Disclosure of Invention
The technical problems to be solved by the invention are as follows: how to solve the existing intelligent lock system, the protection type is single, the protection effect is poor, the problem that a certain influence is brought to the use of the intelligent lock system is solved, and an enterprise-level intelligent lock system based on electronic key issuing is provided.
The technical problems are solved by the following technical scheme, and the lock comprises a key system and a lock body system;
The key system is used for matching with the lock system and supplying power to the lock system;
The lock system is used for conducting key verification after the key system is matched with the lock system, and the lock system operates to complete unlocking operation after the key verification is passed;
the key system comprises a power supply module, an externally hung functional module, a position module, a connection module, a storage module, a data processing module and a network module;
the power supply module is used for supplying power for the whole intelligent lock system;
the plug-in function module comprises a camera unit, a fingerprint identification unit and a network connection unit;
the camera unit is used for acquiring images of a user to acquire facial image information of the user;
the fingerprint identification unit is used for collecting fingerprint information of a user;
The network connection unit is used for providing a network connection function for the intelligent lock system;
The position module is used for acquiring real-time position information of the key after power is supplied;
The connecting module is used for collecting the insertion compactness of the key;
the data processing module is used for processing fingerprint information, face image information, key real-time position information and insertion compactness to acquire identity verification information, position verification information and insertion prompt information;
the information sending module is used for sending the identity verification information, the position verification information and the insertion prompt information to the corresponding module or the receiving terminal;
The storage module stores key information, and when the authentication passes, the information sending module is allowed to send the key information in the storage module to the lock body system;
the lock system comprises a driving module, a decryption verification module, a self-checking module and a receiving module;
The receiving module is used for receiving the key information and importing the key information into the decryption verification module, the decryption verification module is used for decrypting the key information, and the decryption verification module generates control information to the driving module;
The driving module drives the lock body to unlock after receiving the control information;
The self-checking module is used for acquiring lock information when the lock is unlocked and sending the lock information to the data processing module of the key system;
And the data processing module processes the lock body information to generate lock body prompt information.
Further, the fingerprint information and the facial image information are verified simultaneously, and a user selects facial verification or fingerprint verification according to actual requirements;
The authentication information comprises authentication passing and authentication failure, and the specific processing process of the authentication information is as follows: the method comprises the steps that real-time fingerprint information collected by a fingerprint identification unit is extracted, a data processing module compares the real-time fingerprint information with fingerprints in a preset personnel database allowing a key to be used, identity authentication is generated to pass when the comparison is passed, a user is prompted to judge whether face authentication is performed or not when the comparison is not passed, and identity authentication failure is generated when the user selects not to perform face authentication;
When the user selects to perform face verification, the face image information collected by the camera unit is extracted, the face image information is compared with the face image in a preset personal database allowing the key to be used, the identity verification is generated after the comparison is passed, and the identity verification is failed after the comparison is not passed.
Further, when the user performs face authentication in advance, the user is not allowed to perform fingerprint authentication after the face authentication fails, authentication is performed by acquiring face information for the second time, and when the face information acquired again passes the authentication, the user is required to perform fingerprint authentication again, the fingerprint authentication passes the generation of identity authentication, and the fingerprint authentication fails to generate the identity authentication.
Further, the specific processing procedure of the location verification information is as follows: extracting position information acquired by a position module, wherein the position information is real-time position information of a key system, and generating position continuation information when the deviation between the real-time position information of the key system and a standard existing position of a preset key system exceeds a preset value;
When the key system is used for unlocking, the position information of the lock body system is acquired, and when the deviation between the real-time position information of the key system and the position information of the lock body system is larger than a preset value, the position verification information is generated.
Further, the specific process of inserting the prompt message is as follows: the collected insertion tightness is extracted, the insertion tightness is the pressure of the bottom end of a key of the key system and the bottom end inside a lock hole of the lock system, and when the pressure of the bottom end of the key system and the bottom end inside the lock hole of the lock system is smaller than a preset value, the insertion prompt information is generated.
The data processing module is used for processing the lock body information to generate lock body prompt information, and the specific processing process is as follows: extracting the acquired lock body information, wherein the lock body information comprises a time point when the lock body starts to be opened and a time point after the lock body is opened;
calculating the difference between the time point after the lock body is opened and the time point when the lock body is started to be opened, obtaining the lock body opening time length, and processing the lock body opening time length to obtain the lock body evaluation parameters;
and when the lock body evaluation parameters are abnormal, generating lock body prompt information.
Further, the lock body evaluation parameter acquiring process and the abnormality determining process are as follows: continuously collecting the opening time of the lock body for m times, obtaining m opening time of the lock body, then respectively calculating the difference value between the opening time of the lock body and the preset standard opening time, obtaining m evaluation differences, then extracting the quantity of the m evaluation differences which is larger than the preset value, namely obtaining the lock body evaluation parameter, and indicating that the lock body is abnormal when the lock body evaluation parameter is larger than the preset value.
Compared with the prior art, the invention has the following advantages: this enterprise-level intelligent lock system based on electronic key issue, through integrating the power supply of whole intelligent lock on the key, the realization is standardized the lock body, the trouble of customizing the cabinet body for the special-shaped lock body is purposely in order to adapt to, the trouble of wiring has also been saved, the aesthetic measure after the lock body installation has been guaranteed, and this intelligent lock system, before using the key to unblank the operation, need carry out multiple verification, and then can further promote the security, and multiple user's that does not use authentication's mode setting, the user's need of not using has been satisfied, and detect in the key insertion process, can know whether the key body inserts in place, and then avoid the situation emergence because the key body inserts unable use in place, and monitor the running state of lock body itself, the condition emergence that can be timely discover the lock body existence because the abnormal condition that leads to of the lock body is avoided, let this system more worth popularizing and using.
Detailed Description
The following describes in detail the examples of the present invention, which are implemented on the premise of the technical solution of the present invention, and detailed embodiments and specific operation procedures are given, but the scope of protection of the present invention is not limited to the following examples.
As shown in fig. 1 to 5, the present embodiment provides a technical solution: an enterprise-level intelligent lock system based on electronic key issuing comprises a key system and a lock body system;
the key system is used for matching with the lock system and supplying power to the lock system;
The lock system is used for conducting key verification after the key system is matched with the lock system, and the lock system operates to complete unlocking operation after the key verification is passed;
the key system comprises a power supply module, an externally hung functional module, a position module, a connection module, a storage module, a data processing module and a network module;
the power supply module is used for supplying power for the whole intelligent lock system;
The plug-in function module comprises a camera unit, a fingerprint identification unit and a network connection unit;
the camera unit is used for acquiring images of the user and acquiring facial image information of the user;
The fingerprint identification unit is used for collecting fingerprint information of a user;
The network connection unit is used for providing a network connection function for the intelligent lock system, namely, when the key system and the lock system in the intelligent lock system need to update the key or the certificate online, the network connection unit provides a network online function to update the related keys or certificates online;
The position module is used for acquiring real-time position information of the key after power is supplied;
The connecting module is used for collecting the insertion compactness of the key;
The data processing module is used for processing fingerprint information, face image information, key real-time position information and insertion compactness to acquire identity verification information, position verification information and insertion prompt information;
the information sending module is used for sending the identity verification information, the position verification information and the insertion prompt information to the corresponding module or the receiving terminal;
The storage module stores the key information, and when the authentication passes, the information sending module is allowed to send the key information in the storage module to the lock body system;
the lock system comprises a driving module, a decryption verification module, a self-checking module and a receiving module;
The receiving module is used for receiving the key information and importing the key information into the decryption verification module, the decryption verification module is used for decrypting the key information, and the decryption verification module generates control information to the driving module;
The driving module drives the lock body to unlock after receiving the control information;
The self-checking module is used for acquiring lock body information when the lock body is unlocked and transmitting the lock body information to the data processing module of the key system;
the data processing module processes the lock body information to generate lock body prompt information.
The key system is based on an electronic key, and the electronic key comprises a key body, a protective sleeve for protecting the key body and an annular externally-hung functional module sleeved on the key body;
a limiting block is arranged outside the key body and used for preventing the plug-in function module from sliding off;
The detachable battery is arranged in the key body to supply power and transmit electric energy to the key body, and the power supply module is the battery;
Electrode plates are arranged in grooves on the outer top end of the key body, electrode plates are arranged on the inner wall of the external function module, the electrode plates arranged on the inner wall of the external function module are inserted into the grooves, the external function module is electrified after the two groups of electrode plates are connected, and the electrode plates arranged on the inner wall of the external function module are inserted into the grooves so as to prevent the external function module from rotating;
The protective sleeve is sleeved outside the key body, and the key body is connected with the key body through a reset spring;
The door lock system is based on an intelligent lock body, a lock hole is formed in the surface of the intelligent lock body, electrode plates are arranged in the lock hole, the electrode plates are also arranged on the outer wall of the end part of the key body, which is inserted into the lock hole, the two groups of electrode plates are in contact with an internal battery of the key body to supply electric energy to the intelligent lock body, and power is supplied to each functional unit/module on the intelligent lock body;
When the end part of the key body is inserted into the lock hole formed in the surface of the intelligent lock body, the force is applied to the protective sleeve to displace backwards and pull the reset spring, and after the key is pulled out, the reset spring resets to bring the protective sleeve back to the initial position to protect the end part of the key body, so that accidents caused by contact between the electrode plate at the end part of the key body and the outside are avoided;
meanwhile, the fingerprint identification unit is arranged on one side of the outside of the plug-in function module, the camera unit is arranged on the other side of the outside of the plug-in function module, the fingerprint identification unit and the camera unit are symmetrically arranged, and when the plug-in function module is in actual use, one side of the camera unit is required to be kept upwards, and one side of the concentration of the fingerprint identification unit is downwards.
According to the intelligent lock system, the power supply of the whole intelligent lock is integrated on the key, so that the lock body is standardized, the trouble of specially customizing the cabinet body for adapting to the special-shaped lock body is avoided, the wiring trouble is avoided, the attractiveness of the lock body after installation is guaranteed, the intelligent lock system is required to be subjected to multiple verifications before unlocking operation by using the key, the safety is further improved, multiple unused user identity verification modes are set, the unused use requirement of a user is met, the detection is carried out in the key insertion process, whether the key body is inserted in place or not is known, the situation that the key body cannot be used in place is further avoided, the running state of the lock body is monitored, the abnormality of the lock body can be timely found, the situation that the lock body cannot be unlocked due to the abnormality is avoided, and the system is more worth popularizing.
The fingerprint information and the facial image information are verified simultaneously, and a user selects to conduct facial verification or fingerprint verification according to actual requirements;
The authentication information comprises authentication passing and authentication failure, and the specific processing process of the authentication information is as follows: the method comprises the steps that real-time fingerprint information collected by a fingerprint identification unit is extracted, a data processing module compares the real-time fingerprint information with fingerprints in a preset personnel database allowing a key to be used, identity authentication is generated to pass when the comparison is passed, a user is prompted to judge whether face authentication is performed or not when the comparison is not passed, and identity authentication failure is generated when the user selects not to perform face authentication;
When the user selects to perform face verification, the face image information collected by the camera unit is extracted, the face image information is compared with the face image in a preset personal database allowing the key to be used, the identity verification is generated after the comparison is passed, and the identity verification is failed after the comparison is not passed.
When the user first verifies the face, the face verification fails to allow the user to verify the face, the face information is required to be verified for the second time, when the face information acquired again passes the verification, the fingerprint verification is required to be performed again, the fingerprint verification passes the identity verification, and the identity verification fails to be generated after the fingerprint verification passes the identity verification;
after the identity verification fails, related prompt information is sent to a preset terminal to prompt a manager to verify the electronic key, and whether the verification key is held and used by a specified person or not is prompted.
The specific processing procedure of the position verification information is as follows: extracting position information acquired by a position module, wherein the position information is real-time position information of a key system, and generating position continuation information when the deviation between the real-time position information of the key system and a standard existing position of a preset key system exceeds a preset value;
When the key system is used for unlocking, position information of the lock body system is acquired again, and when the deviation between the real-time position information of the key system and the position information of the lock body system is larger than a preset value, position verification information is generated;
the position verification information is sent to a preset receiving terminal, prompts a manager to carry out verification of the electronic key, and verifies whether the key is held and used by a specified person.
The specific process of inserting the prompt information is as follows: extracting the collected insertion compactness, wherein the insertion compactness is the pressure of the key bottom end of the key system and the inner bottom end of the lock hole of the lock system, and when the pressure of the key bottom end of the key system and the inner bottom end of the lock hole of the lock system is smaller than a preset value, an insertion prompt message is generated;
the insertion prompt message is sent to the intelligent terminal of the user to prompt the user to adjust the key insertion depth.
The specific processing procedure of the data processing module for processing the lock body information to generate the lock body prompt information is as follows: extracting the acquired lock body information, wherein the lock body information comprises a time point when the lock body starts to be opened and a time point after the lock body is opened;
calculating the difference between the time point after the lock body is opened and the time point when the lock body is started to be opened, obtaining the lock body opening time length, and processing the lock body opening time length to obtain the lock body evaluation parameters;
When the lock body evaluation parameters are abnormal, generating lock body prompt information;
The lock body prompt information is sent to a preset receiving terminal to prompt a manager to maintain the lock body, so that the use of the lock body is prevented from being influenced by faults of the lock body.
The acquisition process and the abnormality judgment process of the lock body evaluation parameters are as follows: continuously acquiring m lock body opening time lengths, respectively calculating the difference value between the m lock body opening time lengths and the preset standard opening time lengths, acquiring m evaluation differences, extracting the number of the m evaluation differences which is larger than a preset value, namely acquiring lock body evaluation parameters, and acquiring more accurate evaluation parameters through the process when the lock body evaluation parameters are larger than the preset value, namely indicating that the lock body evaluation parameters are abnormal, wherein m is larger than or equal to 5, so that the accuracy of generating the lock body prompt information is ensured.
The verification and acquisition of the key and the generation process of the key are as follows:
Electronic key issuing by background system
The background system issues the electronic key, which is equivalent to the process of endorsing the electronic key by a background system, in other words, if the electronic key issued by the background system is the electronic key, the electronic key can be considered as a trusted electronic key at the lockset, and the lockset can safely receive the instruction sent by the electronic key. To implement this procedure we need to use an asymmetric key algorithm whose essence is that there is a pair of public and Private keys Pub and Private, public key Pub being publicly available to the owner, and Private key Private being known only to the owner himself. The things encrypted by the public key Pub can only be decrypted by the Private key Private, and the things encrypted by the Private key Private can also be decrypted and restored by the public key Pub (this can be used to verify whether the other party has the correct Private key, which can be called cryptographically verification).
The background system needs to have a pair of public and private keys server.pub and server.private for issuing keys, and the electronic key also needs to have a pair of public and private keys for marking the identities Key.pub and Key.private. A plurality of electronic keys have a plurality of different public and private keys (Key.pub1、Key.private1)、(Key.pub2、Key.private2)(Key.pub3、Key.private3)..............(Key.pub999、Key.private999)(Key.pubn、Key.privaten).
The so-called issuing process is that when the background system verifies that an electronic key is a trusted key (possibly by checking the serial code of the device in advance or by preparing the public key of the trusted device in advance), the background system encrypts the public key of the electronic key with its own private key server.
EncryptServer.private(Key.pubn)
The encrypted piece of things can be called a security certificate issued to the electronic key by a background system. The electronic key downloads and saves the certificate.
Because the public key can be distributed to anyone, the public key server. Pub of the background system can also be poured into the lock in advance. When the lockset checks the authenticity of the electronic key every time, a security certificate encryptor. The lockset decrypts the security certificate by using the public key of the background system to obtain the public key of the original electronic key, which is summarized as the following formula
Key.pubn =DecryptServer.pub(EncryptServer.private(Key.pubn))
The lockset only needs to compare whether the public key decrypted by the security certificate is consistent with the public key of the electronic key, so as to judge whether the electronic key is feasible or not and whether the electronic key is issued by a background system or not.
Interaction between electronic key and lockset
We have confirmed that the electronic key is issued by the security system, which is the public key. The interaction between the electronic key and the lock can be performed on the basis of the pair of public and private keys. The interaction needs to use a Symmetric encryption algorithm, and the encryption and decryption of the Symmetric encrypted ciphertext can be completed by using a Symmetric key symmetry, so that the security and the safety of the Symmetric encryption depend on the Symmetric key symmetry to achieve confidentiality and no leakage.
Each time the electronic key is to send an instruction to the lock, a randomly generated symmetric key lock is firstly queried to the lock. The lockset encrypts a private key. Pub of the electronic key and then transmits the electronic key, and the formula is summarized as follows:
EncryptKey.pub(Lock.symmetric)
This symmetric key can then only be obtained by decrypting the electronic key with its own private key, summarized as the following formula
Lock.symmetric = DecryptKey.private(EncryptKey.pub(Lock.symmetric))
After the electronic key obtains the symmetric key, lock. Symmetry, all instructions of the electronic key to the lockset are encrypted by the symmetric key and then transmitted to the lockset, and the following formula is summarized:
EncryptLock.symmetic(instruction)
The lockset can decrypt and obtain the corresponding instruction by using the symmetric key agreed in advance and execute the instruction, and the instruction is summarized as the following formula:
DecryptLock.symmetic(EncryptLock.symmetic(instruction))
Therefore, the interaction between the electronic key and the lockset can be ensured to prevent replay, falsification and interception.
Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In the description of the present invention, the meaning of "plurality" means at least two, for example, two, three, etc., unless specifically defined otherwise.
In the description of the present specification, a description referring to terms "one embodiment," "some embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present invention. In this specification, schematic representations of the above terms are not necessarily directed to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, the different embodiments or examples described in this specification and the features of the different embodiments or examples may be combined and combined by those skilled in the art without contradiction.
While embodiments of the present invention have been shown and described above, it will be understood that the above embodiments are illustrative and not to be construed as limiting the invention, and that variations, modifications, alternatives and variations may be made to the above embodiments by one of ordinary skill in the art within the scope of the invention.