CN114495330A - Method for setting temporary fingerprint by authorization - Google Patents
Method for setting temporary fingerprint by authorization Download PDFInfo
- Publication number
- CN114495330A CN114495330A CN202210082525.9A CN202210082525A CN114495330A CN 114495330 A CN114495330 A CN 114495330A CN 202210082525 A CN202210082525 A CN 202210082525A CN 114495330 A CN114495330 A CN 114495330A
- Authority
- CN
- China
- Prior art keywords
- password
- time limit
- fingerprint
- iii
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00182—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00182—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
- G07C2009/00238—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks the transmittted data signal containing a code which is changed
- G07C2009/00253—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks the transmittted data signal containing a code which is changed dynamically, e.g. variable code - rolling code
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention discloses a method for setting temporary fingerprints in an authorized manner, which comprises the following steps: generating a deadline password I and a deadline password II at a server; inputting a time limit password III at a user end for judgment, judging the timeliness of the time limit password III when the time limit password III is consistent with the time limit password I, and opening a door lock when the time limit password III is in a specified time limit; when the time limit password is consistent with the time limit password II, the timeliness of the time limit password III is judged, when the time limit is in a specified time limit, the time limit password can be input by a fingerprint and stored to a user side, and when the time limit password is input by the user side and is consistent with a preset fingerprint password, the door lock is opened. According to the invention, two groups of different time limit passwords are produced, one group of time limit passwords can realize normal unlocking within a specified time limit, the other group of time limit passwords can set the temporary authorization fingerprint, and the temporary authorization fingerprint is utilized to carry out fingerprint unlocking within the time limit, so that the trouble that multiple passwords need to be input every time is solved, the use of a user is facilitated, and the user experience is further improved.
Description
Technical Field
The invention relates to the technical field of door locks, in particular to a method for setting temporary fingerprints by authorization.
Background
The off-line (without network support) remote unlocking mode (for the guest or tenant needing temporary use) in the current market combines the management password and the standard time to generate a deadline password containing the current time and the deadline time. The time limit code is input into the lock, and the lock can be unlocked if the time and the management code are correct.
This scheme has a certain disadvantage that the password length of the time limit password is relatively long, generally more than 10 digits, because the time limit password contains time and a management password. When the user uses the time limit password, the user needs to have good memory or take out the password for comparison and input every time the user uses the time limit password, so that the user is inconvenient to use the time limit password, and the use experience of the user is influenced.
Disclosure of Invention
In view of the above, the present invention provides a method for authorizing setting of a temporary fingerprint.
In order to solve the technical problems, the technical scheme of the invention is as follows: a method of authorizable settings of a temporary fingerprint, comprising:
step 1: generating two groups of time limit passwords which are a time limit password I and a time limit password II respectively at the server side according to the combination of the current standard time and the input management password, and entering the step 2;
step 2: inputting a time limit password III at a user terminal, judging the time limit password III at the user terminal, judging whether the time limit password is a time limit password I or a time limit password II, entering a step 3 when the time limit password III is consistent with the time limit password I, entering a step 4 when the time limit password III is consistent with the time limit password II, and keeping a door lock closed when the time limit password III is inconsistent with the time limit password I and the time limit password II;
and step 3: judging the timeliness of the time limit password III, and when the time limit password III is in a specified time limit, opening the door lock, otherwise, keeping the door lock closed;
and 4, step 4: judging the timeliness of the time limit password III, entering the step 5 when the time limit password III is in a specified time limit, otherwise, keeping the door lock closed;
and 5: starting temporary fingerprint password registration, enabling a user to record and store a fingerprint to a user side to obtain a preset fingerprint password I, and entering step 6;
step 6: the user inputs a fingerprint password II at a fingerprint input end of the user end, the fingerprint password II is judged at the user end, when the fingerprint password II is consistent with a preset fingerprint password I, the timeliness of the fingerprint password II is judged, when the fingerprint password II is within a specified time limit, the step 7 is carried out, otherwise, the door lock is kept closed;
and 7: and judging the timeliness of the fingerprint password II, and when the fingerprint password II is in a specified period, opening the door lock, otherwise, keeping the door lock closed.
Further, the term time is counted in days.
Preferably, the combination of the standard time and the management password in step 1 is integrated and encrypted into a ciphertext, and then the ciphertext is converted into a multi-bit 10-system deadline password I and a multi-bit 10-system deadline password II.
Further, when the time limit password iii and the time limit password i or the time limit password ii in step 2 are judged, decryption operation needs to be performed on the time limit password iii, and consistency judgment needs to be performed on the time limit password iii and the time limit password i and the time limit password ii before the encryption is integrated.
The invention has the technical effects that: through producing two sets of different deadline passwords, a set of deadline password can realize normally unblanking in the regulation deadline, and another group of deadline password can set up interim authorized fingerprint, recycles interim authorized fingerprint and unblanks at the fingerprint of deadline, has solved the trouble that all needs to input many passwords at every turn, and convenience of customers' use has promoted user experience more.
Drawings
FIG. 1 is a flow chart of a server according to the present invention;
fig. 2 is a schematic flow chart of a ue according to the present invention.
Detailed Description
The following detailed description of the embodiments of the present invention is provided in order to make the technical solution of the present invention easier to understand and understand.
Example 1:
as shown in fig. 1-2, a method of authoritatively setting a temporary fingerprint, comprising:
step 1: the management password comprises a user preset password and a selected deadline time which is counted in units of days according to the combination of the current standard time and the input management password at the server, the input user preset password, the current RTC timestamp and the set deadline time are taken, the ciphertext is integrated and encrypted into a ciphertext (integrated into password data), the ciphertext is converted into two sets of deadline passwords with 10 systems of multiple bits (generally 10 bits), the two sets of deadline passwords are respectively a deadline password I and a deadline password II and are published to the user, and the step 2 is entered;
step 2: inputting a deadline password III at a user end, carrying out decryption operation on the deadline password III at the user end, judging whether the deadline password III is consistent with an encrypted ciphertext of a deadline password I or a deadline password II, entering a step 3 when the deadline password III is consistent with the deadline password I, entering a step 4 when the deadline password III is consistent with the deadline password II, and proving that the input deadline password III is wrong when the deadline password III is inconsistent with the deadline password I and the deadline password II, closing a door lock and exiting an unlocking program;
and step 3: judging the timeliness of the time limit password III, judging the time limit contained in the time limit password III after decryption operation, opening the door lock when the time limit password III is in a specified time limit, otherwise, keeping the door lock closed, namely the input time limit password III exceeds the set time limit, and exiting the unlocking program;
and 4, step 4: judging the timeliness of the time limit password III, judging the time limit contained in the time limit password III after decryption operation, entering a step 5 when the time limit password III is in a specified time limit, otherwise, keeping the door lock closed, namely the input time limit password III exceeds the set time limit, and exiting the unlocking program;
and 5: starting temporary fingerprint password registration, enabling a user to input and store fingerprints to a user side to obtain a preset fingerprint password I, entering step 6, inputting a plurality of fingerprint passwords for multiple times, generally not more than 10 fingerprint passwords, by inputting a time limit password II corresponding to a time limit password III for multiple times, and then obtaining a plurality of preset fingerprint passwords;
step 6: the user inputs a fingerprint password II at a fingerprint input end of the user end, the fingerprint password II is judged at the user end, when the fingerprint password II is consistent with a preset fingerprint password I, the timeliness of the fingerprint password II is judged, when the fingerprint password II is within a specified time limit, the step 7 is carried out, otherwise, the door lock is kept closed;
and 7: and judging the timeliness of the fingerprint password II, and when the fingerprint password II is in a specified period, opening the door lock, otherwise, keeping the door lock closed, and exiting the unlocking program.
The term password corresponding to the term password i can be used an unlimited number of times within a predetermined time, but the predetermined time is in units of days.
The deadline password corresponding to the deadline password II can be called a deadline fingerprint authorization code, after the deadline fingerprint authorization code is generated, 10 fingerprints can be recorded at most in a specified time, but the specified time is in a day cooperation unit; the method is mainly used in occasions such as short renting or long renting apartments and the like, and is convenient for a user to use for multiple times.
Examples of the cryptosynthesis schemes of the deadline code I or the deadline code II include:
integrating the input user preset password, the timestamp of the current RTC and the set expiration time into password data: 4 bytes, 32 bits;
cipher text is 32 bits of data; 31. 30 two bits represent the password class;
00 temporary password
10 deadline fingerprint authorization code
11 deadline password
0-29Bit represents the quotient of division 4 of the timestamp of the current RTC, i.e., a timestamp in units of 4 seconds:
measuring and calculating: 30bit =0x3fffffff = (1073741823 × 4) seconds
15-29 bits represent the starting time and the time stamp in days;
0-14 represent the expiration time, time stamp in 1 hour;
measuring and calculating: starting time: 15bit =0x00007fff =32767 days/365 =89 years
Starting time: time of onset + (15 bit =0x00007fff =32767/24=1365 days/365) 3 years
Claims (5)
1. A method of authorizing the setting of a temporary fingerprint, comprising: the method comprises the following steps:
step 1: generating two groups of time limit passwords which are a time limit password I and a time limit password II respectively at the server side according to the combination of the current standard time and the input management password, and entering the step 2;
step 2: inputting a time limit password III at a user terminal, judging the time limit password III at the user terminal, judging whether the time limit password is a time limit password I or a time limit password II, entering a step 3 when the time limit password III is consistent with the time limit password I, entering a step 4 when the time limit password III is consistent with the time limit password II, and keeping a door lock closed when the time limit password III is inconsistent with the time limit password I and the time limit password II;
and step 3: judging the timeliness of the time limit password III, and when the time limit password III is in a specified time limit, opening the door lock, otherwise, keeping the door lock closed;
and 4, step 4: judging the timeliness of the time limit password III, entering the step 5 when the time limit password III is in a specified time limit, otherwise, keeping the door lock closed;
and 5: starting temporary fingerprint password registration, enabling a user to record and store a fingerprint to a user side to obtain a preset fingerprint password I, and entering the step 6;
step 6: the user inputs a fingerprint password II at a fingerprint input end of the user end, the fingerprint password II is judged at the user end, when the fingerprint password II is consistent with a preset fingerprint password I, the timeliness of the fingerprint password II is judged, when the fingerprint password II is within a specified time limit, the step 7 is carried out, otherwise, the door lock is kept closed;
and 7: and judging the timeliness of the fingerprint password II, and when the fingerprint password II is in a specified period, opening the door lock, otherwise, keeping the door lock closed.
2. A method of authorizing the setting of a temporary fingerprint according to claim 1, wherein: in step 1, the management password comprises a user preset password and a selected expiration time.
3. A method of authorizing the setting of a temporary fingerprint according to claim 2, wherein: the term is counted in days.
4. A method of authorizing the setting of a temporary fingerprint according to claim 1, wherein: in the step 1, the combination of the standard time and the management password is integrated and encrypted into a ciphertext, and then the ciphertext is converted into a multi-bit 10-system deadline password I and a multi-bit 10-system deadline password II.
5. A method of authorising the setting of a temporary fingerprint according to claim 4, wherein: when the time limit password III in the step 2 is judged with the time limit password I or the time limit password II, decryption operation needs to be carried out on the time limit password III, and consistency judgment needs to be carried out on the time limit password III and the time limit password I and the time limit password II before encryption is integrated.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210082525.9A CN114495330B (en) | 2022-01-24 | 2022-01-24 | Method for setting temporary fingerprint in authorization manner |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210082525.9A CN114495330B (en) | 2022-01-24 | 2022-01-24 | Method for setting temporary fingerprint in authorization manner |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114495330A true CN114495330A (en) | 2022-05-13 |
CN114495330B CN114495330B (en) | 2024-02-02 |
Family
ID=81474724
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210082525.9A Active CN114495330B (en) | 2022-01-24 | 2022-01-24 | Method for setting temporary fingerprint in authorization manner |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114495330B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101654994A (en) * | 2009-07-23 | 2010-02-24 | 樊宝璟 | Intelligent fingerprint security door |
JP2010229649A (en) * | 2009-03-26 | 2010-10-14 | Japan Research Institute Ltd | Electronic unlocking system, server, user terminal, electric lock terminal, and information processing method |
CN105430015A (en) * | 2015-12-30 | 2016-03-23 | 桂林市逸仙中学 | Dynamic password lock |
CN108510626A (en) * | 2018-02-23 | 2018-09-07 | 深圳同心科技有限公司 | A kind of dynamic password access control management method and its management system |
CN108932771A (en) * | 2018-05-23 | 2018-12-04 | 王力安防科技股份有限公司 | A kind of long-range temporary Authorization, method for unlocking and system |
CN109741500A (en) * | 2018-12-29 | 2019-05-10 | 北京方正数码有限公司 | A kind of setting of temporary password of smart lock and its verification method |
CN110838197A (en) * | 2019-11-18 | 2020-02-25 | 四川研宝科技有限公司 | Password verification method and device for unmanned hotel system |
-
2022
- 2022-01-24 CN CN202210082525.9A patent/CN114495330B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2010229649A (en) * | 2009-03-26 | 2010-10-14 | Japan Research Institute Ltd | Electronic unlocking system, server, user terminal, electric lock terminal, and information processing method |
CN101654994A (en) * | 2009-07-23 | 2010-02-24 | 樊宝璟 | Intelligent fingerprint security door |
CN105430015A (en) * | 2015-12-30 | 2016-03-23 | 桂林市逸仙中学 | Dynamic password lock |
CN108510626A (en) * | 2018-02-23 | 2018-09-07 | 深圳同心科技有限公司 | A kind of dynamic password access control management method and its management system |
CN108932771A (en) * | 2018-05-23 | 2018-12-04 | 王力安防科技股份有限公司 | A kind of long-range temporary Authorization, method for unlocking and system |
CN109741500A (en) * | 2018-12-29 | 2019-05-10 | 北京方正数码有限公司 | A kind of setting of temporary password of smart lock and its verification method |
CN110838197A (en) * | 2019-11-18 | 2020-02-25 | 四川研宝科技有限公司 | Password verification method and device for unmanned hotel system |
Also Published As
Publication number | Publication date |
---|---|
CN114495330B (en) | 2024-02-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100533456C (en) | Security code production method and methods of using the same, and programmable device therefor | |
KR100213188B1 (en) | Apparatus and method for user authentication | |
US9208491B2 (en) | Format-preserving cryptographic systems | |
DE60029390T2 (en) | Method and apparatus for encryption / decryption and identification systems | |
US11488134B2 (en) | Format-preserving cryptographic systems | |
US9306741B1 (en) | Updating keys for use in authentication | |
US20100111297A1 (en) | Format-preserving cryptographic systems | |
US8995655B2 (en) | Method for creating asymmetrical cryptographic key pairs | |
CN104683354B (en) | A kind of dynamic password system based on mark | |
CN110098923A (en) | A kind of method and apparatus of generation and verifying temporary password | |
CN108711209A (en) | dynamic password generation and verification method and system | |
CN106127905A (en) | A kind of electrical lock apparatus, system and method for unlocking thereof | |
CN100518411C (en) | Dynamic cipher system and method based on mobile communication terminal | |
CN101277182A (en) | Method for acquiring dynamic password based on public key architecture-user personal identification card | |
JP2010229649A (en) | Electronic unlocking system, server, user terminal, electric lock terminal, and information processing method | |
CN107958513A (en) | A kind of offline authorization method and system of electronic lock | |
CN114978525B (en) | BIM-based data security authentication method and system | |
CN111277405B (en) | Method for accessing intelligent device by using time-efficient password in semi-offline environment | |
US20020138740A1 (en) | Locked portal unlocking control apparatus and method | |
CN110570564A (en) | single-machine lock and control method thereof | |
CN107370733A (en) | A kind of intelligent lock management method based on Rijndael and ECC Hybrid Encryptions | |
CN114495330B (en) | Method for setting temporary fingerprint in authorization manner | |
JP3408228B2 (en) | Service providing device and recording medium | |
CN110298941A (en) | A kind of disposable temporary password generation method of intelligent door lock | |
JP2005196582A (en) | Data backup system, and data backup method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |