[go: up one dir, main page]

CN119007321A - Enterprise-level intelligent lock system based on electronic key issuing - Google Patents

Enterprise-level intelligent lock system based on electronic key issuing Download PDF

Info

Publication number
CN119007321A
CN119007321A CN202411487729.6A CN202411487729A CN119007321A CN 119007321 A CN119007321 A CN 119007321A CN 202411487729 A CN202411487729 A CN 202411487729A CN 119007321 A CN119007321 A CN 119007321A
Authority
CN
China
Prior art keywords
key
information
lock body
module
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202411487729.6A
Other languages
Chinese (zh)
Other versions
CN119007321B (en
Inventor
钟锐彬
王兆颖
杨文杰
李洪亮
汪波
季咏梅
邱泽南
施盛
龙凌波
沈晨曦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of Communications Co Ltd Anhui Branch
Original Assignee
Bank of Communications Co Ltd Anhui Branch
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of Communications Co Ltd Anhui Branch filed Critical Bank of Communications Co Ltd Anhui Branch
Priority to CN202411487729.6A priority Critical patent/CN119007321B/en
Publication of CN119007321A publication Critical patent/CN119007321A/en
Application granted granted Critical
Publication of CN119007321B publication Critical patent/CN119007321B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B2047/0048Circuits, feeding, monitoring
    • E05B2047/0057Feeding
    • E05B2047/0063Energy transfer from key to lock, e.g. for emergency opening
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00825Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

本发明公开了一种基于电子钥匙密钥签发的企业级智能锁系统,包括钥匙系统与锁体系统;所述钥匙系统用于与锁体系统进行匹配,并为锁体系统供电;所述锁体系统用于在通电,且钥匙系统与锁体系统匹配完成后,进行密匙验证,当密匙验证通过后,锁体系统运行完成开锁作业;所述钥匙系统包括供电模块、外挂功能模块、位置模块、连接模块、储存模块、数据处理模块与网络模块;所述供电模块用于进行为整个智能锁系统进行供电;所述外挂功能模块包括摄像头单元、指纹识别单元与网络连接单元;所述摄像头单元用于进行使用者影像采集获取使用者人脸影像信息。本发明能够实现更加准确的安全性更高的防护作业。

The present invention discloses an enterprise-level intelligent lock system based on electronic key key issuance, including a key system and a lock body system; the key system is used to match the lock body system and power the lock body system; the lock body system is used to perform key verification after power is turned on and the key system and the lock body system are matched. When the key verification is passed, the lock body system runs to complete the unlocking operation; the key system includes a power supply module, an external function module, a position module, a connection module, a storage module, a data processing module and a network module; the power supply module is used to power the entire intelligent lock system; the external function module includes a camera unit, a fingerprint recognition unit and a network connection unit; the camera unit is used to collect user images to obtain user face image information. The present invention can achieve more accurate and higher security protection operations.

Description

Enterprise-level intelligent lock system based on electronic key issuing
Technical Field
The invention relates to the field of intelligent locks, in particular to an enterprise-level intelligent lock system based on electronic key issuing.
Background
The unlocking process of the intelligent lock can be divided into three steps. And the first step of unlocking constraint downloading, namely, issuing control information of who unlocks when to unlock the lock or the key, and checking when to unlock the lock. And the second step of verification of unlocking constraint, namely verifying whether the biological characteristic information of an unlocking person is matched or whether the corresponding verification codes are consistent or not, verifying whether the unlocking person is unlocked within a specified time or not and the like when the unlocking is performed. And thirdly, performing unlocking mechanical operation, rotating a gear inside the lock cylinder, and releasing the lock beam by the lock tongue.
The common intelligent electronic lock is generally completed by only one lock body, and the downloading, verification and unlocking of unlocking constraint are completed in one lock. However, such electronic locks often have multiple motherboard modules, are bulky, and are self-contained or connected to a power source. Therefore, the mechanical lock core is far from the mechanical lock core, and cannot cover most of the application range of the mechanical lock, for example, a drawer for storing files, and therefore, the mechanical lock cannot consume extra manpower to charge regularly, and cannot be provided with a socket capable of providing power. Moreover, the lock has large volume, and the space condition required by additionally installing the lock is more harsh, thereby affecting the beauty. The electronic lock covers a larger range, and some entrance guard locks and the like can be directly plugged in or can intuitively observe the power supply condition and do not consider the situation of the limit of the installation space of the lock.
For this purpose, a passive lock scheme with an electronic key is more commonly used for the enterprise-level lock. The passive lock is a lockset without a power supply, and all operations of the lock cylinder are to provide power by conducting the current of the electronic key through the physical contact between the bolt of the electronic key and the lockset after the electronic key is inserted into the lockset. In addition, because the lockset has no power supply and cannot actively communicate with a background system to download unlocking constraint information, the lockset can further remove the communication module, become lighter, and further add the communication module onto the electronic key to replace the communication by the electronic key. Likewise, modules for unlocking constraint verification, such as fingerprint verification, password entry, etc., can also be migrated from the lock to the key. The size of the lock cylinder of the passive lock which is contacted at present is almost the same as that of a lock cylinder of a mechanical lock, and most of the scenes can be replaced.
However, the above technical scheme of matching the electronic key with the passive lock has a defect that the verification process of unlocking constraint is loosely coupled with the unlocking process in the actual lock core. In short, the verification of unlocking people and unlocking time is carried out in the electronic key, after the electronic key verifies unlocking constraint, an unlocking instruction is simply sent to the lockset, and the lockset drives the lock cylinder to unlock according to the unlocking instruction without any characteristic information serving as a security credential, so that the lockset is unsafe. The unlocking command is replayed or counterfeited, and even if the electric signal of the unlocking command is mastered, a key which can bypass unlocking verification can be manufactured completely to unlock. This is security breached.
The existing intelligent lock system is single in protection type, poor in protection effect and capable of bringing a certain influence to the use of the intelligent lock system, and therefore, the enterprise-level intelligent lock system based on electronic key issuing is provided.
Disclosure of Invention
The technical problems to be solved by the invention are as follows: how to solve the existing intelligent lock system, the protection type is single, the protection effect is poor, the problem that a certain influence is brought to the use of the intelligent lock system is solved, and an enterprise-level intelligent lock system based on electronic key issuing is provided.
The technical problems are solved by the following technical scheme, and the lock comprises a key system and a lock body system;
The key system is used for matching with the lock system and supplying power to the lock system;
The lock system is used for conducting key verification after the key system is matched with the lock system, and the lock system operates to complete unlocking operation after the key verification is passed;
the key system comprises a power supply module, an externally hung functional module, a position module, a connection module, a storage module, a data processing module and a network module;
the power supply module is used for supplying power for the whole intelligent lock system;
the plug-in function module comprises a camera unit, a fingerprint identification unit and a network connection unit;
the camera unit is used for acquiring images of a user to acquire facial image information of the user;
the fingerprint identification unit is used for collecting fingerprint information of a user;
The network connection unit is used for providing a network connection function for the intelligent lock system;
The position module is used for acquiring real-time position information of the key after power is supplied;
The connecting module is used for collecting the insertion compactness of the key;
the data processing module is used for processing fingerprint information, face image information, key real-time position information and insertion compactness to acquire identity verification information, position verification information and insertion prompt information;
the information sending module is used for sending the identity verification information, the position verification information and the insertion prompt information to the corresponding module or the receiving terminal;
The storage module stores key information, and when the authentication passes, the information sending module is allowed to send the key information in the storage module to the lock body system;
the lock system comprises a driving module, a decryption verification module, a self-checking module and a receiving module;
The receiving module is used for receiving the key information and importing the key information into the decryption verification module, the decryption verification module is used for decrypting the key information, and the decryption verification module generates control information to the driving module;
The driving module drives the lock body to unlock after receiving the control information;
The self-checking module is used for acquiring lock information when the lock is unlocked and sending the lock information to the data processing module of the key system;
And the data processing module processes the lock body information to generate lock body prompt information.
Further, the fingerprint information and the facial image information are verified simultaneously, and a user selects facial verification or fingerprint verification according to actual requirements;
The authentication information comprises authentication passing and authentication failure, and the specific processing process of the authentication information is as follows: the method comprises the steps that real-time fingerprint information collected by a fingerprint identification unit is extracted, a data processing module compares the real-time fingerprint information with fingerprints in a preset personnel database allowing a key to be used, identity authentication is generated to pass when the comparison is passed, a user is prompted to judge whether face authentication is performed or not when the comparison is not passed, and identity authentication failure is generated when the user selects not to perform face authentication;
When the user selects to perform face verification, the face image information collected by the camera unit is extracted, the face image information is compared with the face image in a preset personal database allowing the key to be used, the identity verification is generated after the comparison is passed, and the identity verification is failed after the comparison is not passed.
Further, when the user performs face authentication in advance, the user is not allowed to perform fingerprint authentication after the face authentication fails, authentication is performed by acquiring face information for the second time, and when the face information acquired again passes the authentication, the user is required to perform fingerprint authentication again, the fingerprint authentication passes the generation of identity authentication, and the fingerprint authentication fails to generate the identity authentication.
Further, the specific processing procedure of the location verification information is as follows: extracting position information acquired by a position module, wherein the position information is real-time position information of a key system, and generating position continuation information when the deviation between the real-time position information of the key system and a standard existing position of a preset key system exceeds a preset value;
When the key system is used for unlocking, the position information of the lock body system is acquired, and when the deviation between the real-time position information of the key system and the position information of the lock body system is larger than a preset value, the position verification information is generated.
Further, the specific process of inserting the prompt message is as follows: the collected insertion tightness is extracted, the insertion tightness is the pressure of the bottom end of a key of the key system and the bottom end inside a lock hole of the lock system, and when the pressure of the bottom end of the key system and the bottom end inside the lock hole of the lock system is smaller than a preset value, the insertion prompt information is generated.
The data processing module is used for processing the lock body information to generate lock body prompt information, and the specific processing process is as follows: extracting the acquired lock body information, wherein the lock body information comprises a time point when the lock body starts to be opened and a time point after the lock body is opened;
calculating the difference between the time point after the lock body is opened and the time point when the lock body is started to be opened, obtaining the lock body opening time length, and processing the lock body opening time length to obtain the lock body evaluation parameters;
and when the lock body evaluation parameters are abnormal, generating lock body prompt information.
Further, the lock body evaluation parameter acquiring process and the abnormality determining process are as follows: continuously collecting the opening time of the lock body for m times, obtaining m opening time of the lock body, then respectively calculating the difference value between the opening time of the lock body and the preset standard opening time, obtaining m evaluation differences, then extracting the quantity of the m evaluation differences which is larger than the preset value, namely obtaining the lock body evaluation parameter, and indicating that the lock body is abnormal when the lock body evaluation parameter is larger than the preset value.
Compared with the prior art, the invention has the following advantages: this enterprise-level intelligent lock system based on electronic key issue, through integrating the power supply of whole intelligent lock on the key, the realization is standardized the lock body, the trouble of customizing the cabinet body for the special-shaped lock body is purposely in order to adapt to, the trouble of wiring has also been saved, the aesthetic measure after the lock body installation has been guaranteed, and this intelligent lock system, before using the key to unblank the operation, need carry out multiple verification, and then can further promote the security, and multiple user's that does not use authentication's mode setting, the user's need of not using has been satisfied, and detect in the key insertion process, can know whether the key body inserts in place, and then avoid the situation emergence because the key body inserts unable use in place, and monitor the running state of lock body itself, the condition emergence that can be timely discover the lock body existence because the abnormal condition that leads to of the lock body is avoided, let this system more worth popularizing and using.
Drawings
FIG. 1 is a system block diagram of the present invention;
FIG. 2 is an overall block diagram of the key body of the present invention;
FIG. 3 is a diagram showing a key body and plug-in function module connection structure according to the present invention;
FIG. 4 is a diagram showing the structure of the present invention for connecting a protective sleeve to a key body;
fig. 5 is a diagram showing a structure of a key body and a lock body according to the present invention.
Detailed Description
The following describes in detail the examples of the present invention, which are implemented on the premise of the technical solution of the present invention, and detailed embodiments and specific operation procedures are given, but the scope of protection of the present invention is not limited to the following examples.
As shown in fig. 1 to 5, the present embodiment provides a technical solution: an enterprise-level intelligent lock system based on electronic key issuing comprises a key system and a lock body system;
the key system is used for matching with the lock system and supplying power to the lock system;
The lock system is used for conducting key verification after the key system is matched with the lock system, and the lock system operates to complete unlocking operation after the key verification is passed;
the key system comprises a power supply module, an externally hung functional module, a position module, a connection module, a storage module, a data processing module and a network module;
the power supply module is used for supplying power for the whole intelligent lock system;
The plug-in function module comprises a camera unit, a fingerprint identification unit and a network connection unit;
the camera unit is used for acquiring images of the user and acquiring facial image information of the user;
The fingerprint identification unit is used for collecting fingerprint information of a user;
The network connection unit is used for providing a network connection function for the intelligent lock system, namely, when the key system and the lock system in the intelligent lock system need to update the key or the certificate online, the network connection unit provides a network online function to update the related keys or certificates online;
The position module is used for acquiring real-time position information of the key after power is supplied;
The connecting module is used for collecting the insertion compactness of the key;
The data processing module is used for processing fingerprint information, face image information, key real-time position information and insertion compactness to acquire identity verification information, position verification information and insertion prompt information;
the information sending module is used for sending the identity verification information, the position verification information and the insertion prompt information to the corresponding module or the receiving terminal;
The storage module stores the key information, and when the authentication passes, the information sending module is allowed to send the key information in the storage module to the lock body system;
the lock system comprises a driving module, a decryption verification module, a self-checking module and a receiving module;
The receiving module is used for receiving the key information and importing the key information into the decryption verification module, the decryption verification module is used for decrypting the key information, and the decryption verification module generates control information to the driving module;
The driving module drives the lock body to unlock after receiving the control information;
The self-checking module is used for acquiring lock body information when the lock body is unlocked and transmitting the lock body information to the data processing module of the key system;
the data processing module processes the lock body information to generate lock body prompt information.
The key system is based on an electronic key, and the electronic key comprises a key body, a protective sleeve for protecting the key body and an annular externally-hung functional module sleeved on the key body;
a limiting block is arranged outside the key body and used for preventing the plug-in function module from sliding off;
The detachable battery is arranged in the key body to supply power and transmit electric energy to the key body, and the power supply module is the battery;
Electrode plates are arranged in grooves on the outer top end of the key body, electrode plates are arranged on the inner wall of the external function module, the electrode plates arranged on the inner wall of the external function module are inserted into the grooves, the external function module is electrified after the two groups of electrode plates are connected, and the electrode plates arranged on the inner wall of the external function module are inserted into the grooves so as to prevent the external function module from rotating;
The protective sleeve is sleeved outside the key body, and the key body is connected with the key body through a reset spring;
The door lock system is based on an intelligent lock body, a lock hole is formed in the surface of the intelligent lock body, electrode plates are arranged in the lock hole, the electrode plates are also arranged on the outer wall of the end part of the key body, which is inserted into the lock hole, the two groups of electrode plates are in contact with an internal battery of the key body to supply electric energy to the intelligent lock body, and power is supplied to each functional unit/module on the intelligent lock body;
When the end part of the key body is inserted into the lock hole formed in the surface of the intelligent lock body, the force is applied to the protective sleeve to displace backwards and pull the reset spring, and after the key is pulled out, the reset spring resets to bring the protective sleeve back to the initial position to protect the end part of the key body, so that accidents caused by contact between the electrode plate at the end part of the key body and the outside are avoided;
meanwhile, the fingerprint identification unit is arranged on one side of the outside of the plug-in function module, the camera unit is arranged on the other side of the outside of the plug-in function module, the fingerprint identification unit and the camera unit are symmetrically arranged, and when the plug-in function module is in actual use, one side of the camera unit is required to be kept upwards, and one side of the concentration of the fingerprint identification unit is downwards.
According to the intelligent lock system, the power supply of the whole intelligent lock is integrated on the key, so that the lock body is standardized, the trouble of specially customizing the cabinet body for adapting to the special-shaped lock body is avoided, the wiring trouble is avoided, the attractiveness of the lock body after installation is guaranteed, the intelligent lock system is required to be subjected to multiple verifications before unlocking operation by using the key, the safety is further improved, multiple unused user identity verification modes are set, the unused use requirement of a user is met, the detection is carried out in the key insertion process, whether the key body is inserted in place or not is known, the situation that the key body cannot be used in place is further avoided, the running state of the lock body is monitored, the abnormality of the lock body can be timely found, the situation that the lock body cannot be unlocked due to the abnormality is avoided, and the system is more worth popularizing.
The fingerprint information and the facial image information are verified simultaneously, and a user selects to conduct facial verification or fingerprint verification according to actual requirements;
The authentication information comprises authentication passing and authentication failure, and the specific processing process of the authentication information is as follows: the method comprises the steps that real-time fingerprint information collected by a fingerprint identification unit is extracted, a data processing module compares the real-time fingerprint information with fingerprints in a preset personnel database allowing a key to be used, identity authentication is generated to pass when the comparison is passed, a user is prompted to judge whether face authentication is performed or not when the comparison is not passed, and identity authentication failure is generated when the user selects not to perform face authentication;
When the user selects to perform face verification, the face image information collected by the camera unit is extracted, the face image information is compared with the face image in a preset personal database allowing the key to be used, the identity verification is generated after the comparison is passed, and the identity verification is failed after the comparison is not passed.
When the user first verifies the face, the face verification fails to allow the user to verify the face, the face information is required to be verified for the second time, when the face information acquired again passes the verification, the fingerprint verification is required to be performed again, the fingerprint verification passes the identity verification, and the identity verification fails to be generated after the fingerprint verification passes the identity verification;
after the identity verification fails, related prompt information is sent to a preset terminal to prompt a manager to verify the electronic key, and whether the verification key is held and used by a specified person or not is prompted.
The specific processing procedure of the position verification information is as follows: extracting position information acquired by a position module, wherein the position information is real-time position information of a key system, and generating position continuation information when the deviation between the real-time position information of the key system and a standard existing position of a preset key system exceeds a preset value;
When the key system is used for unlocking, position information of the lock body system is acquired again, and when the deviation between the real-time position information of the key system and the position information of the lock body system is larger than a preset value, position verification information is generated;
the position verification information is sent to a preset receiving terminal, prompts a manager to carry out verification of the electronic key, and verifies whether the key is held and used by a specified person.
The specific process of inserting the prompt information is as follows: extracting the collected insertion compactness, wherein the insertion compactness is the pressure of the key bottom end of the key system and the inner bottom end of the lock hole of the lock system, and when the pressure of the key bottom end of the key system and the inner bottom end of the lock hole of the lock system is smaller than a preset value, an insertion prompt message is generated;
the insertion prompt message is sent to the intelligent terminal of the user to prompt the user to adjust the key insertion depth.
The specific processing procedure of the data processing module for processing the lock body information to generate the lock body prompt information is as follows: extracting the acquired lock body information, wherein the lock body information comprises a time point when the lock body starts to be opened and a time point after the lock body is opened;
calculating the difference between the time point after the lock body is opened and the time point when the lock body is started to be opened, obtaining the lock body opening time length, and processing the lock body opening time length to obtain the lock body evaluation parameters;
When the lock body evaluation parameters are abnormal, generating lock body prompt information;
The lock body prompt information is sent to a preset receiving terminal to prompt a manager to maintain the lock body, so that the use of the lock body is prevented from being influenced by faults of the lock body.
The acquisition process and the abnormality judgment process of the lock body evaluation parameters are as follows: continuously acquiring m lock body opening time lengths, respectively calculating the difference value between the m lock body opening time lengths and the preset standard opening time lengths, acquiring m evaluation differences, extracting the number of the m evaluation differences which is larger than a preset value, namely acquiring lock body evaluation parameters, and acquiring more accurate evaluation parameters through the process when the lock body evaluation parameters are larger than the preset value, namely indicating that the lock body evaluation parameters are abnormal, wherein m is larger than or equal to 5, so that the accuracy of generating the lock body prompt information is ensured.
The verification and acquisition of the key and the generation process of the key are as follows:
Electronic key issuing by background system
The background system issues the electronic key, which is equivalent to the process of endorsing the electronic key by a background system, in other words, if the electronic key issued by the background system is the electronic key, the electronic key can be considered as a trusted electronic key at the lockset, and the lockset can safely receive the instruction sent by the electronic key. To implement this procedure we need to use an asymmetric key algorithm whose essence is that there is a pair of public and Private keys Pub and Private, public key Pub being publicly available to the owner, and Private key Private being known only to the owner himself. The things encrypted by the public key Pub can only be decrypted by the Private key Private, and the things encrypted by the Private key Private can also be decrypted and restored by the public key Pub (this can be used to verify whether the other party has the correct Private key, which can be called cryptographically verification).
The background system needs to have a pair of public and private keys server.pub and server.private for issuing keys, and the electronic key also needs to have a pair of public and private keys for marking the identities Key.pub and Key.private. A plurality of electronic keys have a plurality of different public and private keys (Key.pub1、Key.private1)、(Key.pub2、Key.private2)(Key.pub3、Key.private3)..............(Key.pub999、Key.private999)(Key.pubn、Key.privaten).
The so-called issuing process is that when the background system verifies that an electronic key is a trusted key (possibly by checking the serial code of the device in advance or by preparing the public key of the trusted device in advance), the background system encrypts the public key of the electronic key with its own private key server.
EncryptServer.private(Key.pubn)
The encrypted piece of things can be called a security certificate issued to the electronic key by a background system. The electronic key downloads and saves the certificate.
Because the public key can be distributed to anyone, the public key server. Pub of the background system can also be poured into the lock in advance. When the lockset checks the authenticity of the electronic key every time, a security certificate encryptor. The lockset decrypts the security certificate by using the public key of the background system to obtain the public key of the original electronic key, which is summarized as the following formula
Key.pubn =DecryptServer.pub(EncryptServer.private(Key.pubn))
The lockset only needs to compare whether the public key decrypted by the security certificate is consistent with the public key of the electronic key, so as to judge whether the electronic key is feasible or not and whether the electronic key is issued by a background system or not.
Interaction between electronic key and lockset
We have confirmed that the electronic key is issued by the security system, which is the public key. The interaction between the electronic key and the lock can be performed on the basis of the pair of public and private keys. The interaction needs to use a Symmetric encryption algorithm, and the encryption and decryption of the Symmetric encrypted ciphertext can be completed by using a Symmetric key symmetry, so that the security and the safety of the Symmetric encryption depend on the Symmetric key symmetry to achieve confidentiality and no leakage.
Each time the electronic key is to send an instruction to the lock, a randomly generated symmetric key lock is firstly queried to the lock. The lockset encrypts a private key. Pub of the electronic key and then transmits the electronic key, and the formula is summarized as follows:
EncryptKey.pub(Lock.symmetric)
This symmetric key can then only be obtained by decrypting the electronic key with its own private key, summarized as the following formula
Lock.symmetric = DecryptKey.private(EncryptKey.pub(Lock.symmetric))
After the electronic key obtains the symmetric key, lock. Symmetry, all instructions of the electronic key to the lockset are encrypted by the symmetric key and then transmitted to the lockset, and the following formula is summarized:
EncryptLock.symmetic(instruction)
The lockset can decrypt and obtain the corresponding instruction by using the symmetric key agreed in advance and execute the instruction, and the instruction is summarized as the following formula:
DecryptLock.symmetic(EncryptLock.symmetic(instruction))
Therefore, the interaction between the electronic key and the lockset can be ensured to prevent replay, falsification and interception.
Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In the description of the present invention, the meaning of "plurality" means at least two, for example, two, three, etc., unless specifically defined otherwise.
In the description of the present specification, a description referring to terms "one embodiment," "some embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present invention. In this specification, schematic representations of the above terms are not necessarily directed to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, the different embodiments or examples described in this specification and the features of the different embodiments or examples may be combined and combined by those skilled in the art without contradiction.
While embodiments of the present invention have been shown and described above, it will be understood that the above embodiments are illustrative and not to be construed as limiting the invention, and that variations, modifications, alternatives and variations may be made to the above embodiments by one of ordinary skill in the art within the scope of the invention.

Claims (7)

1.一种基于电子钥匙密钥签发的企业级智能锁系统,其特征在于,包括钥匙系统与锁体系统;1. An enterprise-level smart lock system based on electronic key issuance, characterized by comprising a key system and a lock body system; 所述钥匙系统用于与锁体系统进行匹配,并为锁体系统供电;The key system is used to match the lock system and provide power to the lock system; 所述锁体系统用于在通电,且钥匙系统与锁体系统匹配完成后,进行密匙验证,当密匙验证通过后,锁体系统运行完成开锁作业;The lock system is used to perform key verification after power is turned on and the key system and the lock system are matched. When the key verification is passed, the lock system runs to complete the unlocking operation; 所述钥匙系统包括供电模块、外挂功能模块、位置模块、连接模块、储存模块、数据处理模块与网络模块;The key system includes a power supply module, an external function module, a location module, a connection module, a storage module, a data processing module and a network module; 所述供电模块用于进行为整个智能锁系统进行供电;The power supply module is used to supply power to the entire smart lock system; 所述外挂功能模块包括摄像头单元、指纹识别单元与网络连接单元;The external function module includes a camera unit, a fingerprint recognition unit and a network connection unit; 所述摄像头单元用于进行使用者影像采集获取使用者人脸影像信息;The camera unit is used to collect user images and obtain user face image information; 所述指纹识别单元用于采集使用者的指纹信息;The fingerprint recognition unit is used to collect fingerprint information of the user; 所述网络连接单元用于为智能锁系统提供网络连接功能;The network connection unit is used to provide a network connection function for the smart lock system; 所述位置模块用于在供电后采集钥匙实时位置信息;The position module is used to collect the real-time position information of the key after power is supplied; 所述连接模块用于采集钥匙的插入紧密度;The connection module is used to collect the insertion tightness of the key; 所述数据处理模块用于对指纹信息、人脸影像信息、钥匙实时位置信息与插入紧密度进行处理,获取到身份验证信息、位置验证信息与插入提示信息;The data processing module is used to process fingerprint information, face image information, key real-time position information and insertion tightness, and obtain identity verification information, position verification information and insertion prompt information; 所述信息发送模块用于将身份验证信息、位置验证信息与插入提示信息发送到对应模块或接收终端;The information sending module is used to send identity verification information, location verification information and insertion prompt information to a corresponding module or a receiving terminal; 所述储存模块储存了密匙信息,当身份验证通过为身份验证通过时允许所述信息发送模块用于将储存模块中的密匙信息发送到锁体系统;The storage module stores key information, and when the identity authentication is passed, the information sending module is allowed to send the key information in the storage module to the lock body system; 所述锁体系统包括驱动模块、解密验证模块、自检模块与接收模块;The lock system includes a driving module, a decryption and verification module, a self-checking module and a receiving module; 所述接收模块用于接收密匙信息,并将密匙信息导入到解密验证模块,所述解密验证模块用于对密匙信息进行解密,解密验证通过生成控制信息到驱动模块;The receiving module is used to receive key information and import the key information into the decryption verification module, and the decryption verification module is used to decrypt the key information, and the decryption verification generates control information to the driving module; 所述驱动模块接收到控制信息后驱动锁体解锁;The driving module drives the lock body to unlock after receiving the control information; 所述自检模块用于在锁体解锁时进行锁体信息采集,并将锁体信息发送钥匙系统的数据处理模块;The self-check module is used to collect lock body information when the lock body is unlocked, and send the lock body information to the data processing module of the key system; 所述数据处理模块对锁体信息进行处理生成锁体提示信息。The data processing module processes the lock body information to generate lock body prompt information. 2.根据权利要求1所述的一种基于电子钥匙密钥签发的企业级智能锁系统,其特征在于:所述指纹信息与人脸影像信息的验证同时只进行一个,用户根据实际需求选择进行人脸验证或者指纹验证;2. According to claim 1, an enterprise-level smart lock system based on electronic key issuance is characterized in that: the verification of the fingerprint information and the facial image information is only performed at the same time, and the user can choose to perform facial verification or fingerprint verification according to actual needs; 身份验证信息包括身份验证通过和身份验证失败,身份验证信息的具体处理过程如下:提取出指纹识别单元采集到的实时指纹信息,数据处理模块将实时指纹信息与预设的允许使用钥匙的人员数据库中的指纹进行比对,比对通过时,即生成身份验证通过,比对不通过时,即提示用户是否进行人脸验证,当用户选择不进行人脸验证时,即生成身份验证失败;The identity verification information includes identity verification passed and identity verification failed. The specific processing process of the identity verification information is as follows: extract the real-time fingerprint information collected by the fingerprint recognition unit, and the data processing module compares the real-time fingerprint information with the fingerprints in the preset database of personnel allowed to use the key. If the comparison is passed, the identity verification passed is generated. If the comparison is not passed, the user is prompted whether to perform face verification. When the user chooses not to perform face verification, the identity verification failed is generated; 当用户选择进行人脸验证时,即提取出摄像头单元采集的人脸影像信息,将人脸影像信息与预设的允许使用钥匙的人员数据库中的人脸影像进行比对,比对通过即生成身份验证通过,比对不通过即生成身份验证失败。When the user chooses to perform face verification, the facial image information collected by the camera unit is extracted, and the facial image information is compared with the facial images in the preset database of people allowed to use the key. If the comparison is successful, the identity verification is passed, and if the comparison fails, the identity verification fails. 3.根据权利要求2所述的一种基于电子钥匙密钥签发的企业级智能锁系统,其特征在于:当用户先进行人脸验证时,人脸验证失败即不允许其进行指纹验证,需二次进行验证人脸信息采集进行验证,当再次采集到的人脸信息验证通过后,即需要再进行指纹验证,指纹验证通过生成身份验证通过,指纹验证失败即生成身份验证失败。3. According to claim 2, an enterprise-level smart lock system based on electronic key key issuance is characterized in that: when the user first performs face verification, if the face verification fails, the user is not allowed to perform fingerprint verification, and a second face information collection is required for verification. When the face information collected again is verified, fingerprint verification is required again. If the fingerprint verification passes, an identity verification pass is generated, and if the fingerprint verification fails, an identity verification failure is generated. 4.根据权利要求1所述的一种基于电子钥匙密钥签发的企业级智能锁系统,其特征在于:所述位置验证信息的具体处理过程如下:提取出位置模块采集到的位置信息,位置信息为钥匙系统的实时位置信息,当钥匙系统的实时位置信息与预设的钥匙系统的标准存在位置的偏差超过预设值时,即生成位置延续信息;4. According to claim 1, an enterprise-level smart lock system based on electronic key key issuance is characterized in that: the specific processing process of the position verification information is as follows: extracting the position information collected by the position module, the position information is the real-time position information of the key system, when the deviation between the real-time position information of the key system and the preset standard position of the key system exceeds a preset value, generating position continuation information; 当使用钥匙系统解锁时,再采集锁体系统的位置信息,当钥匙系统的实时位置信息与锁体系统的位置信息偏差大于预设值时,即生成位置验证信息。When the key system is used to unlock the door, the location information of the lock body system is collected. When the deviation between the real-time location information of the key system and the location information of the lock body system is greater than a preset value, location verification information is generated. 5.根据权利要求1所述的一种基于电子钥匙密钥签发的企业级智能锁系统,其特征在于:所述插入提示信息的具体过程如下:提取出采集到的插入紧密度,插入紧密度为钥匙系统的钥匙底端与锁体系统锁孔内部底端的压力大小,当钥匙系统的钥匙底端与锁体系统锁孔内部底端的压力大小小于预设值时,即生成插入提示信息。5. According to claim 1, an enterprise-level smart lock system based on electronic key issuance is characterized in that the specific process of inserting the prompt information is as follows: the collected insertion tightness is extracted, and the insertion tightness is the pressure between the bottom end of the key of the key system and the bottom end of the lock hole of the lock body system. When the pressure between the bottom end of the key of the key system and the bottom end of the lock hole of the lock body system is less than a preset value, the insertion prompt information is generated. 6.根据权利要求1所述的一种基于电子钥匙密钥签发的企业级智能锁系统,其特征在于:所述数据处理模块对锁体信息进行处理生成锁体提示信息的具体处理过程如下:提取出采集到的锁体信息,锁体信息包括锁体开始开启的时间点与锁体开启完成后的时间点;6. According to claim 1, an enterprise-level smart lock system based on electronic key issuance is characterized in that: the specific processing process of the data processing module processing the lock body information to generate the lock body prompt information is as follows: extracting the collected lock body information, the lock body information including the time point when the lock body starts to be opened and the time point when the lock body is opened; 计算出锁体开启完成后的时间点与锁体开始开启的时间点的差值,获取到锁体开启时长,多少锁体开启时长进行处理获取到锁体评估参数;Calculate the difference between the time point after the lock body is opened and the time point when the lock body starts to be opened, obtain the lock body opening time, and process the lock body opening time to obtain the lock body evaluation parameter; 当锁体评估参数异常时,即生成锁体提示信息。When the lock body evaluation parameters are abnormal, a lock body prompt message is generated. 7.根据权利要求6所述的一种基于电子钥匙密钥签发的企业级智能锁系统,其特征在于:所述锁体评估参数的获取过程与异常判定过程如下:连续采集m次锁体开启时长,获取m个锁体开启时长,之后分别计算出m个锁体开启时长与预设的标准开启时长的差值,获取到m个评估差,之后提取出m个评估差中大于预设值的数量,即获取到锁体评估参数,当锁体评估参数大于预设值时,即表示其存在异常。7. According to claim 6, an enterprise-level smart lock system based on electronic key key issuance is characterized in that: the process of obtaining the lock body evaluation parameter and the abnormality judgment process are as follows: continuously collect m lock body opening time lengths to obtain m lock body opening time lengths, and then calculate the difference between the m lock body opening time lengths and the preset standard opening time lengths respectively to obtain m evaluation differences, and then extract the number of m evaluation differences that are greater than the preset value, that is, obtain the lock body evaluation parameter. When the lock body evaluation parameter is greater than the preset value, it indicates that there is an abnormality.
CN202411487729.6A 2024-10-24 2024-10-24 An enterprise-level smart lock system based on electronic key issuance Active CN119007321B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202411487729.6A CN119007321B (en) 2024-10-24 2024-10-24 An enterprise-level smart lock system based on electronic key issuance

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202411487729.6A CN119007321B (en) 2024-10-24 2024-10-24 An enterprise-level smart lock system based on electronic key issuance

Publications (2)

Publication Number Publication Date
CN119007321A true CN119007321A (en) 2024-11-22
CN119007321B CN119007321B (en) 2025-04-04

Family

ID=93470792

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202411487729.6A Active CN119007321B (en) 2024-10-24 2024-10-24 An enterprise-level smart lock system based on electronic key issuance

Country Status (1)

Country Link
CN (1) CN119007321B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201310241Y (en) * 2008-12-05 2009-09-16 李云刚 Lock for identifying key identity
WO2014132211A1 (en) * 2013-02-28 2014-09-04 Smart Locking Logic (Pty) Ltd An electronic smart key, system and method for controlling and operating a lock
CN106296897A (en) * 2016-08-01 2017-01-04 电子科技大学 The intelligent active electronic key of finger print identifying and passive smart lock and its implementation
CN108222678A (en) * 2016-12-22 2018-06-29 芯讯通无线科技(上海)有限公司 Smart lock
CN111997445A (en) * 2020-08-05 2020-11-27 安徽工程大学 Passive lock, key, cloud server, passive lock system and unlocking method thereof
CN112509181A (en) * 2020-10-30 2021-03-16 广东亚太天能科技股份有限公司 Intelligent door lock and identification mode switching method thereof
CN116912979A (en) * 2023-07-04 2023-10-20 中国移动通信集团黑龙江有限公司 Intelligent door lock control method and device and electronic equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201310241Y (en) * 2008-12-05 2009-09-16 李云刚 Lock for identifying key identity
WO2014132211A1 (en) * 2013-02-28 2014-09-04 Smart Locking Logic (Pty) Ltd An electronic smart key, system and method for controlling and operating a lock
CN106296897A (en) * 2016-08-01 2017-01-04 电子科技大学 The intelligent active electronic key of finger print identifying and passive smart lock and its implementation
CN108222678A (en) * 2016-12-22 2018-06-29 芯讯通无线科技(上海)有限公司 Smart lock
CN111997445A (en) * 2020-08-05 2020-11-27 安徽工程大学 Passive lock, key, cloud server, passive lock system and unlocking method thereof
CN112509181A (en) * 2020-10-30 2021-03-16 广东亚太天能科技股份有限公司 Intelligent door lock and identification mode switching method thereof
CN116912979A (en) * 2023-07-04 2023-10-20 中国移动通信集团黑龙江有限公司 Intelligent door lock control method and device and electronic equipment

Also Published As

Publication number Publication date
CN119007321B (en) 2025-04-04

Similar Documents

Publication Publication Date Title
US20110084799A1 (en) Lock system including an electronic key and a passive lock
CN109410406B (en) Authorization method, device and system
JP6408549B2 (en) RFID secure authentication
US8799670B2 (en) Biometric authentication method, computer program, authentication server, corresponding terminal and portable object
US6778066B2 (en) Personal identification badge that resets on the removal of the badge from the wearer
EP2434462B1 (en) Biometric key
US8070061B2 (en) Card credential method and system
US8407480B2 (en) Methods for secure enrollment and backup of personal identity credentials into electronic devices
CN107038777A (en) A kind of safety communicating method and its intelligent door lock system based on intelligent door lock system
CN111599048A (en) Dynamic coded lock with multiple unlocking modes and management system
CN110310406A (en) Unlocking method of intelligent door lock and intelligent door lock
CN106292646B (en) A system and method for monitoring data port of power grid control terminal
CN113971849A (en) Dynamic coded lock with management system
CN107995985B (en) Financial payment terminal activation method and system
CN113312606B (en) Activation method, device and system of electronic atomization device, authentication end and battery rod
CN112425116A (en) Intelligent door lock wireless communication method, intelligent door lock, gateway and communication equipment
CN119007321B (en) An enterprise-level smart lock system based on electronic key issuance
CN113468505B (en) Anti-counterfeiting method, device, system, authentication terminal and battery rod of atomizer assembly
CN113963464A (en) Bank safe deposit box unlocking system and method based on block chain
CN219626064U (en) Electronic lock and unlocking system
CN208272988U (en) A kind of coding lock system and device
JPH1079732A (en) Network security system and method therefor
JP2005036394A (en) User authentication system
CN112507355B (en) Personal health data storage system based on block chain
JP2013161104A (en) System, apparatus, and method for biometric authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant