[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN109243018B - Automatic encryption method between intelligent lock control system modules, intelligent lock and storage medium - Google Patents

Automatic encryption method between intelligent lock control system modules, intelligent lock and storage medium Download PDF

Info

Publication number
CN109243018B
CN109243018B CN201810965023.4A CN201810965023A CN109243018B CN 109243018 B CN109243018 B CN 109243018B CN 201810965023 A CN201810965023 A CN 201810965023A CN 109243018 B CN109243018 B CN 109243018B
Authority
CN
China
Prior art keywords
data
information
module
intelligent lock
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810965023.4A
Other languages
Chinese (zh)
Other versions
CN109243018A (en
Inventor
王敬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Liwei Technology Co ltd
Original Assignee
Hangzhou Liwei Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Liwei Technology Co ltd filed Critical Hangzhou Liwei Technology Co ltd
Priority to CN201810965023.4A priority Critical patent/CN109243018B/en
Publication of CN109243018A publication Critical patent/CN109243018A/en
Application granted granted Critical
Publication of CN109243018B publication Critical patent/CN109243018B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00182Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00182Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
    • G07C2009/0023Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks with encription of the transmittted data signal

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an automatic encryption method among intelligent lock control system modules, which comprises the following steps: and extracting the ID information and the record table information of each module of the intelligent lock, encrypting the ID information and the record table information to form an encrypted array, matching the ID information and the record table information of each module with the encrypted array after the identity identification comparison is successfully carried out, if the matching is consistent, starting, and if not, the starting is unsuccessful. The invention also provides an embedded readable storage medium, on which an embedded program is stored, and on which a program for improving the security performance of the smart lock is stored, wherein the program for improving the security performance of the smart lock realizes the method when being executed by a processor. The invention also provides an intelligent lock, which comprises a memory, a processor and a program which is stored on the memory and can be operated on the processor, wherein the processor realizes the method when executing the program for improving the safety performance of the intelligent lock. So as to improve the safety performance of the intelligent lock.

Description

Automatic encryption method between intelligent lock control system modules, intelligent lock and storage medium
Technical Field
The invention relates to the technical field of intelligent security of the Internet of things, in particular to an automatic encryption method among intelligent lock control system modules, an intelligent lock applying the automatic encryption method among the intelligent lock control system modules and an embedded readable storage medium.
Background
At present, with the development of the internet of things and internet + technology, intellectualization has gradually become a direction of development of various products and a new fashion of service intelligent life, wherein intelligent locks (such as fingerprint locks, coded locks, magnetic card locks and networking locks) are developing at a rapid speed and enter families to improve lives of the masses. However, in the current standardized and standardized structure of the intelligent product industry, many products have various functional processes, and have various functions, and there are no deep consideration for the safety, confidentiality and replaceability of the products, and there are many unreasonable places which are not favorable for improving the safety of the products, including directly replacing the modules (such as an identity recognition module, a storage module, a clock recording module, a controlled module and the like) of the intelligent lock from the outside of the door (or the outside of a cabinet) or changing the related data information of each module, thereby causing the loss of the safety performance of the intelligent lock.
Disclosure of Invention
The invention mainly aims to provide an automatic encryption method among intelligent lock control system modules, aiming at improving the safety performance of an intelligent lock.
In order to realize the aim, the invention provides an automatic encryption method between intelligent lock control system modules,
the method comprises the following steps:
extracting ID information and record list information of each module of the intelligent lock, encrypting the ID information and the record list information to form an encryption array,
and after the identity identification comparison is successfully carried out, matching the ID information and the record table information of each module with the encrypted array, if the ID information and the record table information are consistent, starting, and if not, the starting is unsuccessful.
Optionally, the module comprises: the device comprises a main control module, an identity recognition module, a storage module and a controlled module.
Optionally, the method for forming the encrypted array includes:
obtaining ID information of the master control module, ID information of the identification module, ID information of the memory chip, and obtaining record table information,
forming 64-bit binary data 1 by the ID information of the main control module;
forming the ID information of the identification module into 64-bit binary data 2;
forming the memory chip ID information into 64-bit binary data 3;
forming the record table information into 64-bit binary data 4;
extracting the lower 16 bits of data 1, data 2, data 3 and data 4 to form data A from high to low;
extracting the middle 16 bits of the data 1, the data 2, the data 3 and the data 4 to form data B from high to low;
extracting the high 16 bits of data 1, data 2, data 3 and data 4 to form data C from high to low;
extracting the top 16 bits of data 1, data 2, data 3 and data 4 to form data D from high to low;
obtaining a 64-bit registration index table;
running a 128-bit weighted encryption operation;
and obtaining the encrypted array.
Optionally, before the identity recognition comparison, the method further comprises: and judging whether the operation is the first operation, if so, carrying out identity comparison, and if not, updating the registration index table and then failing to open.
Optionally, the identification includes at least one of fingerprint identification, finger vein identification, password identification, magnetic card identification, remote control identification, iris identification, voice identification, and face identification.
Optionally, before determining whether the operation is the first operation, the method further includes: the management operation is entered into, and the management operation,
the management operation comprises: first operation, experience mode, and factory reset.
Optionally, the manner of entering the management operation includes: fingerprint operation, password operation, magnetic card operation, system operation, remote control operation and other newly added operations.
The present invention also provides an embedded readable storage medium, on which an embedded program is stored,
the intelligent lock control system comprises a processor, a program and a storage device, wherein the program is stored on the intelligent lock control system, and the program is used for improving the safety performance of the intelligent lock.
The invention also provides an intelligent lock, which comprises a memory, a processor and a program which is stored on the memory and can be operated on the processor for improving the safety performance of the intelligent lock, wherein the method is realized when the processor executes the program for automatically encrypting between the intelligent lock control system modules.
The technical scheme is mainly characterized in that the ID and the record table information of each module are encrypted to form a secret key group (secret key), after identity identification comparison is carried out each time, whether the corresponding ID information is correct or not and whether the record information is correct or not need to be additionally compared, if the corresponding ID information is correct, the corresponding operation can be completed, and if the corresponding ID information is not correct, the judgment is failed.
Specifically, the intelligent lock system automatically extracts the chip ID and the record table information of each module, takes the ID information, the record table information and the like as secret keys, forms an encrypted array through encryption and records the encrypted array in a storage module (memory) of a main control chip, identifies and matches the encrypted ID of each module in the opening process after the identity comparison is executed, if the encrypted ID is matched with the encrypted array, the opening is determined to be successful, if the encrypted ID is not matched with the encrypted array, the encrypted ID is a module which is not originally matched and authorized, the matching is determined to be unsuccessful, and the opening is unsuccessful. Therefore, the problem that the safety of the intelligent lock is lost due to module replacement or information change can be solved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the structures shown in the drawings without creative efforts.
FIG. 1 is a flow chart of encryption comparison processing in an embodiment of the method for automatically encrypting between intelligent lock control system modules according to the present invention;
FIG. 2 is a flow chart of the encryption array formation operation;
fig. 3 is a hardware block diagram of the smart lock system.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The intelligent lock can be used for safe cabinets, safes, bullet management cabinets, file cabinets, security cabinets, furniture cabinets, intelligent doors and the like.
As shown in fig. 3, fig. 3 is a schematic diagram of a hardware structure of an intelligent lock system according to an embodiment of the present invention.
The intelligent lock comprises a main control module, a storage module, an identity recognition module, a controlled module, an inner lock module, a power supply module, a driving module, a voice module, a sensing module, a servo module and the like.
The main control module (main control chip), namely the processor, is a control center of the intelligent door lock, various interfaces and lines are used for connecting all parts of the whole intelligent door lock, and various functions and processing data of the intelligent door lock are executed by running or executing software programs and/or modules stored in the memory and calling data stored in the memory, so that the intelligent door lock is monitored integrally.
The memory module (memory chip), i.e., the memory, may be used to store a software program and various data. The memory may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program (such as an instruction generating function) required by at least one function, and the like; the data storage area can store data (such as key data and clutch state data) required by the intelligent door lock when in use, and the like. Further, the memory may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The identity recognition module, also called a recognition module, can be one of a fingerprint recognition module, a finger vein recognition module, a password recognition module, a magnetic card recognition module, a remote control recognition module, an iris recognition module, a voice recognition module and the like, a face recognition module, or a plurality of combinations. The security level setting can be set according to different security levels, and the security level setting is started through at least one identification mode or can be started through a plurality of modes.
And the power supply module is used for supplying power to the intelligent lock.
The voice module can be used for voice reminding and other functions, and when the communication module is arranged, the voice module can be used for remote communication.
The intelligent lock comprises a controlled module, an internal lock module, a driving module, a voice module, a sensing module and a servo module, and is comprehensively used for opening and closing the intelligent lock.
Of course, there are also circuit control modules.
The module which is easily and directly replaced and causes the loss of the security performance is mainly an identity module, and if the data information and the record table information of the corresponding module are changed, the security performance is also lost.
Based on this, the present invention provides a method for improving the security performance of the smart lock, which can be referred to as fig. 1,
the method comprises the following steps: extracting ID information and record table information of each module of the intelligent lock, encrypting the ID information and the record table information to form an encryption array,
and after the identity identification comparison is successfully carried out, matching the ID information and the record table information of each module with the encrypted array, if the ID information and the record table information are consistent, starting, and if not, the starting is unsuccessful.
The technical scheme is mainly characterized in that the ID and the record table information of each module are encrypted to form a secret key group (secret key), after identity identification comparison is carried out each time, whether the corresponding ID information is correct or not and whether the record information is correct or not need to be additionally compared, if the corresponding ID information is correct, the corresponding operation can be completed, and if the corresponding ID information is not correct, the judgment is failed.
Specifically, the smart lock system automatically extracts the chip ID and the record table information of each module, and uses the ID information, the record table information, and the like as a secret key, and the record table information includes: the method comprises the steps of obtaining time information, capacity use conditions and index table information, forming an encrypted array through encryption and recording the encrypted array in a storage module (memory) of a main control chip, carrying out identification and matching on encrypted identity IDs (identity) of all modules in the starting process after identity comparison, confirming that the starting is successful if the encrypted identity IDs are matched with the encrypted array, and confirming that the matching is unsuccessful and the starting is unsuccessful if the encrypted identity IDs are not matched with the encrypted array. Therefore, the problem that the safety of the intelligent lock is lost due to module replacement or information change can be solved.
Wherein the record table information includes: time information, capacity usage, and index table information.
Further, the module includes: the device comprises a main control module, an identity recognition module, a storage module and a controlled module.
It can be understood that other modules cannot be replaced, the safety performance of the intelligent lock can be improved by only identifying the ID information of the modules, and the phenomenon that the running speed of the intelligent lock is influenced by excessive identification is avoided.
Further, referring to fig. 2, the method for forming the encrypted array includes:
obtaining ID information of the master control module, ID information of the identification module, ID information of the memory chip, and obtaining record table information,
forming 64-bit binary data 1 by the ID information of the main control module;
forming the ID information of the identification module into 64-bit binary data 2;
forming the memory chip ID information into 64-bit binary data 3;
forming the record table information into 64-bit binary data 4;
extracting the lower 16 bits of data 1, data 2, data 3 and data 4 to form data A from high to low;
extracting the middle 16 bits of the data 1, the data 2, the data 3 and the data 4 to form data B from high to low;
extracting the high 16 bits of data 1, data 2, data 3 and data 4 to form data C from high to low;
extracting the top 16 bits of data 1, data 2, data 3 and data 4 to form data D from high to low;
obtaining a 64-bit registration index table;
running a 128-bit weighted encryption operation;
and obtaining the encrypted array.
The technical scheme is mainly characterized in that the ID and the record list information data sequence are disordered and are formed into an encryption array according to a specific mode, so that the intelligent lock is not easy to be broken by changing the data information, and the safety performance of the intelligent lock is better.
In this embodiment, referring to fig. 1, it can be understood that, before executing an encryption process, the intelligent lock needs to be bound, and in a main operation process, an administrator identity enters a management operation mode, a first operation (i.e., an encryption binding mode) is selected, the system determines whether to perform the first operation, if the first operation is performed, identity recognition comparison is performed, after the comparison is successful, encryption is immediately executed to form an encryption algorithm, and the encryption algorithm is stored in a memory, i.e., the binding is successful. When the system judges that the operation is not the first operation, the system is not successful in opening after updating the registration index table.
Wherein, the purpose of adopting the first operation is: when the intelligent lock is used for the first time, encryption is carried out when operation management information, user information, identity information or record table information is initial.
Further, the identification comprises at least one of fingerprint identification, finger vein identification, password identification, magnetic card identification, remote control identification, iris identification, voice identification and face identification.
Further, before determining whether the operation is the first operation, the method further includes: the management operation is entered into, and the management operation,
the management operation comprises: first operation, experience mode, and factory reset.
In this embodiment, the administrator identity is used to enter the management operation, and the factory settings are restored, so that the encrypted binding can be quickly released. And the experience mode is used for trying the intelligent lock.
Further, the manner of entering the management operation includes: fingerprint operation, password operation, magnetic card operation, system operation, remote control operation and other newly added operations.
The present invention also provides an embedded readable storage medium, on which an embedded program is stored,
the intelligent lock control system comprises a processor, a program and a storage device, wherein the program is stored on the intelligent lock control system, and the program is used for improving the safety performance of the intelligent lock.
The invention also provides an intelligent lock, which comprises a memory, a processor and a program which is stored on the memory and can be operated on the processor for improving the safety performance of the intelligent lock, wherein the method is realized when the processor executes the program for automatically encrypting between the intelligent lock control system modules.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above, and includes instructions for enabling a terminal device (e.g., a mobile phone, an embedded device, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (7)

1. An automatic encryption method among intelligent lock control system modules is characterized by comprising the following steps:
extracting ID information and record table information of each module of the intelligent lock, encrypting the ID information and the record table information to form an encrypted array, matching the ID information and the record table information of each module with the encrypted array after the identity identification comparison is successfully carried out, if the ID information and the record table information of each module are matched with the encrypted array, starting, and if the ID information and the record table information are not matched with the encrypted array, starting unsuccessfully;
the module comprises a main control module, an identity recognition module, a storage module and a controlled module;
the method for forming the encrypted array comprises the following steps:
obtaining the ID information of the main control module, the ID information of the identification module, the ID information of the memory chip and the information of the obtaining record table,
forming 64-bit binary data 1 by the ID information of the main control module;
forming the ID information of the identification module into 64-bit binary data 2;
forming the memory chip ID information into 64-bit binary data 3;
forming the record table information into 64-bit binary data 4;
extracting the lower 16 bits of data 1, data 2, data 3 and data 4 to form data A from high to low;
extracting the middle 16 bits of the data 1, the data 2, the data 3 and the data 4 to form data B from high to low;
extracting the high 16 bits of data 1, data 2, data 3 and data 4 to form data C from high to low;
extracting the top 16 bits of data 1, data 2, data 3 and data 4 to form data D from high to low;
obtaining a 64-bit registration index table;
running a 128-bit weighted encryption operation;
and obtaining the encrypted array.
2. The method for automatically encrypting between intelligent lock control system modules according to claim 1, wherein before the identification comparison, the method further comprises the steps of judging whether the operation is the first operation, if so, comparing the identities, and if not, updating the registration index table and then ensuring that the unlocking is unsuccessful.
3. The inter-module automatic encryption method for the intelligent lock control system according to any one of claims 1-2, wherein the identification comprises at least one of fingerprint identification, finger vein identification, password identification, magnetic card identification, remote control identification, iris identification, voice identification, and face identification.
4. The method according to claim 1, wherein before determining whether the operation is the first operation, the method further comprises entering a management operation, wherein the management operation comprises the first operation, an experience mode and factory reset.
5. The method as claimed in claim 4, wherein the management operation is performed by at least one of fingerprint operation, password operation, magnetic card operation, system operation, remote control operation, and other additional operations.
6. An embedded readable storage medium, which is characterized in that a program for improving the security performance of the intelligent lock is stored thereon, wherein the program for automatically encrypting between the intelligent lock control system modules is executed by a processor to implement the method according to any one of claims 1 to 5.
7. An intelligent lock, characterized by comprising a memory, a processor and a program stored in the memory and capable of running on the processor for improving the security performance of the intelligent lock, wherein the processor implements the method according to any one of claims 1 to 5 when executing the program for automatically encrypting between the intelligent lock control system modules.
CN201810965023.4A 2018-08-23 2018-08-23 Automatic encryption method between intelligent lock control system modules, intelligent lock and storage medium Active CN109243018B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810965023.4A CN109243018B (en) 2018-08-23 2018-08-23 Automatic encryption method between intelligent lock control system modules, intelligent lock and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810965023.4A CN109243018B (en) 2018-08-23 2018-08-23 Automatic encryption method between intelligent lock control system modules, intelligent lock and storage medium

Publications (2)

Publication Number Publication Date
CN109243018A CN109243018A (en) 2019-01-18
CN109243018B true CN109243018B (en) 2021-12-28

Family

ID=65068581

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810965023.4A Active CN109243018B (en) 2018-08-23 2018-08-23 Automatic encryption method between intelligent lock control system modules, intelligent lock and storage medium

Country Status (1)

Country Link
CN (1) CN109243018B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112950813A (en) * 2019-11-26 2021-06-11 纳恩博(常州)科技有限公司 Intelligent lock device, scooter, intelligent lock body control method thereof and storage medium

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2996947B1 (en) * 2012-10-11 2015-09-04 Openways Sas SECURE METHOD FOR OPENING CONTROL OF LOCK DEVICES FROM MESSAGES USING SYMMETRICAL ENCRYPTION
CN104091376B (en) * 2014-06-16 2017-02-08 小米科技有限责任公司 Intelligent lock control method and apparatus thereof
CN105631987A (en) * 2015-02-12 2016-06-01 北京神器科技有限公司 Bluetooth access control unlocking method, device and system
CN105894632A (en) * 2016-04-20 2016-08-24 上海斐讯数据通信技术有限公司 Intelligent lock system based on international mobile equipment identity (IMEI) number and implementation method thereof
CN108055235B (en) * 2017-11-01 2020-09-18 华中科技大学 Control method of intelligent lock, related equipment and system
CN108266061A (en) * 2017-12-29 2018-07-10 武汉九万里科技有限公司 Fingerprint lock
TWM562879U (en) * 2018-03-29 2018-07-01 陳澤興 Wireless door lock device and biometric door lock controlling system having the wireless door lock device

Also Published As

Publication number Publication date
CN109243018A (en) 2019-01-18

Similar Documents

Publication Publication Date Title
US11023875B2 (en) Electronic credential management system
CN112673600B (en) Multiple security authentication system and method between mobile phone terminal and internet of things (IoT) device based on blockchain
CN107911373A (en) A kind of block chain right management method and system
CN108093392B (en) Method for unlocking SIM card, mobile terminal and storage medium
CN106161442A (en) A kind of system control user login method
EP3098745A1 (en) Device key security
CN111740854A (en) Apparatus, method and system for secure device communication
CN114241631B (en) Control method, registration method and related device of intelligent door lock
US20130185567A1 (en) Method or process for securing computers or mobile computer devices with a contact or dual-interface smart card
CN103617005A (en) Access method, device and system for intelligent card
CN101727558A (en) Method for clearing password of computer, computer and server
CN103797490A (en) Change-tolerant method of generating an identifier for a collection of assets in a computing environment using a secret sharing scheme
CN109243018B (en) Automatic encryption method between intelligent lock control system modules, intelligent lock and storage medium
CN113205628B (en) Intelligent door lock control method and system based on biological feature recognition
CN108737079B (en) Distributed quantum key management system and method
CN113051605A (en) Individual privacy information use management system and method based on block chain
US10069825B2 (en) Electronic device identification
DE102021104326A1 (en) SECURE STORAGE UPGRADES FOR AUTHENTICATION SYSTEMS
US11822795B2 (en) Secure data processing
CN105897708A (en) Information protection method and mobile terminal
US8844047B2 (en) Secure programming of vehicle modules
CN115935391A (en) Card manufacturing method, card issuing method, device, medium, and program product for IC card
CN111369710B (en) Block chain supported intelligent lock system
CN112712612A (en) Method, device, computer readable medium and equipment for controlling intelligent door lock
CN113783839B (en) Block chain data updating method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant