Summary of the invention
In order to solve the problem of that information is easy to be replicated there are security risk in the relevant technologies electron key, the application is mentioned
A kind of electronics unlocking system is supplied, specific technical solution is as follows:
A kind of electronics unlocking system provided by the present application, including electron key, electronic lock and authentication device, the insertion of electron key
Head can be contained in the lockhole of electronic lock, and electron key includes first processor, at least one password input device and the first transmitting-receiving
Device, password input device and first transceiver and first processor are electrically connected;Authentication device includes that letter is exchanged with first transceiver
Number second transceiver, memory and second processor, second transceiver, memory and second processor are electrically connected.
By the way that dedicated authentication device is arranged, memory is set in the authentication device, and no longer setting is deposited in electron key
Reservoir, i.e., the relevant information no longer needed to authentication store, but the transfer of these information is stored into authentication device,
In this way, electron key no longer carries out authenticating work, and authenticating work is executed by authentication device, thus greatly reduces electron key
It is middle because store important information security risk caused by after being replicated.
Optionally, password input device includes Fingerprint Identification Unit, physical button identifier, iris recognition device, speech recognition device
At least one of.
By the way that password input device is arranged in electron key, the authentication condition to electron key can be increased when unlocking,
If user can not input correct password, failed authentication, and then safety when improving electronic key unlocking;In addition, logical
It crosses and sets Fingerprint Identification Unit, physical button identifier, iris recognition device, at least one in speech recognition device for password input device
Kind, enrich the mode of password typing, and a possibility that Fingerprint Identification Unit, iris recognition device and speech recognition device are decrypted compared with
It is low, it is safer.
Optionally, authentication device is server, and first transceiver and second transceiver are WiFi antenna.
WiFi antenna is set by first transceiver and second transceiver, wireless communication is realized, simplifies the circuit of system
Layout, to realize that remote authentication provides possibility.
Optionally, electron key further includes the first NFC antenna, and electronic lock further includes being communicated with the first NFC antenna
Second NFC antenna.
By the way that NFC antenna is arranged in electron key and electronic lock, may be implemented close between electron key and electronic lock
Distance communication reduces the complexity of Machine Design, and the interaction of information is realized by electronic communication.
Optionally, electronic lock further includes the third transceiver with authentication device transmitting data.
By the way that third transceiver is arranged in electronic lock, the information exchange between realization and authentication device provides necessity
Framework relationship.
Optionally, second transceiver and third transceiver are WiFi antenna.
Optionally, electronic lock further includes contact sensor, and contact sensor is set in the lockhole of electronic lock, sensing contact
Third processor in device and electronic lock is electrically connected.
Contact sensor is set in electronic lock, key insertion can be determined with after contact sensor senses information
Lockhole, to start authorizing procedure.
Optionally, when the contact sensor in electronic lock lockhole generates induction information, the electronic lock of electronic lock is identified into hair
Give electron key, induction information be contact sensor sense contacted by foreign object after generate;
The first transceiver of electron key transmits the code data of the electronic lock mark of electronic lock and password input device typing
To authentication device, electronic lock mark is used for unique identification electronic lock;
The second processor of authentication device identifies the corresponding relationship between code data according to the electronic lock stored in memory,
Whether the electronic lock mark and code data of verifying electron key transmission are the one group of corresponding relationship stored, are transmitted in electron key
Electronic lock mark and code data be storage one group of corresponding relationship when, using second transceiver to electronic lock transmission unlocking refer to
It enables;
After electronic lock receives unlocking instruction, starting is unlocked.
Electron key identifies electronic lock and password sends authentication device, is authenticated, is avoided by authentication device
The corresponding relationship between all electronic lock mark and code data is stored in electron key, and then is avoided because of electron key quilt
Information leakage caused by duplication.
Optionally, the first processor in electron key is by the electronic lock of electronic lock mark and password input device typing
Code data is encrypted, and encrypted ciphertext is transferred to authentication device using first transceiver;
Ciphertext is decrypted in authentication device, and whether the electronic lock mark and code data after verifying decryption are pre-stored one
Group corresponding relationship.
By encrypting electronic lock mark and code data, to realize that ciphertext is transmitted, reduce because being cut by network
The possibility for taking code data and password being caused to reveal.
Optionally, electronics unlocking system provided by the present application further includes mobile terminal, and mobile terminal passes through with authentication device
Cable network or wireless network connection, authentication device are not to deposit in the electronic lock mark and code data of verifying electron key transmission
When one group of corresponding relationship of storage, alert notification is sent to mobile terminal.
In failed authentication, alert notification is sent to the mobile terminal of binding, to be prompted, prompting personnel are avoided into one
The loss of step.
Optionally, second processor includes at least one processing unit corresponding with password type, and each processing unit is equal
It is electrically connected with second transceiver and memory;
Electron key when to authentication device transmission electronic lock mark and code data, also use by transmission cipher mark, cipher mark
In the password type for indicating code data;
Authentication device is input to place corresponding with cipher mark after receiving cipher mark, by code data and electronic lock mark
Unit is managed, whether is the one group of corresponding relationship stored by processing unit verifying electronic lock mark and code data.
By the way that corresponding processing unit is arranged according to password type in authentication device, convenient for different types of password into
Row authentication process reduces the logic difficulty of second processor, is easy to the maintenance and upgrade to processing unit.
It should be understood that the above general description and the following detailed description are merely exemplary, this can not be limited
Invention.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with it is such as appended
The example of device and method being described in detail in claims, some aspects of the invention are consistent.
Fig. 1 is the structural schematic diagram of the electronics unlocking system provided in the application one embodiment, the electronics unlocking system
It at least may include electron key 10, electronic lock 20 and authentication device 30, the insertion head of electron key 10 can be contained in electronic lock
In 20 lockhole, electron key 10 includes first processor 11, at least one password input device 12 and first transceiver 13, password
Input device 12 and first transceiver 13 and first processor 11 are electrically connected;Authentication device 30 includes exchanging with first transceiver 13
Second transceiver 31, memory 32 and the second processor 33 of signal, second transceiver 31, memory 32 and second processor 33
It is electrically connected.
In a kind of possible realization, authentication device 30 can be long-range server, first transceiver 13 at this time and the
Two transceivers 31 can be communicated by cable network or wireless network.It, can be with when being communicated using wireless network
The communication of wireless network is carried out using WiFi agreement or Bigbee agreement.
When carrying out wireless communication using WiFi agreement, first transceiver 13 can be WiFi transceiver or be
WiFi antenna, when carrying out wireless communication using Bigbee agreement, first transceiver 13 can for Bigbee transceiver or
Person is Bigbee antenna.
In alternatively possible realization, authentication device 30 or have the router of authentication process ability, at this time the
One transceiver 13 and second transceiver 31 can also be communicated by cable network or wireless network.Using wireless network
When being communicated, WiFi agreement can be used or Bigbee agreement carries out the communication of wireless network, corresponding, second transceiver 31
Also matched WiFi agreement can be used or Bigbee agreement carries out the communication of wireless network.
When carrying out wireless communication using WiFi agreement, first transceiver 13 and second transceiver 31 can be WiFi
Transceiver is WiFi antenna, and when carrying out wireless communication using Bigbee agreement, first transceiver 13 can be
Bigbee transceiver is Bigbee antenna.
WiFi antenna or Bigbee antenna are set by first transceiver 13 and second transceiver 31, channel radio may be implemented
Letter, simplifies the circuit layout of system, to realize that remote authentication provides possibility.
In practical applications, in order to improve the safety of unlocking, password can be preset to electron key 10, this is in advance
The password needs of setting are stored in advance in authentication device 30, such as by the mark of electron key 10, the mark of electronic lock 20
Know and password carries out corresponding storage, the mark of electron key 10 here is used for unique identification electron key 10, electronic lock 20
Mark be used for unique identification electronic lock 20.
In general, one open one electronic lock 20 electron key 10 is corresponding, but in order to some convenient for managing and make
Occasion can be set an electron key 10 and open more electronic lock 20, i.e. realization electron key 10 opens up function, this
In the case of kind, the mark of each electronic lock 20 corresponding with the electron key 10 and right can be stored in advance in authentication device 30
The password answered.
In the application of actual production electron key 10 and authentication, the password input device 12 being arranged on electron key 10 can
To include at least one of Fingerprint Identification Unit, physical button identifier, iris recognition device, speech recognition device.
In general, a kind of password input device 12 can be only arranged in electron key 10, but for the convenience of the users in certain situation
Lower typing information is incorrect, but when belonging to legal typing, at least two password input devices 12 can be set, as long as having a kind of close
Code typing is correct, then can authenticate successfully with unlocking electronic lock 20.For example, electron key 10 is usually used by manager A
Coded lock is opened, finger-print cipher is used when manager A is flat, in some special circumstances, needs to use electron key by manager B
10, if finger-print cipher is crossed in non-typing before manager B, physical button typing text password can be used.
Optionally, every kind of password input device 12 can be by different interfaces, such as serial ports, SPI, USB etc., by typing
Encrypted message passes to the first processor 11 in electron key 10.
By the way that password input device 12 is arranged in electron key 10, the mirror to electron key 10 can be increased when unlocking
Power condition if user can not input correct password, failed authentication, and then improves safety when electron key 10 is unlocked
Property;In addition, by setting Fingerprint Identification Unit, physical button identifier, iris recognition device, speech recognition for password input device 12
At least one of device enriches the mode of password typing, and Fingerprint Identification Unit, iris recognition device and speech recognition device are broken
A possibility that translating is lower, safer.
In one possible implementation, electron key 10 can also include the first NFC antenna 14, corresponding, electronics
Lock 20 can also include the second NFC antenna 23 communicated with the first NFC antenna 14.
By the way that NFC antenna is arranged in electron key 10 and electronic lock 20, electron key 10 and electronic lock 20 may be implemented
Between short-range communication, reduce the complexity of Machine Design, pass through electronic communication realize information interaction.
After authentication device 30 authenticates successfully, electronic lock 20 can directly be notified to unlock, in this case, electronic lock 20 is also
It may include the third transceiver 22 that data are transmitted with authentication device 30.
By the way that third transceiver 22 is arranged in electronic lock 20, to realize that the information exchange between authentication device 30 provides
Necessary framework relationship.
In alternatively possible realization, authentication device 30 can send and be somebody's turn to do to electron key 10 after authenticating successfully
The corresponding predetermined instruction of electronic lock 20, after which is sent to electronic lock 20 for the predetermined instruction, electronic lock 20 is determined
It then unlocks after the predetermined instruction is correct.
In order to trigger the communication between electron key 10 and electronic lock 20, usually electron key 10 is inserted into electronic lock 20 and contracts
Kong Hou, just starting authenticates successfully, therefore, in order to determine the opportunity of authentication starting, electronic lock 20 can also include contact sensor,
Contact sensor is set in the lockhole of electronic lock 20, and contact sensor electrically connects with the third processor 21 in electronic lock 20
It connects.
That is, contact sensor can then generate sense after the lockhole of the insertion head insertion electronic lock 20 of electron key 10
Induction signal, is sent to the third processor 21 in electronic lock 20 for inductive signal, is identified electronic lock 20 by third processor 21
The second NFC antenna 23 being sent in electronic lock 20, by 23 launching electronics of the second NFC antenna lock, 20 mark.It is corresponding, electronics key
The first NFC antenna 14 in spoon 10 then can receive the electronic lock 20 mark, start unlocking authorizing procedure.
Contact sensor is set in electronic lock 20, can be determined with key after contact sensor senses information and insert
Enter lockhole, to start authorizing procedure.
It, will be electric when the contact sensor in 20 lockhole of electronic lock generates induction information in a kind of possible authorizing procedure
The mark of electronic lock 20 of son lock 20 is sent to electron key 10, induction information be contact sensor sense contacted by foreign object after produce
Raw.In general, when contact sensor generates variable signal, generally meaning that in lockhole has foreign object insertion.
Induction information is sent to the third processor 21 in electronic lock 20 by contact sensor, and third processor 21 is by electronics
The mark of electronic lock 20 of lock 20 is sent to the second NFC antenna 23, is launched by the second NFC antenna 23.
The first transceiver 13 of electron key 10 is by the electronic lock 20 of electronic lock 20 mark and 12 typing of password input device
Code data be transferred to authentication device 30, the mark of electronic lock 20 is used for unique identification electronic lock 20.
Corresponding, the first NFC antenna 14 in electron key 10 can receive the mark of electronic lock 20, then electron key
First processor 11 in 10 identifies the electronic lock 20 and the code data of 12 typing of password input device sends jointly to the
One transceiver 13, first transceiver 13 identifies electronic lock 20 and code data is launched.
The second processor 33 of authentication device 30 according to stored in memory 32 electronic lock 20 mark with code data it
Between corresponding relationship, verifying electron key 10 transmit electronic lock 20 mark and code data whether be storage one group it is corresponding pass
System receives when the mark of electronic lock 20 and code data that electron key 10 transmits are one group of corresponding relationship of storage using second
It sends out device 31 and transmits unlocking instruction to electronic lock 20.
Second transceiver 31 in authentication device 30 is sent to second after receiving the mark of electronic lock 20 and code data
Processor 33.Second processor 33 inquires the electronic lock 20 mark and whether code data is used as one group of corresponding relationship to be stored in
In reservoir 32.When the mark of electronic lock 20 and code data that electron key 10 transmits are one group of corresponding relationship of storage, utilize
Second transceiver 31 transmits unlocking instruction to electronic lock 20, and after electronic lock 20 receives unlocking instruction, starting is unlocked.
Electronic lock 20 is identified and password sends authentication device 30, is authenticated, is avoided in electricity by authentication device 30
The corresponding relationship between all mark of electronic lock 20 and code data is stored in sub- key 10, and then is avoided because of electron key
10 be replicated caused by information leakage.
In order to avoid the leakage of electronic lock 20 mark and code data, the first processor 11 in electron key 10 can be incited somebody to action
The electronic lock 20 of electronic lock 20 identifies and the code data of 12 typing of password input device is encrypted, and utilizes first transceiver 13
Encrypted ciphertext is transferred to authentication device 30.The mode of encryption can select md5 encryption mode or other encryption sides
Formula is not defined cipher mode in the application.
It is corresponding, after authentication device 30 receives ciphertext, ciphertext is decrypted, the electronic lock 20 after verifying decryption identifies
It whether is pre-stored one group of corresponding relationship with code data.By the way that the mark of electronic lock 20 and code data are encrypted,
To realize that ciphertext is transmitted, reduce because intercepting the possibility that code data causes password to reveal by network.
Due to password type may there are many, such as finger-print cipher, the iris password of picture type, text type it is close
Whether code, the password etc. of sound-type are stored in advance in the password that the analysis transmission of electron key 10 comes and identify with electronic lock 20
It is corresponding, it needs to transmit 20 key of electronic lock the same type password stored in next password and memory 32 and carries out matching verifying.
And different password types, the mode for matching verifying are different, therefore in order to simplify verifying logic, and it is shown in Figure 2, it is this
The structural schematic diagram of electronics unlocking system provided in another embodiment is provided, it can be in second processor 33 in the application
At least one processing unit corresponding with password type is set, and each processing unit is electric with second transceiver 31 and memory 32
Property connection, each same type of password authentification process of processing unit processes.
Corresponding, electron key 10 also transmits close when transmitting the mark of electronic lock 20 and code data to authentication device 30
Code mark, cipher mark are used to indicate the password type of code data.
In this way, authentication device 30 is after receiving cipher mark, by code data and the mark of electronic lock 20 be input to it is close
Whether code identifies corresponding processing unit, be that store one group is corresponding by processing unit verifying electronic lock 20 mark and code data
Relationship.
By the way that corresponding processing unit is arranged according to password type in authentication device 30, convenient for different types of password
Authentication process is carried out, the logic difficulty of second processor 33 is reduced, is easy to the maintenance and upgrade to processing unit.
Optionally, electronics unlocking system provided by the present application further includes mobile terminal, and authentication device 30 is in verifying electronics key
When the mark of electronic lock 20 and code data of 10 transmission of spoon are not one group of corresponding relationship of storage, it is logical that warning is sent to mobile terminal
Know.
In failed authentication, alert notification is sent to the mobile terminal of binding, to be prompted, prompting personnel are avoided into one
The loss of step.
In conclusion electronics unlocking system provided by the present application, does not store any digital information on electron key, even
The mode replicated using any chip, copying the key come interior at the prison can not use, to ensure that various locksets make
Safety.
By the way that dedicated authentication device is arranged, memory is set in the authentication device, and no longer setting is deposited in electron key
Reservoir, i.e., the relevant information no longer needed to authentication store, but the transfer of these information is stored into authentication device,
In this way, electron key no longer carries out authenticating work, and authenticating work is executed by authentication device, thus greatly reduces electron key
It is middle because store important information security risk caused by after being replicated.
It should be added that " first ", " second " mentioned by the application are for the ease of distinguishing different technologies
Feature is not used to limit the realization sequence of technical characteristic, can not regard as the precondition that " first " is " second ", can also
With there is only technical characteristics defined by " second ", also there is no technical characteristics defined by " first ".
Those skilled in the art will readily occur to of the invention its after considering specification and the invention invented here of practice
Its embodiment.This application is intended to cover any variations, uses, or adaptations of the invention, these modifications, purposes or
The common knowledge in the art that person's adaptive change follows general principle of the invention and do not invent including the present invention
Or conventional techniques.The description and examples are only to be considered as illustrative, and true scope and spirit of the invention are by following
Claim is pointed out.
It should be understood that the present invention is not limited to the precise structure already described above and shown in the accompanying drawings, and
And various modifications and changes may be made without departing from the scope thereof.The scope of the present invention is limited only by the attached claims.