CN112448909A - Electronic lock management method, device, system and storage medium - Google Patents
Electronic lock management method, device, system and storage medium Download PDFInfo
- Publication number
- CN112448909A CN112448909A CN201910749607.2A CN201910749607A CN112448909A CN 112448909 A CN112448909 A CN 112448909A CN 201910749607 A CN201910749607 A CN 201910749607A CN 112448909 A CN112448909 A CN 112448909A
- Authority
- CN
- China
- Prior art keywords
- electronic lock
- authentication information
- management request
- target user
- lock management
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000007726 management method Methods 0.000 title claims abstract description 198
- 238000003860 storage Methods 0.000 title claims abstract description 23
- 238000000034 method Methods 0.000 claims abstract description 35
- 238000012545 processing Methods 0.000 claims description 13
- 238000010276 construction Methods 0.000 claims description 6
- 230000010354 integration Effects 0.000 abstract description 9
- 238000010586 diagram Methods 0.000 description 17
- 230000008569 process Effects 0.000 description 11
- 230000006870 function Effects 0.000 description 8
- 238000011161 development Methods 0.000 description 6
- 238000012423 maintenance Methods 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 5
- 230000006978 adaptation Effects 0.000 description 4
- 238000004458 analytical method Methods 0.000 description 4
- 238000012360 testing method Methods 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 230000014509 gene expression Effects 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 238000004806 packaging method and process Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 238000007619 statistical method Methods 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 230000004913 activation Effects 0.000 description 1
- 210000004556 brain Anatomy 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 238000013497 data interchange Methods 0.000 description 1
- 238000013523 data management Methods 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000008014 freezing Effects 0.000 description 1
- 238000007710 freezing Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 210000001503 joint Anatomy 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 210000003205 muscle Anatomy 0.000 description 1
- 238000012856 packing Methods 0.000 description 1
- 230000002688 persistence Effects 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
- 210000001525 retina Anatomy 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000012384 transportation and delivery Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Lock And Its Accessories (AREA)
Abstract
The embodiment of the invention provides an electronic lock management method, an electronic lock management device, an electronic lock management system and a storage medium, wherein the method is applied to an operator system and comprises the following steps: receiving an electronic lock management request, wherein the electronic lock management request carries authentication information of a corresponding target user; based on the electronic lock management request, calling an electronic lock system to authenticate the target user based on the authentication information to obtain an authentication result; and managing the electronic lock based on the authentication result. Therefore, authentication is completed cooperatively through integration of the electronic lock system and the operator system, remote management of the electronic lock is achieved, and user experience is improved.
Description
Technical Field
The invention relates to the field of smart home, in particular to an electronic lock management method, device and system and a storage medium.
Background
With the increasing variety of electronic locks, the security requirement of a user on the electronic lock is higher and higher, for example, face recognition, retina recognition, fingerprint recognition and the like are added to the management technology of the related electronic lock, but all of these require to construct a dedicated control network to transmit signals, and the user is required to manage the electronic lock in a short distance, which is not capable of remote management, and the user experience needs to be improved.
Disclosure of Invention
In view of this, embodiments of the present invention provide an electronic lock management method, apparatus, system and storage medium, so as to perform remote management on an electronic lock, thereby improving user experience.
The embodiment of the invention provides an electronic lock management method, which is applied to an operator system and comprises the following steps:
receiving an electronic lock management request, wherein the electronic lock management request carries authentication information of a corresponding target user;
based on the electronic lock management request, calling an electronic lock system to authenticate the target user based on the authentication information to obtain an authentication result;
and managing the electronic lock based on the authentication result.
In the above scheme, the method further comprises:
constructing the electronic lock system with a container platform as a base layer;
the electronic lock system is configured to provide a plurality of services, each of the services being run through a container in the container platform.
In the foregoing solution, the invoking the electronic lock system to authenticate the target user based on the authentication information includes:
and sending the electronic lock management request to the electronic lock system through an interface of the electronic lock system, wherein the electronic lock management request is used for matching the authentication information with preset authentication information after the electronic lock system analyzes the electronic lock management request to obtain the authentication information, and authenticating the target user based on a matching result.
In the foregoing solution, the invoking the electronic lock system to authenticate the target user based on the authentication information includes:
analyzing the electronic lock management request to obtain the authentication information;
and sending the authentication information to the electronic lock system through an interface of the electronic lock system, wherein the authentication information is used for matching the authentication information with preset authentication information by the electronic lock system and authenticating the target user based on a matching result.
In the above scheme, the electronic lock management request is used to obtain a dynamic password of the electronic lock; accordingly, the managing the electronic lock based on the authentication result includes:
when the authentication result represents that the target user passes the authentication, acquiring a dynamic password of the electronic lock;
and sending the acquired dynamic password.
In the above scheme, the electronic lock management request is used for remote unlocking; accordingly, the managing the electronic lock based on the authentication result includes:
when the authentication result represents that the target user passes the authentication, acquiring an unlocking instruction of the electronic lock;
and sending the unlocking instruction to the electronic lock to control the electronic lock to be unlocked.
In the above scheme, the method further comprises:
acquiring a locking instruction of the electronic lock when the number of times of the received electronic lock management request in a preset time period exceeds a preset threshold value and the authentication result corresponding to each electronic lock management request represents that the authentication on the target user is not passed;
and sending the locking instruction to the electronic lock to control the electronic lock to be locked.
The embodiment of the invention also provides an electronic lock management method, which is applied to a terminal and comprises the following steps:
sending an electronic lock management request to an operator system, wherein the electronic lock management request carries authentication information corresponding to a target user, and the electronic lock management request is used for the operator system to call the electronic lock system to authenticate the target user based on the authentication information to obtain an authentication result;
and receiving management information which is returned by the operator system based on the authentication result and corresponds to the electronic lock, so as to manage the electronic lock based on the management information.
The embodiment of the present invention further provides an electronic lock management device, which is located in an operator system, and includes:
the system comprises a receiving unit, a processing unit and a processing unit, wherein the receiving unit is used for receiving an electronic lock management request which carries authentication information corresponding to a target user;
the calling unit is used for calling the electronic lock system to authenticate the target user based on the authentication information based on the electronic lock management request to obtain an authentication result;
and the management unit is used for managing the electronic lock based on the authentication result.
In the above solution, the apparatus further comprises a construction unit,
the building unit is used for building the electronic lock system by taking the container platform as a base layer;
the electronic lock system is configured to provide a plurality of services, each of the services being run through a container in the container platform.
In the above scheme, the invoking unit is specifically configured to send the electronic lock management request to the electronic lock system through an interface of the electronic lock system, where the electronic lock management request is used to match the authentication information with preset authentication information after the electronic lock system analyzes the electronic lock management request to obtain the authentication information, and authenticate the target user based on a matching result.
In the above scheme, the calling unit is specifically configured to analyze the electronic lock management request to obtain the authentication information;
and sending the authentication information to the electronic lock system through an interface of the electronic lock system, wherein the authentication information is used for matching the authentication information with preset authentication information by the electronic lock system and authenticating the target user based on a matching result.
In the above scheme, the electronic lock management request is used to obtain a dynamic password of the electronic lock; accordingly, the number of the first and second electrodes,
the management unit is specifically configured to obtain a dynamic password of the electronic lock when the authentication result represents that the target user is authenticated;
and sending the acquired dynamic password.
In the above scheme, the electronic lock management request is used for remote unlocking; accordingly, the number of the first and second electrodes,
the management unit is specifically used for acquiring an unlocking instruction of the electronic lock when the authentication result represents that the target user passes the authentication;
and sending the unlocking instruction to the electronic lock to control the electronic lock to be unlocked.
In the above solution, the device further comprises a locking unit,
the locking unit is used for acquiring a locking instruction of the electronic lock when the number of times of the received electronic lock management request in a preset time period exceeds a preset threshold and the authentication result corresponding to each electronic lock management request represents that the authentication of the target user is not passed;
and sending the locking instruction to the electronic lock to control the electronic lock to be locked.
The embodiment of the present invention further provides an electronic lock management device, located at a terminal, including:
the system comprises a sending unit, a receiving unit and a processing unit, wherein the sending unit is used for sending an electronic lock management request to an operator system, the electronic lock management request carries authentication information corresponding to a target user, and the electronic lock management request is used for the operator system to call the electronic lock system to authenticate the target user based on the authentication information to obtain an authentication result;
and the acquisition unit is used for receiving management information which is returned by the operator system based on the authentication result and corresponds to the electronic lock, so as to manage the electronic lock based on the management information.
An embodiment of the present invention further provides an electronic lock management system, including: the system comprises a terminal, an operator system, an electronic lock system and an electronic lock;
the terminal is used for sending an electronic lock management request to an operator system, wherein the electronic lock management request carries authentication information of a corresponding target user;
and the operator system is used for receiving the electronic lock management request, calling the electronic lock system to authenticate the target user based on the authentication information based on the electronic lock management request to obtain an authentication result, and managing the electronic lock based on the authentication result.
An embodiment of the present invention further provides an electronic lock management apparatus, including:
a memory for storing executable instructions;
and the processor is used for realizing the electronic lock management method of the embodiment of the invention when executing the executable instructions stored in the memory.
The embodiment of the invention also provides a storage medium, which stores executable instructions, and when the executable instructions are executed, the electronic lock management method is implemented.
The embodiment of the invention provides an electronic lock management method, a device and a system, wherein the method is applied to an operator system and comprises the following steps: receiving an electronic lock management request, wherein the electronic lock management request carries authentication information of a corresponding target user; based on the electronic lock management request, calling an electronic lock system to authenticate the target user based on the authentication information to obtain an authentication result; and managing the electronic lock based on the authentication result. Therefore, authentication is completed through integration cooperation of the electronic lock system and the operator system, remote management of the electronic lock is achieved, and user experience is improved.
Drawings
Fig. 1 is a schematic structural diagram of an electronic lock management system according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of an electronic lock system according to an embodiment of the present invention;
FIG. 3 is a schematic flow chart illustrating automatic interface adaptation of an electronic lock system according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an electronic lock according to an embodiment of the present invention;
fig. 5 is a first flowchart illustrating an electronic lock management method according to an embodiment of the present invention;
FIG. 6 is a schematic diagram of a container platform architecture according to an embodiment of the present invention;
FIG. 7 is a flow chart illustrating service containerization according to an embodiment of the present invention;
fig. 8 is a second flowchart illustrating an electronic lock management method according to an embodiment of the present invention;
fig. 9 is a third schematic flowchart of an electronic lock management method according to an embodiment of the present invention;
fig. 10 is a first schematic structural diagram illustrating a composition of an electronic lock management device according to an embodiment of the present invention;
fig. 11 is a schematic structural diagram of a second exemplary embodiment of an electronic lock management device;
fig. 12 is a third schematic view of a composition structure of an electronic lock management device according to an embodiment of the present invention.
Detailed Description
So that the manner in which the features and aspects of the embodiments of the present invention can be understood in detail, a more particular description of the embodiments of the invention, briefly summarized above, may be had by reference to the embodiments, some of which are illustrated in the appended drawings.
In the following description, reference is made to "some embodiments" which describe a subset of all possible embodiments, but it is understood that "some embodiments" may be the same subset or different subsets of all possible embodiments, and may be combined with each other without conflict.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which embodiments of the present invention belong. The terminology used herein is for the purpose of describing embodiments of the invention only and is not intended to be limiting of embodiments of the invention.
The flowchart and block diagrams in the figures presented by the present invention illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Before further detailed description of the embodiments of the present invention, terms and expressions referred to in the embodiments of the present invention are described, and the terms and expressions referred to in the embodiments of the present invention are applicable to the following explanations.
1) The container defines a set of standardized system from construction to execution, changes the traditional virtualization technology, deeply influences the field of cloud computing, and is the future of cloud computing. The container technology represented by Docker increasingly affects cloud computing, and changes our daily development, operation and maintenance, and testing. Compared with a virtual machine, the container is light in weight, quick to start and low in cost, and a packing by service and micro service mode based on the container are used for improving Development operation and maintenance integration (Development Operations), and the container is more suitable for large-scale cluster management and flexible distributed system building under many scenes. Platform-as-a-Service (PaaS), Infrastructure-as-a-Service (IaaS) and container technology are deeply integrated, services such as elastic computing, DevOps tool chains and micro-Service infrastructures are provided, and the problems of IT, architecture, operation and maintenance and the like are solved for enterprises, so that the enterprises focus on services more, and a new generation of cloud computing ecosystem is constructed.
2) Docker, an open source application container engine, allows developers to package their applications and dependencies into a portable container, and then release them to any popular operating system, and also can implement virtualization, containers are fully sandboxed, and there is no interface between them.
3) Microservice is an architectural style in that a large complex software application consists of one or more microservices. Each microservice in the system can be deployed independently, with loose coupling between the microservices, and each microservice is only concerned with completing one task and well completing the task. In all cases, each task represents a small business capability. With services organized around business capabilities, automated deployment, intelligent endpoints, de-centralized control of speech and data, etc.
4) Model View Controller (MVC), a software design paradigm, organizes code using a method that separates business logic, data, and interface display, aggregates business logic into one component, and does not require rewriting business logic while improving and personalizing custom interfaces and user interactions. MVC was uniquely developed to map traditional input, processing, and output functions into a logical graphical user interface structure.
5) JavaScript Object Notation (JSON), a lightweight data interchange format. It is based on a subset of JavaScript (Standard ECMA-2623 rd Edition-December 1999). JSON employs a text format that is completely language independent, but also uses conventions similar to the C language family (including C, C + +, C #, Java, JavaScript, Perl, Python, etc.). JSON is easy to read and write by humans, and also easy to parse and generate by machines, thus becoming an ideal data exchange language.
6) The operator system is a provider system capable of providing network services, is deployed on an operator server, and can be called as an operator only by companies such as China Mobile, China Unicom, China telecom and China radio and television, which have operation licenses issued by the industry and credit department.
Based on the above explanations of terms and terms involved in the embodiments of the present invention, referring next to fig. 1, fig. 1 is a schematic diagram of an architecture of an electronic lock management system 100 provided in the embodiments of the present invention, and to implement supporting an exemplary application, the electronic lock management system is composed of an electronic lock system 200, an operator system 400, a terminal 500, and an electronic lock 600, where the terminal 500 is connected to the operator system 400 through a network 300, and the network 300 is a network provided by the operator system 400, and may be a wide area network or a local area network, or may be a combination of the two, and implements data transmission using a wireless link.
A terminal 500, configured to send an electronic lock management request to the operator system 400, where the electronic lock management request carries authentication information of a corresponding target user;
and the operator system 400 is configured to receive the electronic lock management request, invoke the electronic lock system 200 to authenticate the target user based on the authentication information based on the electronic lock management request, obtain an authentication result, and manage the electronic lock 600 based on the authentication result.
Fig. 2 is a schematic structural diagram of an electronic lock system 200 according to an embodiment of the present invention, and referring to fig. 2, the electronic lock system 200 is divided into a base layer, an ability layer, a business layer, and an application layer, and provides multiple access modes and access roles.
The base layer provides a software running environment through a container platform, and provides an application running platform through technologies such as Docker and Kubernetes, so that operation and maintenance automation is realized, application is deployed quickly, application environment resources are elastically stretched and dynamically adjusted, and research and development operation efficiency is improved.
The capability layer is an abstraction of various capabilities, providing authentication, workflow, reporting, configuration, interface functions. The authentication service for the access of operators, equipment merchants and users is a first line of defense for accessing the system and is also an authentication module integrated with a third party; the workflow is used for configuring a user operation process, a third-party integrated approval process and other service processes; the report provides statistical analysis of equipment data, regional fault statistics, activated data statistics and the like for various data statistical analysis; configuration provides system configuration management, administrator setting, and basic configuration information management of users, roles and the like; the interface is integrated with the outside and provides a configuration data interface for the outside.
The service layer provides a set of services that are available to the user to the outside. The resource management provides resource management for the activated equipment, and comprises various management operations such as startup and shutdown, restart and offline; the user management provides user data management, authority management, account opening, account cancellation and the like; remote control provides remote control authority management and remote unlocking functions, and remote temporary passwords and the like can be set; the monitoring alarm provides various monitoring alarms such as equipment failure, intrusion alarm, equipment switch abnormity and the like.
The application layer enables integration with third party systems, which here may be operator systems. Sales management may provide sold data, sales price and type, etc.; the device management provides device management functions such as device activation and freezing; the charging management provides a service charging function according to the service time of the equipment; system management provides device infrastructure management. Referring to fig. 3, fig. 3 is a schematic flow chart of the automatic interface adaptation of the electronic lock system according to the embodiment of the present invention, and relates to steps S301 to S305, which are described below.
Step S301: and the electronic lock system receives the information sent by the operator system through the electronic lock system interface.
Step S302: and judging whether the received information is in json format, if so, executing S304, and if not, executing step S303.
The message format returned by the operator system interface is various, before the electronic lock system analyzes the received message, whether the message format received by the electronic lock system interface is the json format needs to be judged, if so, the step S304 is executed; if not, step S303 is performed.
Step S303: and converting the message into a json format.
The received messages in the non-json format returned by the interface of the operator system are converted into the json format, which is a necessary step for analyzing the messages and is also the first step of analyzing.
Step S304: and reading the object of the message in the json format for analysis.
When the electronic lock system analyzes the message in the json format, a message interval mark needs to be defined manually, the message interval mark is used for reading the configuration items of the message to be analyzed, the json object to be analyzed is sequentially read through step-by-step cyclic analysis of each configuration item, the attribute value is read, and finally the analysis of the json message is completed.
Step S305: judging whether the analysis is finished, if so, ending the process; if the parsing is not completed, return is made to step S304.
When the judgment result represents that the json message is finally analyzed, the process is ended; and when the judgment result represents that the json message is not analyzed, executing the step S304 to continue analyzing the json message.
The automatic interface adaptation method realizes the complete automatic adaptation of the interface, does not need secondary development when being in butt joint with a third-party interface, greatly lightens the development pressure and improves the product integration efficiency.
Fig. 4 is a schematic diagram of a composition structure of an electronic lock according to an embodiment of the present invention, referring to fig. 4, where a wireless module is used to receive and transmit a control signal through an operator network, an embedded program runs in an intelligent chip, which is a brain of the intelligent lock, a touch screen is used to receive a key instruction, a camera collects image data around a door lock, a clutch and an electric lock control complete a switching operation after receiving the instruction, fingerprint collection is used to read user fingerprint information, and a power module provides electric energy required by the intelligent lock.
The electronic lock provides a plurality of unlocking modes, including: the electronic lock management method comprises a fingerprint, a password, an intelligent terminal and a key, and is mainly used for introducing the electronic lock management method provided by the embodiment of the invention aiming at an unlocking process of the intelligent terminal.
Fig. 5 is a first schematic flow chart of an electronic lock management method according to an embodiment of the present invention, and referring to fig. 5, the electronic lock management method according to the embodiment of the present invention is applied to an operator system, and includes:
step S501: and the operator system receives an electronic lock management request, wherein the electronic lock management request carries authentication information of a corresponding target user.
In some embodiments, when the user forgets the password, the user may send an electronic lock management request to the operator system through the terminal to apply for unlocking, and the terminal may be a mobile phone or a tablet computer. In other embodiments, when a guest visits and the host is not at home, the user may send an electronic lock management request to the operator system through the terminal, where the electronic lock management request is used to obtain a dynamic password of the electronic lock to set a temporary password for the guest, so as to achieve remote unlocking.
Taking the terminal as a mobile phone as an example, a user can dial an operator customer service telephone through the mobile phone, and the operator customer service can verify the identity of the user by calling the electronic lock system, so that the electronic lock can be remotely operated. The user can also open the application software in the mobile phone, and send an electronic lock management request to the operator system in the application software for identity authentication, so as to realize the control of the electronic lock.
Step S502: and calling the electronic lock system to authenticate the target user based on the authentication information based on the electronic lock management request to obtain an authentication result.
In actual implementation, before the operator system calls the electronic lock system to verify the electronic lock management request, the electronic lock system needs to be constructed. In some embodiments, the electronic lock system is built with the container platform as a base layer, the electronic lock system being used to provide a plurality of services, each service being run through one container in the container platform.
The container platform provides high-performance scalable container application management services, supports application lifecycle management with Docker containers, provides multiple application publishing modes and continuous delivery capabilities, and supports service architectures. The container service simplifies the construction work of the container management muscle group, integrates the virtualization, storage, network and safety capabilities of cloud computing, and creates the optimal operation environment of the cloud. Fig. 6 is a schematic diagram of a container platform architecture according to an embodiment of the present invention, referring to fig. 6, the container application can be accessed directly from a public network or accessed through a load balancing service portal through an elastic IP; through the elastic load balancing service, the flow among the nodes in the cluster can be automatically balanced, and the high performance and high availability of the container application are ensured; the data persistence storage of the container application is realized through the virtualization cluster; and the server side of the electronic lock system is made into a mirror image, stored in a mirror image warehouse and operated in a container. The container has the characteristics of automatic operation and maintenance elastic expansion and the like, and an electronic lock system automatically triggers automatic elastic expansion under the condition that electronic lock clients are on line on a large scale, responds to concurrent peaks quickly and provides performance guarantee.
Fig. 7 is a schematic flow chart of service containerization provided by the embodiment of the present invention, and referring to fig. 7, a service containerization process provided by the embodiment of the present invention includes:
step S701: and creating a container space, and logically isolating the service based on the container space to obtain different virtual clusters.
In practical implementation, the traditional containerization process comprises environment preparation, mirror image production and container starting; unlike traditional containerization, in some embodiments of the invention, service resources are logically isolated by container space, services are divided into different virtual clusters, and the environment is isolated by space.
Step S702: creating container services includes code building, application packaging, integration testing, creating service names and states.
In actual implementation, creating a container service includes code building, application packaging, integration testing, and creating a service name and state, and a user passes through < service name >: the service port can access deployed services, elastic expansion, load balancing, gray scale upgrading and error recovery of applications can be realized by using the services, the product service updating online process is accelerated from code construction to integration test, and development, operation and maintenance integration is realized.
Step S703: and (4) plug-in storage is carried out when the mirror image is created, and the frequently updated content is made into a single mirror image.
In actual implementation, the time consumption of the traditional mirror image manufacturing process is long, and when the mirror image needs to be updated, all mirror images need to be updated, so that the efficiency is low. In order to solve the problem, in some embodiments of the present invention, when creating an image, the storage is added externally, the content which is frequently updated is made into a single image, and when starting a container, parameters are introduced to cover a specified directory, so as to solve the problem of creating the image.
Step S704: the configuration runtime environment mainly sets resource limits, ports and copy numbers.
In actual implementation, the configuration operating environment mainly sets resource limitations, ports, copy numbers, and the like, where the resource limitations include a cpu specification, a memory size, and a system disk size, the port configuration defines a port mapping relationship between a container and a service, the port selection range is 1 to 65535, and the port protocols include a Transmission Control Protocol (TCP) and a User Datagram Protocol (UDP).
Through the process, the creation service can be started through the container platform, and the creation result can be checked through the container platform log.
In some embodiments, the operator system may invoke the electronic lock system to authenticate the target user based on the authentication information by:
and sending an electronic lock management request to the electronic lock system through an interface of the electronic lock system, wherein the electronic lock management request is used for matching the authentication information with preset authentication information after the electronic lock system analyzes the electronic lock management request to obtain the authentication information, and authenticating the target user based on the matching result.
Here, in actual implementation, the operator system transmits the received electronic lock management request to the electronic lock system. After receiving an electronic lock management request, an electronic lock system firstly analyzes the request to obtain authentication information corresponding to a target user; then, matching the obtained authentication information with preset authentication information stored in an electronic lock system to obtain a matching result; then, the target user is authenticated based on the matching result to obtain an authentication result; and finally, generating management information corresponding to the electronic lock based on the authentication result, and sending the management information to an operator system.
In some embodiments, the operator system may invoke the electronic lock system to authenticate the target user based on the authentication information by:
analyzing the electronic lock management request to obtain authentication information; sending authentication information to the electronic lock system through an interface of the electronic lock system; and the authentication information is used for matching the authentication information with preset authentication information by the electronic lock system and authenticating the target user based on a matching result.
Here, in actual implementation, the operator system analyzes the received electronic lock management request to obtain authentication information; and then sends the obtained authentication information to the electronic lock system. After the electronic lock system receives the authentication information, the authentication information is matched with preset authentication information stored in the electronic lock system to obtain a matching result; then, the target user is authenticated based on the matching result to obtain an authentication result; and finally, generating management information corresponding to the electronic lock based on the authentication result, and sending the management information to an operator system.
Step S503: and managing the electronic lock based on the authentication result.
In practical application, after receiving the management information of the corresponding electronic lock generated based on the authentication result and sent by the electronic lock system, the operator system correspondingly manages the electronic lock based on the management information.
In some embodiments, the electronic lock management request is used to obtain a dynamic password of the electronic lock, and accordingly, the operator system may manage the electronic lock based on the authentication result by:
when the authentication result represents that the target user passes the authentication, acquiring a dynamic password of the electronic lock; and sending the acquired dynamic password.
Here, in practical implementation, when the authentication result indicates that the target user is authenticated, the electronic lock system generates a dynamic password of the electronic lock and sends the dynamic password to the operator system; and the operator system sends the acquired dynamic password to the mobile phone terminal of the target user or to the mobile phone terminals of other preset users.
In some embodiments, the electronic lock management request is for remote unlocking, and accordingly, the operator system may manage the electronic lock based on the authentication result by:
when the authentication result represents that the target user passes the authentication, acquiring an unlocking instruction of the electronic lock; and sending an unlocking instruction to the electronic lock to control the electronic lock to be unlocked.
In actual implementation, when the authentication result represents that the authentication of the target user passes, the electronic lock system generates an unlocking instruction of the electronic lock and sends the generated unlocking instruction to the operator system; after the operator system obtains the unlocking instruction, the unlocking instruction is sent to the electronic lock to control the electronic lock to unlock.
In some embodiments, the operator system may further count the number of times of the electronic lock management request received within a preset time period, and determine whether the authentication result corresponding to each electronic lock management request represents that the authentication on the target user passes. When the number of times of the received electronic lock management requests in a preset time period exceeds a preset threshold value and the authentication result corresponding to each electronic lock management request represents that the authentication of a target user is not passed, acquiring a locking instruction of the electronic lock; and sending a locking instruction to the electronic lock to control the electronic lock to be locked.
Through the mode, when the unlocking authentication fails for many times, the electronic lock can be controlled to be locked, and the safety of the electronic lock is improved.
Next, the electronic lock management method provided by the embodiment of the present invention is described by taking a terminal as a mobile phone and acquiring a dynamic password as an example. Fig. 8 is a second schematic flowchart of a method for managing an electronic lock according to an embodiment of the present invention, and referring to fig. 8, the method for managing an electronic lock according to the embodiment of the present invention includes:
step 801: and responding to an operation instruction for sending the dynamic password triggered by the user, generating a dynamic password application request by the mobile phone terminal, and sending the dynamic password application request to the operator system.
Step 802: and the operator system analyzes the dynamic password application request to obtain authentication information of the corresponding target user and sends the authentication information to the electronic lock system.
Step 803: and the electronic lock system matches the received authentication information with preset authentication information, authenticates the target user and obtains an authentication result.
Step 804: the electronic lock system generates a dynamic password based on the authentication result.
Here, if the authentication result represents that the target user passes the authentication, the electronic lock system generates a corresponding dynamic password; and if the authentication result represents that the target user is not authenticated, the electronic lock system does not generate the corresponding dynamic password.
Step 805: the electronic lock system sends the generated dynamic password to the operator system.
Step 806: and the operator system sends the received dynamic password to the mobile phone terminal.
Here, the operator system may send the dynamic password to the mobile phone terminal of the target user, or send the dynamic password to the mobile phone terminals of other preset users.
Step 807: and responding to the dynamic password input by the user, and the electronic lock executes unlocking operation.
Next, an electronic lock management method provided by an embodiment of the present invention is described by taking remote unlocking as an example. Fig. 9 is a third schematic flowchart of a method for managing an electronic lock according to an embodiment of the present invention, and referring to fig. 9, the method for managing an electronic lock according to an embodiment of the present invention includes:
step 901: and responding to a remote unlocking operation instruction triggered by a user, generating an unlocking request carrying corresponding target user authentication information by the terminal, and sending the unlocking request to the operator system.
Step 902: the operator system sends an unlocking request to the electronic lock system through an interface of the electronic lock system.
Step 903: and the electronic lock system analyzes the unlocking request to obtain the authentication information corresponding to the target user.
Step 904: and the electronic lock system matches the analyzed authentication information with preset authentication information, authenticates the target user and obtains an authentication result.
Step 905: the electronic lock system generates an unlocking instruction based on the authentication result.
If the authentication result represents that the authentication of the target user passes, the electronic lock system generates a corresponding unlocking instruction; and if the authentication result represents that the authentication of the target user is not passed, the electronic lock system does not generate a corresponding unlocking instruction.
Step 906: and the electronic lock system sends the generated unlocking instruction to the operator system.
Step 907: and the operator system sends the received unlocking instruction to the electronic lock.
Step 908: and responding to the unlocking instruction, and executing unlocking operation by the electronic lock.
Fig. 10 is a schematic view of a first structural diagram of an electronic lock management device according to an embodiment of the present invention, and referring to fig. 9, the electronic lock management device 10 according to the embodiment of the present invention is located in an operator system, and includes:
the system comprises a receiving unit 101, a receiving unit, a processing unit and a processing unit, wherein the receiving unit 101 is used for receiving an electronic lock management request which carries authentication information of a corresponding target user;
the calling unit 102 is configured to call, based on the electronic lock management request, an electronic lock system to authenticate the target user based on the authentication information to obtain an authentication result;
and the management unit 103 is used for managing the electronic lock based on the authentication result.
In some embodiments, the apparatus 10 further comprises a construction unit,
the building unit is used for building the electronic lock system by taking the container platform as a base layer;
the electronic lock system is configured to provide a plurality of services, each of the services being run through a container in the container platform.
In some embodiments, the invoking unit 102 is specifically configured to send the electronic lock management request to the electronic lock system through an interface of the electronic lock system, where the electronic lock management request is used to match the authentication information with preset authentication information after the electronic lock system analyzes the electronic lock management request to obtain the authentication information, and authenticate the target user based on a matching result.
In some embodiments, the invoking unit 102 is specifically configured to analyze the electronic lock management request to obtain the authentication information;
and sending the authentication information to the electronic lock system through an interface of the electronic lock system, wherein the authentication information is used for matching the authentication information with preset authentication information by the electronic lock system and authenticating the target user based on a matching result.
In some embodiments, the electronic lock management request is used to obtain a dynamic password of the electronic lock; accordingly, the number of the first and second electrodes,
the management unit 103 is specifically configured to obtain the dynamic password of the electronic lock when the authentication result represents that the target user is authenticated; and sending the acquired dynamic password.
In some embodiments, the electronic lock management request is for remote unlocking; accordingly, the number of the first and second electrodes,
the management unit 103 is specifically configured to obtain an unlocking instruction of the electronic lock when the authentication result indicates that the authentication on the target user passes;
and sending the unlocking instruction to the electronic lock to control the electronic lock to be unlocked.
In some embodiments, the device 10 further comprises a locking unit,
the locking unit is used for acquiring a locking instruction of the electronic lock when the number of times of the received electronic lock management request in a preset time period exceeds a preset threshold and the authentication result corresponding to each electronic lock management request represents that the authentication of the target user is not passed;
and sending the locking instruction to the electronic lock to control the electronic lock to be locked.
Fig. 11 is a schematic diagram of a second configuration of the electronic lock management device according to the embodiment of the present invention, and referring to fig. 11, the electronic lock management device 11 according to the embodiment of the present invention is located at a terminal, and includes:
a sending unit 111, configured to send an electronic lock management request to an operator system, where the electronic lock management request carries authentication information corresponding to a target user, and the electronic lock management request is used for the operator system to invoke the electronic lock system to authenticate the target user based on the authentication information, so as to obtain an authentication result;
an obtaining unit 112, configured to receive management information corresponding to the electronic lock, which is returned by the operator system based on the authentication result.
It should be noted that: in the electronic lock management device provided in the above embodiment, when the electronic lock is managed, only the division of the program modules is exemplified, and in practical applications, the above processing distribution may be completed by different program modules according to needs, that is, the internal structure of the device is divided into different program modules to complete all or part of the above-described processing. In addition, the electronic lock management device provided by the above embodiment and the electronic lock management method embodiment belong to the same concept, and specific implementation processes thereof are detailed in the method embodiment and are not described herein again.
Fig. 12 is a schematic diagram of a third configuration of the electronic lock management device according to an embodiment of the present invention, and referring to fig. 12, the electronic lock management device 12 includes: at least one processor 121, memory 122, at least one network interface 123, and a user interface 124. The various components in the electronic lock management device 12 are coupled together by a bus system 125. It is understood that the bus system 125 is used to enable connection communications between these components. The bus system 125 includes a power bus, a control bus, and a status signal bus in addition to a data bus. For clarity of illustration, however, the various buses are labeled as bus system 125 in fig. 12. The user interface 124 may include a display, keyboard, mouse, trackball, click wheel, keys, buttons, touch pad or touch screen, and the like.
The memory 122 may be either volatile memory or nonvolatile memory, and may include both volatile and nonvolatile memory. Among them, the nonvolatile Memory may be a Read Only Memory (ROM), a Programmable Read Only Memory (PROM), an Erasable Programmable Read Only Memory (EPROM), a Flash Memory (Flash Memory), and the like. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of illustration and not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), Synchronous Static Random Access Memory (SSRAM). The memory 122 described in connection with embodiments of the invention is intended to comprise these and any other suitable types of memory.
The memory 122 in embodiments of the present invention is capable of storing data to support the operation of the electronic lock management device 12. Examples of such data include: any computer program for operating on the electronic lock management device 12, such as an operating system and application programs. The operating system includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, and is used for implementing various basic services and processing hardware-based tasks. The application program may include various application programs.
As an example of the method provided by the embodiment of the present invention implemented by a combination of hardware and software, the method provided by the embodiment of the present invention may be directly embodied as a combination of software modules executed by the processor 121, where the software modules may be located in a storage medium located in the memory 122, and the processor 121 reads executable instructions 1221 included in the software modules in the memory 122, and completes the method provided by the embodiment of the present invention in combination with necessary hardware (for example, including the processor 121 and other components connected to the bus 125).
By way of example, the Processor 121 may be an integrated circuit chip having Signal processing capabilities, such as a general purpose Processor, a Digital Signal Processor (DSP), or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or the like, wherein the general purpose Processor may be a microprocessor or any conventional Processor or the like.
An embodiment of the present invention further provides a storage medium, where the storage medium may include: a removable storage device, a RAM, a ROM, a magnetic or optical disk, or various other media that can store program code. The readable storage medium stores executable instructions; the executable instructions are used for realizing the electronic lock management method when being executed by the processor.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: a removable storage device, a ROM, a RAM, a magnetic or optical disk, or various other media that can store program code.
Alternatively, the integrated unit of the present invention may be stored in a computer-readable storage medium if it is implemented in the form of a software functional module and sold or used as a separate product. Based on such understanding, the technical solutions of the embodiments of the present invention may be essentially implemented or a part contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a removable storage device, a ROM, a RAM, a magnetic or optical disk, or various other media that can store program code.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.
Claims (15)
1. An electronic lock management method is applied to an operator system, and comprises the following steps:
receiving an electronic lock management request, wherein the electronic lock management request carries authentication information of a corresponding target user;
based on the electronic lock management request, calling an electronic lock system to authenticate the target user based on the authentication information to obtain an authentication result;
and managing the electronic lock based on the authentication result.
2. The method of claim 1, further comprising:
constructing the electronic lock system with a container platform as a base layer;
the electronic lock system is configured to provide a plurality of services, each of the services being run through a container in the container platform.
3. The method of claim 1, wherein the invoking the electronic lock system to authenticate the target user based on the authentication information comprises:
and sending the electronic lock management request to the electronic lock system through an interface of the electronic lock system, wherein the electronic lock management request is used for matching the authentication information with preset authentication information after the electronic lock system analyzes the electronic lock management request to obtain the authentication information, and authenticating the target user based on a matching result.
4. The method of claim 1, wherein the invoking the electronic lock system to authenticate the target user based on the authentication information comprises:
analyzing the electronic lock management request to obtain the authentication information;
and sending the authentication information to the electronic lock system through an interface of the electronic lock system, wherein the authentication information is used for matching the authentication information with preset authentication information by the electronic lock system and authenticating the target user based on a matching result.
5. The method according to claim 1, wherein the electronic lock management request is used to obtain a dynamic password of the electronic lock; accordingly, the managing the electronic lock based on the authentication result includes:
when the authentication result represents that the target user passes the authentication, acquiring a dynamic password of the electronic lock;
and sending the acquired dynamic password.
6. The method of claim 1, wherein the electronic lock management request is for remote unlocking; accordingly, the managing the electronic lock based on the authentication result includes:
when the authentication result represents that the target user passes the authentication, acquiring an unlocking instruction of the electronic lock;
and sending the unlocking instruction to the electronic lock to control the electronic lock to be unlocked.
7. The method of claim 1, further comprising:
acquiring a locking instruction of the electronic lock when the number of times of the received electronic lock management request in a preset time period exceeds a preset threshold value and the authentication result corresponding to each electronic lock management request represents that the authentication on the target user is not passed;
and sending the locking instruction to the electronic lock to control the electronic lock to be locked.
8. An electronic lock management method is applied to a terminal, and comprises the following steps:
sending an electronic lock management request to an operator system, wherein the electronic lock management request carries authentication information corresponding to a target user, and the electronic lock management request is used for the operator system to call the electronic lock system to authenticate the target user based on the authentication information to obtain an authentication result;
and receiving management information which is returned by the operator system based on the authentication result and corresponds to the electronic lock, so as to manage the electronic lock based on the management information.
9. An electronic lock management device, wherein the device is located at an operator system, comprising:
the system comprises a receiving unit, a processing unit and a processing unit, wherein the receiving unit is used for receiving an electronic lock management request which carries authentication information corresponding to a target user;
the calling unit is used for calling the electronic lock system to authenticate the target user based on the authentication information based on the electronic lock management request to obtain an authentication result;
and the management unit is used for managing the electronic lock based on the authentication result.
10. The apparatus according to claim 9, characterized in that the apparatus further comprises a construction unit,
the building unit is used for building the electronic lock system by taking the container platform as a base layer;
the electronic lock system is configured to provide a plurality of services, each of the services being run through a container in the container platform.
11. The apparatus of claim 9,
the calling unit is specifically configured to send the electronic lock management request to the electronic lock system through an interface of the electronic lock system, where the electronic lock management request is used for the electronic lock system to analyze the electronic lock management request to obtain the authentication information, match the authentication information with preset authentication information, and authenticate the target user based on a matching result.
12. An electronic lock management device, wherein the device is located at a terminal, comprising:
the system comprises a sending unit, a receiving unit and a processing unit, wherein the sending unit is used for sending an electronic lock management request to an operator system, the electronic lock management request carries authentication information corresponding to a target user, and the electronic lock management request is used for the operator system to call the electronic lock system to authenticate the target user based on the authentication information to obtain an authentication result;
and the acquisition unit is used for receiving management information which is returned by the operator system based on the authentication result and corresponds to the electronic lock, so as to manage the electronic lock based on the management information.
13. An electronic lock management system, the system comprising: the system comprises a terminal, an operator system, an electronic lock system and an electronic lock;
the terminal is used for sending an electronic lock management request to an operator system, wherein the electronic lock management request carries authentication information of a corresponding target user;
and the operator system is used for receiving the electronic lock management request, calling the electronic lock system to authenticate the target user based on the authentication information based on the electronic lock management request to obtain an authentication result, and managing the electronic lock based on the authentication result.
14. An electronic lock management device, comprising:
a memory for storing executable instructions;
a processor for implementing the electronic lock management method of any one of claims 1 to 7 when executing executable instructions stored in the memory.
15. A storage medium storing executable instructions for implementing the electronic lock management method of any one of claims 1 to 7 when executed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910749607.2A CN112448909A (en) | 2019-08-14 | 2019-08-14 | Electronic lock management method, device, system and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910749607.2A CN112448909A (en) | 2019-08-14 | 2019-08-14 | Electronic lock management method, device, system and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112448909A true CN112448909A (en) | 2021-03-05 |
Family
ID=74742143
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910749607.2A Withdrawn CN112448909A (en) | 2019-08-14 | 2019-08-14 | Electronic lock management method, device, system and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112448909A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113791864A (en) * | 2021-09-08 | 2021-12-14 | 国电南瑞科技股份有限公司 | Container and micro-service function based monitoring system and construction method thereof |
CN114826648A (en) * | 2022-03-09 | 2022-07-29 | 北京快乐茄信息技术有限公司 | Authentication assembly, authentication method, electronic equipment and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103903317A (en) * | 2012-12-28 | 2014-07-02 | 北京大唐高鸿数据网络技术有限公司 | Access control and alarm method employing session initiation protocol (SIP) extension |
CN103971435A (en) * | 2014-05-22 | 2014-08-06 | 广东欧珀移动通信有限公司 | Unlocking method, server, mobile terminal, electronic lock and unlocking system |
-
2019
- 2019-08-14 CN CN201910749607.2A patent/CN112448909A/en not_active Withdrawn
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103903317A (en) * | 2012-12-28 | 2014-07-02 | 北京大唐高鸿数据网络技术有限公司 | Access control and alarm method employing session initiation protocol (SIP) extension |
CN103971435A (en) * | 2014-05-22 | 2014-08-06 | 广东欧珀移动通信有限公司 | Unlocking method, server, mobile terminal, electronic lock and unlocking system |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113791864A (en) * | 2021-09-08 | 2021-12-14 | 国电南瑞科技股份有限公司 | Container and micro-service function based monitoring system and construction method thereof |
CN113791864B (en) * | 2021-09-08 | 2024-03-26 | 国电南瑞科技股份有限公司 | Monitoring system based on container and microservice function and construction method thereof |
CN114826648A (en) * | 2022-03-09 | 2022-07-29 | 北京快乐茄信息技术有限公司 | Authentication assembly, authentication method, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111258725B (en) | Data processing method, device, equipment and medium based on block chain | |
US8955037B2 (en) | Access management architecture | |
CN111290865A (en) | Service calling method and device, electronic equipment and storage medium | |
CN111930521A (en) | Method and device for deploying application, electronic equipment and readable storage medium | |
CN111414381B (en) | Data processing method and device, electronic equipment and storage medium | |
US10686791B1 (en) | Secure cloud computing framework | |
CN111274268A (en) | Internet of things data transmission method, device, medium and electronic equipment | |
WO2022095518A1 (en) | Automatic interface test method and apparatus, and computer device and storage medium | |
CN106452815B (en) | An information management method, device and system | |
CN113360217B (en) | Rules engine SDK calling method, device and storage medium | |
CN112181745A (en) | A cloud service platform system and method for FPGA prototype verification | |
CN112565225B (en) | Method and device for data transmission, electronic equipment and readable storage medium | |
CN112448909A (en) | Electronic lock management method, device, system and storage medium | |
US10621111B2 (en) | System and method for unified secure remote configuration and management of multiple applications on embedded device platform | |
WO2023125755A1 (en) | Service request processing method and apparatus based on large-scale cluster, and device and medium | |
CN105681291B (en) | A kind of realization multi-client uniform authentication method and system | |
CN114095272B (en) | Intranet data linking method and device based on internal and external network security architecture | |
CN111045928A (en) | Interface data testing method, device, terminal and storage medium | |
Jayagopan et al. | Intelligence orchestration in IoT and cyber-physical systems | |
CN114398082B (en) | Compatible operation method and device for frame type block chain application | |
CN113672385B (en) | Server hardware resource management system, method and device and storage medium | |
CN116032494B (en) | Data interaction method, blockchain predictor, device and medium | |
CN117041353B (en) | Task processing method and device, electronic equipment and storage medium | |
US20240330315A1 (en) | Event based source replication architecture | |
US20250117315A1 (en) | Multicloud test automation framework |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20210305 |