in an off-line state; and if the feedback information is received in the time period, determining that the target door lock is in an online state.
And 104, under the condition that the target door lock is in an off-line state, generating an activation code according to the order validity period and the door lock secret key, and sending the activation code to a third-party system, wherein the activation code is used for verifying the target door lock and unlocking the target door lock after the verification is passed.
The activation code can be generated by splicing the order validity period and the door lock secret key according to a certain rule and encrypting. It is understood that the embodiment of the present invention does not limit the specific generation method thereof.
According to the embodiment of the invention, aiming at the scene that the verification password cannot be received in the off-line state, the generated activation code is sent to the third-party system, so that the user can input the activation code into the target door lock after acquiring the activation code, and the target door lock can carry out user identity verification only according to the activation code.
Third party systems, including but not limited to hotel management systems, or room management systems or other designated systems, may be networked and in communication with the door lock server.
It can be appreciated that the activation code can be sent to the user's cell phone by a worker who is currently notifying the user of the activation code in the hotel management system when the user checks in the hotel.
In practical application, the order information may further include a user mobile phone number, so that the door lock server may also directly send the generated activation code to the user mobile phone.
In summary, an embodiment of the present invention provides an unlocking verification method, where the method includes: acquiring order information, wherein the order information comprises an order validity period and a target door lock; acquiring a door lock key corresponding to the target door lock; determining whether the network state of the target door lock is in an offline state; and under the condition that the target door lock is in an offline state, generating an activation code according to the order validity period and the door lock key, and sending the activation code to a third-party system, wherein the activation code is used for verifying the target door lock and unlocking the target door lock after the verification is passed. Can be when producing new order of living in, and the lock is in the off-line, inform the user through the third party and use the activation code to unblank, can avoid the potential safety hazard that the use of former password exists after the house user changes.
Example two
Referring to fig. 2, it shows a flowchart of specific steps of an unlocking verification method according to a second embodiment of the present invention.
Step 201, obtaining order information, wherein the order information comprises an order validity period and a target door lock.
This step can refer to the detailed description of step 101, and is not described herein again.
And step 202, acquiring a door lock key corresponding to the target door lock.
This step can refer to the detailed description of step 102, and is not described herein again.
This step can refer to the detailed description of step 103, which is not repeated herein.
And 204, under the condition that the target door lock is in an offline state, generating a first validity period ciphertext according to the order validity period and the door lock key.
Specifically, the validity period of the order and the door lock key may be spliced into one object, and then encrypted to obtain a first validity period ciphertext.
Optionally, in another embodiment of the present invention, the step 204 includes sub-steps 2041 to 2042:
substep 2041, calculating a difference between the order validity period and a preset reference time to obtain a first relative validity period.
The time for recording can be set according to the actual application scenario, and is not limited in the embodiments of the present invention.
In practical applications, the relative validity period can be expressed in minutes and seconds.
And a substep 2042, after the first relative validity period and the door lock key are spliced, encrypting by adopting a symmetric algorithm to obtain a first validity period ciphertext.
Specifically, the first relative validity period may be spliced behind the door lock key, and the door lock key may also be spliced behind the first relative validity period. The splicing sequence is not limited by the embodiment of the invention.
The symmetric algorithm is a traditional encryption algorithm, and an encryption key and a decryption key can be mutually derived. In most cases, the encryption key and the decryption key are the same.
It can be understood that the algorithm for generating the first check code is different from the algorithm for generating the first validity period ciphertext, and may be embodied as a different encryption algorithm.
Optionally, in another embodiment of the present invention, the step 205 includes sub-steps 2051 to 2052:
and a substep 2051, after the order validity period and the door lock key are spliced, encrypting by using a digest algorithm to obtain a first password.
Specifically, the order validity period may be spliced behind the door lock key, and the door lock key may also be spliced behind the order validity period. The splicing sequence is not limited by the embodiment of the invention.
The digest algorithm is characterized in that an encryption key is not needed in the encryption process, encrypted data cannot be decrypted, and the same ciphertext can be obtained only by inputting the same plaintext data and performing the same digest algorithm. The digest algorithm does not have the problems of management and distribution of encryption keys, and is suitable for a distributed network.
In an embodiment of the present invention, the digest algorithm may select MD 5.
And a substep 2052, encrypting the first password by using a digest algorithm to obtain a first check code.
It can be seen that the first check code is subjected to the two-time digest algorithm, and the security is higher.
And step 206, splicing the first validity period ciphertext and the first check code into an activation code, and sending the activation code to a third-party system, wherein the activation code is used for verifying the target door lock and unlocking the target door lock after the verification is passed.
Specifically, the first validity period ciphertext may be spliced after the first check code, or the first check code may be spliced after the first validity period ciphertext. The splicing sequence is not limited by the embodiment of the invention.
It can be seen that the activation code has two parts of contents, and when the identity is verified, the two parts of contents can be decrypted to obtain two results of the same object, and the two results are compared to check the activation code.
In summary, an embodiment of the present invention provides an unlocking verification method, where the method includes: acquiring order information, wherein the order information comprises an order validity period and a target door lock; acquiring a door lock key corresponding to the target door lock; determining whether the network state of the target door lock is in an offline state; and under the condition that the target door lock is in an offline state, generating an activation code according to the order validity period and the door lock key, and sending the activation code to a third-party system, wherein the activation code is used for verifying the target door lock and unlocking the target door lock after the verification is passed. Can be when producing new order of living in, and the lock is in the off-line, inform the user through the third party and use the activation code to unblank, can avoid the potential safety hazard that the use of former password exists after the house user changes.
EXAMPLE III
Referring to fig. 3, it shows a flowchart of specific steps of an unlocking verification method provided by the third embodiment of the present invention.
The embodiment of the invention is applied to the intelligent door lock.
The door lock is used for verifying the identity verification code input by the user and unlocking after verification is passed or unlocking is not performed when verification is not passed.
The door lock server is used for managing the door lock, sending a real-time password to the door lock and a third-party system, sending an activation code to the third-party system and the like.
The authentication code input by the user includes but is not limited to: an activation code, an offline password, and a real-time password.
The authentication code is obtained from the third party system when the user first enters the room. For example, for hotel check-in, the hotel staff sends the activation code obtained by the hotel management system to the mobile terminal of the user, or notifies the user of the activation code.
In practical applications, in order to distinguish between various types of authentication codes, a user first inputs a designated symbol before inputting identity information.
Step 302, determining whether a real-time password with an appointed validity period is obtained, wherein the validity period includes the current time.
When the door lock is in an online state, the door lock server can send a real-time password to the door lock through a network and appoint a validity period. When the real-time password exists and the current time is within the validity period, determining to acquire the real-time password with the specified validity period; and when the real-time password does not exist or the current time is not within the validity period, determining that the real-time password with the specified validity period is not acquired.
And step 303, determining whether the identity verification code input by the user is the activation code or not under the condition that the real-time password with the appointed validity period is not acquired.
In the embodiment of the invention, the online acquired real-time password is preferentially adopted for identity authentication. And when the real-time password is not acquired, performing primary identity authentication by using the activation code acquired offline.
Specifically, it may be determined according to the length or a special symbol input in advance. For example, when a user first inputs a "JHM" symbol, the code is determined to be an activation code; or the length of the authentication code input by the user is 10, and the activation code is determined.
And 304, under the condition that the identity verification code is an activation code, verifying the activation code, and unlocking after the verification is passed.
It can be understood that if the activation code input by the user is the activation code generated by the door lock server, the activation code is verified by adopting a verification algorithm corresponding to the generation algorithm; and if the activation code input by the user is not the activation code generated by the door lock server, adopting a verification algorithm corresponding to the generation algorithm for the activation code to obtain that the activation code is not verified.
In summary, an embodiment of the present invention provides an unlocking verification method, where the method includes: receiving an identity verification code input by a user; judging whether a real-time password with an appointed validity period is acquired, wherein the validity period comprises the current moment; determining whether the identity verification code input by the user is an activation code or not under the condition that the real-time password with the appointed validity period is not acquired; and under the condition that the identity verification code is an activation code, verifying the activation code, and unlocking after the verification is passed. The new order of putting into the house can be generated, and the door lock is in an off-line state, the lock is unlocked by using the updated activation code, so that the potential safety hazard caused by the use of the original password after the house user changes can be avoided.
Example four
Referring to fig. 4, it shows a flowchart of specific steps of an unlocking verification method provided in the fourth embodiment of the present invention.
This step can refer to the detailed description of step 301, and is not described herein again.
Step 402, determining whether a real-time password with an appointed validity period is obtained, wherein the validity period comprises the current moment.
This step can refer to the detailed description of step 302, and is not described herein again.
And step 403, determining whether the identity verification code input by the user is the activation code or not under the condition that the real-time password with the appointed validity period is not acquired.
This step can refer to the detailed description of step 303, which is not described herein.
In step 404, in the case that the authentication code is the activation code, a second check code and a third check code are extracted from the activation code.
Specifically, the second check code and the third check code are obtained by respectively decrypting different segments in the activation code.
It is understood that the algorithm for extracting the second check code and the third check code corresponds to the generation rule of the activation code. And under the condition that the activation code is generated by the door lock server, the first check code, the second check code and the third check code are the same.
Optionally, in another embodiment of the present invention, the step 404 includes sub-steps 4041 to 4043:
substep 4041, obtaining data of a first segment preset in the activate code to obtain a second parity code.
The activation code is formed by splicing a check code and a validity period ciphertext, so that the check code can be extracted from the activation code.
In practical application, the validity period ciphertext is m bits, the check code is n bits, and if the validity period ciphertext is located in front of the check code, the first segment is m +1 to m + n bits. For example, if m is 7 and n is 3, the activate code is 2101933786, the first segment is 8-10 bits: the second parity code is 786.
Substep 4042, obtaining data of a second segment preset in the activation code to obtain a second validity period ciphertext.
For example, the activation code 2101933786 indicates that the second segment is 1 to 7, i.e., the second validity period ciphertext is 2101933.
It can be understood that the concatenation order of the validity period ciphertext and the check code may be changed, and the lengths of the first segment and the second segment may also be set according to an actual application scenario, which is not limited in the embodiment of the present invention.
Substep 4043, generating a third check code according to the second validity period ciphertext and a preset door lock key.
Specifically, the second validity period ciphertext is decrypted through the door lock key, and the specific algorithm is the reciprocal of the algorithm for generating the first validity period ciphertext.
Optionally, in another embodiment of the present invention, the sub-step 4043 includes sub-steps 40431 through 40434:
and a substep 40431, decrypting the second validity period ciphertext by using a symmetric algorithm according to a preset door lock key to obtain a second relative validity period.
It is understood that this step is the reciprocal operation of the substep 2042 of the second embodiment.
Wherein the second relative validity period corresponds to the first relative validity period and the second validity period ciphertext corresponds to the first validity period ciphertext. In addition, the door lock key is the same.
Substep 40432, calculating the sum of the second relative validity period and the preset reference time to obtain an absolute validity period.
It is understood that this step is the reciprocal operation of the substep 2041 of the second embodiment.
Wherein the base time is the same and the absolute validity period corresponds to the order validity period.
Substep 40433, after the absolute validity period and the door lock key are spliced, encrypting by using a digest algorithm to obtain a second password.
This step uses the same summarization algorithm as sub-step 2051.
The second password corresponds to the first password.
Sub-step 40434, encrypt the second password by using digest algorithm to obtain the third check code.
This step uses the same summarization algorithm as sub-step 2052.
The third check code corresponds to the first check code.
It can be seen that sub-steps 40433 to 40434 are the same algorithm as sub-steps 2051 to 2052, namely: and during decryption, the primary check code (namely the third check code) is regenerated by adopting the absolute validity period obtained by decryption from the activation code. It is understood that the second check code of the first segment in the activation code corresponds to the first check code generated by the doorlock server.
And 405, if the second check code is consistent with the third check code, the activation code passes verification, and the lock is unlocked after the verification passes.
It can be understood that the second check code is consistent with the third check code, and the activation code input by the representative user is the activation code generated by the lock server for the target lock, so that the verification is passed.
And step 406, if the second check code is not consistent with the third check code, the activation code verification is not passed.
It can be understood that the second check code is consistent with the third check code, and the activation code input by the representative user is not the activation code generated by the lock server for the target lock, so that the verification is not passed.
In the embodiment of the invention, when the user enters the room for the first time, if the activation code passes the verification, the second password and the absolute validity period extracted from the activation code are written into the door lock, so that the user can unlock through the second password subsequently.
And 408, verifying the password according to the second password and the absolute validity period under the condition that the identity verification code is the password, and unlocking after the verification is passed.
In practical application, a device for recording time exists in the door lock, so that the current time can be acquired, and whether the current time is in the valid period or not is judged.
It can be understood that the current time is within the valid period, which represents that the user does not reach the check-in deadline, so that the lock is unlocked when the password is correct.
In summary, an embodiment of the present invention provides an unlocking verification method, where the method includes: receiving an identity verification code input by a user; judging whether a real-time password with an appointed validity period is acquired, wherein the validity period comprises the current moment; determining whether the identity verification code input by the user is an activation code or not under the condition that the real-time password with the appointed validity period is not acquired; and under the condition that the identity verification code is an activation code, verifying the activation code, and unlocking after the verification is passed. The new order of putting into the house can be generated, and the door lock is in an off-line state, the lock is unlocked by using the updated activation code, so that the potential safety hazard caused by the use of the original password after the house user changes can be avoided.
EXAMPLE five
Referring to fig. 5, a structural diagram of a door lock server according to a fifth embodiment of the present invention is shown, which is specifically as follows.
The order information obtaining module 501 is configured to obtain order information, where the order information includes an order validity period and a target door lock.
A door lock key obtaining module 502, configured to obtain a door lock key corresponding to the target door lock.
A network status determining module 503, configured to determine whether the network status of the target door lock is in an offline state.
And the activation code generation module 504 is configured to generate an activation code according to the order validity period and the door lock key and send the activation code to a third-party system when the target door lock is in an offline state, where the activation code is used for verifying the target door lock and unlocking the target door lock after the verification is passed. Optionally, in another embodiment of the present invention, the activation code generating module 504 includes:
and the first validity period ciphertext generating sub-module 5041 is configured to generate a first validity period ciphertext according to the order validity period and the door lock key.
And the first check code generating submodule 5042 is configured to generate a first check code according to the order validity period and the door lock key.
And the active code splicing submodule 5043 is configured to splice the first validity period ciphertext and the first check code into an active code.
Optionally, in another embodiment of the present invention, the first validity period ciphertext generating sub-module 5041 includes:
and the first relative validity period calculating unit is used for calculating the difference between the order validity period and the preset reference time to obtain a first relative validity period.
And the first validity period ciphertext generating unit is used for splicing the first relative validity period and the door lock secret key and then encrypting by adopting a symmetric algorithm to obtain a first validity period ciphertext.
Optionally, in another embodiment of the present invention, the first check code generation sub-module 5042 includes:
the first password generation unit is used for splicing the order validity period and the door lock secret key and then encrypting by adopting a digest algorithm to obtain a first password;
and the first check code generating unit is used for encrypting the first password by adopting a digest algorithm to obtain a first check code.
In summary, an embodiment of the present invention provides a door lock server, where the door lock server includes: the order information acquisition module is used for acquiring order information, and the order information comprises an order validity period and a target door lock; the door lock key acquisition module is used for acquiring a door lock key corresponding to the target door lock; the network state determining module is used for determining whether the network state of the target door lock is in an offline state; and the activation code generation module is used for generating an activation code according to the order validity period and the door lock secret key under the condition that the target door lock is in an off-line state, and sending the activation code to a third party system, wherein the activation code is used for verifying the target door lock and unlocking the target door lock after the verification is passed. Can be when producing new order of living in, and the lock is in the off-line, inform the user through the third party and use the activation code to unblank, can avoid the potential safety hazard that the use of former password exists after the house user changes.
Fifth embodiment is a device embodiment corresponding to the first and second embodiment of the method, and the detailed information can be referred to
The detailed description of the first and second embodiments is not repeated herein.
EXAMPLE six
Referring to fig. 6, a structural diagram of an intelligent door lock according to a sixth embodiment of the present invention is shown, specifically as follows.
The authentication code receiving module 601 is configured to receive an authentication code input by a user.
A real-time password determination module 602, configured to determine whether a real-time password with a specified validity period is obtained.
The activation code determining module 603 is configured to determine whether the authentication code input by the user is the activation code if the real-time password with the validity period specified is not obtained.
And the verification unlocking module 604 is configured to verify the activation code if the authentication code is the activation code, and unlock the lock after the verification is passed. Optionally, in an embodiment of the present invention, the verification unlocking module 604 includes:
and a check code extracting sub-module 6041, configured to extract the second check code and the third check code from the activation code.
And a verification passing sub-module 6042, configured to, if the second check code and the third check code are consistent, pass the verification of the activation code.
A verification failed submodule 6043, configured to fail verification of the activation code if the second check code and the third check code are inconsistent.
Optionally, in another embodiment of the present invention, the check code extracting sub-module 6041 includes:
and the second check code acquisition unit is used for acquiring the data of the preset first segment in the activation code to obtain a second check code.
And the second validity period ciphertext acquisition unit is used for acquiring data of a preset second segment in the activation code to obtain a second validity period ciphertext.
And the third check code generating unit is used for generating a third check code according to the second validity period ciphertext and a preset door lock secret key.
Optionally, in another embodiment of the present invention, the third check code generating unit includes:
and the second relative validity period generation subunit is used for decrypting the second validity period ciphertext by adopting a symmetric algorithm according to a preset door lock secret key to obtain a second relative validity period.
The absolute validity period calculation subunit is used for calculating the sum of the second relative validity period and preset reference time to obtain an absolute validity period;
the second password generation subunit is used for splicing the absolute validity period and the door lock secret key and then encrypting by adopting a digest algorithm to obtain a second password;
and the third check code generating subunit is used for encrypting the second password by adopting a digest algorithm to obtain a third check code.
A second password saving module 605, configured to save the second password and the absolute validity period if the activation code verification passes.
And a second password verification module 606, configured to verify the password according to the second password and the absolute validity period when the authentication code is a password, and unlock the lock after the verification passes.
In summary, an embodiment of the present invention provides an intelligent door lock, where the intelligent door lock includes: the identity verification code receiving module is used for receiving an identity verification code input by a user; the real-time password judgment module is used for judging whether a real-time password with the appointed validity period is acquired; the activation code determining module is used for determining whether the identity verification code input by the user is the activation code or not under the condition that the real-time password with the appointed validity period is not acquired; and the verification unlocking module is used for verifying the activation code under the condition that the identity verification code is the activation code and unlocking after the verification is passed. The new order of putting into the house can be generated, and the door lock is in an off-line state, the lock is unlocked by using the updated activation code, so that the potential safety hazard caused by the use of the original password after the house user changes can be avoided.
The sixth embodiment is an embodiment of an apparatus corresponding to the third and fourth embodiments of the method, and the detailed information may refer to the detailed description of the third and fourth embodiments, which is not described herein again.
An embodiment of the present invention further provides an electronic device, including: a processor, a memory and a computer program stored on the memory and executable on the processor, the processor implementing the aforementioned method when executing the program.
Embodiments of the present invention also provide a readable storage medium, and when instructions in the storage medium are executed by a processor of an electronic device, the electronic device is enabled to execute the foregoing method.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functions of some or all of the components of the unlock verification device according to embodiments of the present invention. The present invention may also be embodied as an apparatus or device program for carrying out a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (14)
1. An unlocking verification method is applied to a door lock server, and comprises the following steps:
acquiring order information, wherein the order information comprises an order validity period and a target door lock;
acquiring a door lock secret key corresponding to the target door lock, wherein the door lock secret key is a hardware identifier of the target door lock;
determining whether the network state of the target door lock is in an offline state; the offline state refers to a state that the target door lock cannot communicate with the door lock server, and the target door lock cannot receive information sent by the door lock server;
under the condition that the target door lock is in an offline state, generating an activation code according to the order validity period and the door lock secret key, and sending the activation code to a third-party system, wherein the activation code is used for verifying the target door lock and unlocking the target door lock after the verification is passed; wherein the target door lock is to:
receiving the activate code; the activation code comprises a first validity period ciphertext and a first check code;
obtaining a corresponding second check code according to the first check code in the activation code, obtaining a corresponding second validity ciphertext according to the first validity ciphertext in the activation code, and generating a third check code according to the second validity ciphertext and a preset door lock key;
and if the second check code is consistent with the third check code, the activation code passes verification.
2. The method of claim 1, wherein the step of generating an activation code based on the order validity period and the door lock key comprises:
generating a first validity period ciphertext according to the order validity period and the door lock key;
generating a first check code according to the order validity period and the door lock key;
and splicing the first validity period ciphertext and the first check code into an activation code.
3. The method of claim 2, wherein the step of generating a first validity period ciphertext according to the order validity period and the door lock key comprises:
calculating a difference value between the order validity period and a preset reference time to obtain a first relative validity period;
and after the first relative validity period and the door lock secret key are spliced, encrypting by adopting a symmetric algorithm to obtain a first validity period ciphertext.
4. The method of claim 2, wherein the step of generating a first verification code based on the order validity period and the door lock key comprises:
after the order validity period and the door lock secret key are spliced, encrypting by adopting a digest algorithm to obtain a first password;
and encrypting the first password by adopting a digest algorithm to obtain a first check code.
5. An unlocking verification method, characterized by comprising:
receiving an identity verification code input by a user;
judging whether a real-time password with an appointed validity period is acquired, wherein the validity period comprises the current moment;
determining whether the identity verification code input by the user is an activation code or not under the condition that the real-time password with the appointed validity period is not acquired; the activation code comprises a first validity period ciphertext and a first check code;
under the condition that the identity verification code is an activation code, verifying the activation code, and unlocking after the verification is passed;
the verification of the activation code specifically includes:
obtaining a corresponding second check code according to the first check code in the activation code, obtaining a corresponding second validity ciphertext according to the first validity ciphertext in the activation code, and generating a third check code according to the second validity ciphertext and a preset door lock key in a target door lock; the door lock secret key is a hardware identifier of the target door lock;
and if the second check code is consistent with the third check code, the activation code passes verification.
6. The method of claim 5, wherein the step of verifying the activation code comprises:
extracting a second check code and a third check code from the activation code;
if the second check code is consistent with the third check code, the activation code passes verification;
and if the second check code is inconsistent with the third check code, the activation code verification is not passed.
7. The method as claimed in claim 6, wherein the step of extracting the second check code and the third check code from the activate code comprises:
acquiring data of a preset first segment in the activation code to obtain a second check code;
acquiring data of a preset second segment in the activation code to obtain a second validity period ciphertext;
and generating a third check code according to the second validity period ciphertext and a preset door lock secret key.
8. The method of claim 7, wherein the step of generating a third check code according to the second validity period ciphertext and a preset door lock secret key comprises:
decrypting the second validity period ciphertext by adopting a symmetric algorithm according to a preset door lock secret key to obtain a second relative validity period;
calculating the sum of the second relative validity period and preset reference time to obtain an absolute validity period;
after the absolute validity period and the door lock secret key are spliced, encrypting by adopting a digest algorithm to obtain a second password;
and encrypting the second password by adopting a digest algorithm to obtain a third check code.
9. The method of claim 8, further comprising:
and under the condition that the activation code passes verification, saving the second password and the absolute validity period.
10. The method of claim 8, further comprising:
and under the condition that the identity verification code is a password, verifying the password according to the second password and the absolute validity period, and unlocking after the verification is passed.
11. A door lock server, the server comprising:
the order information acquisition module is used for acquiring order information, and the order information comprises an order validity period and a target door lock;
the door lock key acquisition module is used for acquiring a door lock key corresponding to the target door lock, and the door lock key is a hardware identifier of the target door lock;
the network state determining module is used for determining whether the network state of the target door lock is in an offline state; the offline state refers to a state that the target door lock cannot communicate with the door lock server, and the target door lock cannot receive information sent by the door lock server;
the activation code generation module is used for generating an activation code according to the order validity period and the door lock secret key under the condition that the target door lock is in an off-line state, and sending the activation code to a third-party system, wherein the activation code is used for verifying the target door lock and unlocking the target door lock after the verification is passed;
the target door lock specifically includes:
the receiving module is used for receiving the activation code; the activation code comprises a first validity period ciphertext and a first check code;
the acquisition module is used for acquiring a corresponding second check code according to the first check code in the activation code, acquiring a corresponding second validity ciphertext according to the first validity ciphertext in the activation code, and generating a third check code according to the second validity ciphertext and a preset door lock key;
and the verification module is used for passing the verification of the activation code when the second check code is consistent with the third check code.
12. An intelligent door lock, characterized in that, the door lock includes:
the identity verification code receiving module is used for receiving an identity verification code input by a user;
the real-time password judgment module is used for judging whether a real-time password with the appointed validity period is acquired;
the activation code determining module is used for determining whether the identity verification code input by the user is the activation code or not under the condition that the real-time password with the appointed validity period is not acquired; the activation code comprises a first validity period ciphertext and a first check code;
the verification unlocking module is used for verifying the activation code under the condition that the identity verification code is the activation code and unlocking the lock after the verification is passed;
wherein, verify the unlocking module and specifically include:
the check code generation submodule is used for obtaining a corresponding second check code according to the first check code in the activation code, obtaining a corresponding second validity ciphertext according to the first validity ciphertext in the activation code, and generating a third check code according to the second validity ciphertext and a preset door lock key in a target door lock; the door lock secret key is a hardware identifier of the target door lock;
and the activation code judging submodule is used for passing the activation code verification when the second check code is consistent with the third check code.
13. An electronic device, comprising:
processor, memory and computer program stored on the memory and executable on the processor, characterized in that the processor implements the method according to any of claims 1 to 10 when executing the program.
14. A readable storage medium, wherein instructions in the storage medium, when executed by a processor of an electronic device, enable the electronic device to perform the method of any of claims 1 to 10.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811015487.5A CN109272617B (en) | 2018-08-31 | 2018-08-31 | Unlocking verification method, server, door lock, electronic device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811015487.5A CN109272617B (en) | 2018-08-31 | 2018-08-31 | Unlocking verification method, server, door lock, electronic device and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109272617A CN109272617A (en) | 2019-01-25 |
CN109272617B true CN109272617B (en) | 2020-08-07 |
Family
ID=65187669
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811015487.5A Active CN109272617B (en) | 2018-08-31 | 2018-08-31 | Unlocking verification method, server, door lock, electronic device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109272617B (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110430055A (en) * | 2019-08-13 | 2019-11-08 | 北京百佑科技有限公司 | Offline cryptogram generation method, offline cryptogram verification method and door lock management server |
CN110990824A (en) * | 2019-11-19 | 2020-04-10 | 江苏理工学院 | How to Remotely Control the Lifetime of Unconnected Machines |
CN111080847A (en) * | 2019-11-25 | 2020-04-28 | 四川研宝科技有限公司 | Encryption, decryption and authentication method for intelligent door lock in offline environment |
CN113656775B (en) * | 2021-08-19 | 2024-07-23 | 广东好太太智能家居有限公司 | Offline password verification method and system with validity period and intelligent lock |
CN113689610A (en) * | 2021-08-31 | 2021-11-23 | 深圳指芯物联技术有限公司 | Off-line authorization method and system for rental period password of rental house tenant |
CN114033261B (en) * | 2021-11-22 | 2022-08-02 | 中国铁塔股份有限公司 | Anti-theft method, device and equipment for rectifier and storage medium |
CN114448727B (en) * | 2022-04-02 | 2022-06-21 | 中国信息通信研究院 | Information processing method and system based on industrial Internet identification analysis system |
WO2023201028A1 (en) * | 2022-04-14 | 2023-10-19 | James Nicholas Pazzi | Smart home short-term rental system |
CN115546940A (en) * | 2022-09-19 | 2022-12-30 | 中国建设银行股份有限公司 | Bluetooth unlocking method, system, device and storage medium |
CN119131933A (en) * | 2023-06-12 | 2024-12-13 | 华为技术有限公司 | A remote password processing method and device |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201562306U (en) * | 2009-09-11 | 2010-08-25 | 王远洲 | Intelligent door lock control system |
CN104063932A (en) * | 2014-06-18 | 2014-09-24 | 大连智慧城科技有限公司 | Non-networking access system based on mobile terminal and implementation method |
CN104631961A (en) * | 2014-02-17 | 2015-05-20 | 袁磊 | Dynamic password electronic lock system in which password changes according to random codes |
CN105046796A (en) * | 2015-08-31 | 2015-11-11 | 芝麻智能科技(北京)有限公司 | Unlocking control method, device and system for electronic lock |
CN107545637A (en) * | 2017-09-13 | 2018-01-05 | 广东亚太天能科技股份有限公司 | The Activiation method and server of a kind of electronic lock |
CN107893583A (en) * | 2017-10-16 | 2018-04-10 | 杭州软库科技有限公司 | A kind of intelligent door lock system and control method |
CN107909685A (en) * | 2017-10-27 | 2018-04-13 | 张荣斌 | A kind of unlocking system and method for unlocking based on dynamic password |
-
2018
- 2018-08-31 CN CN201811015487.5A patent/CN109272617B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201562306U (en) * | 2009-09-11 | 2010-08-25 | 王远洲 | Intelligent door lock control system |
CN104631961A (en) * | 2014-02-17 | 2015-05-20 | 袁磊 | Dynamic password electronic lock system in which password changes according to random codes |
CN104063932A (en) * | 2014-06-18 | 2014-09-24 | 大连智慧城科技有限公司 | Non-networking access system based on mobile terminal and implementation method |
CN105046796A (en) * | 2015-08-31 | 2015-11-11 | 芝麻智能科技(北京)有限公司 | Unlocking control method, device and system for electronic lock |
CN107545637A (en) * | 2017-09-13 | 2018-01-05 | 广东亚太天能科技股份有限公司 | The Activiation method and server of a kind of electronic lock |
CN107893583A (en) * | 2017-10-16 | 2018-04-10 | 杭州软库科技有限公司 | A kind of intelligent door lock system and control method |
CN107909685A (en) * | 2017-10-27 | 2018-04-13 | 张荣斌 | A kind of unlocking system and method for unlocking based on dynamic password |
Also Published As
Publication number | Publication date |
---|---|
CN109272617A (en) | 2019-01-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109272617B (en) | Unlocking verification method, server, door lock, electronic device and storage medium | |
US8001383B2 (en) | Secure serial number | |
US8590024B2 (en) | Method for generating digital fingerprint using pseudo random number code | |
CN104917766A (en) | Security authentication method for two-dimension code | |
CN105187431A (en) | Log-in method, server, client and communication system for third party application | |
CN106936588B (en) | Hosting method, device and system of hardware control lock | |
EP3206329B1 (en) | Security check method, device, terminal and server | |
CN111159656A (en) | Method, device, equipment and storage medium for preventing software from being used without authorization | |
JP5013931B2 (en) | Apparatus and method for controlling computer login | |
CN108683674A (en) | Verification method, device, terminal and the computer readable storage medium of door lock communication | |
CN104125230B (en) | A kind of short message certification service system and authentication method | |
CN105306423A (en) | Unified login method for distributed web station system | |
CN111355591A (en) | Block chain account safety management method based on real-name authentication technology | |
CN107181589B (en) | Bastion machine private key management method and device | |
CN109829722A (en) | A kind of user identity real name identification method of electronic fare payment system | |
CN114944921A (en) | Login authentication method and device, electronic equipment and storage medium | |
CN115329315A (en) | Service authentication method, device, storage medium and electronic equipment | |
JP2009003501A (en) | Onetime password authentication system | |
CN109768969A (en) | Authority control method and internet-of-things terminal, electronic equipment | |
CN107968764B (en) | Authentication method and device | |
CN117251836B (en) | Method, device, equipment and storage medium for logging in baseboard management controller | |
CN113505353A (en) | Authentication method, device, equipment and storage medium | |
CN111510421B (en) | Data processing method and device, electronic equipment and computer readable storage medium | |
CN105117659A (en) | Anti-copying monitoring method used for data storage device | |
CN104378334A (en) | Information processing method and system based on mobile device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |