CN109377626A - The method of electronic lock information processing and the acquisition electronic lock right to use based on block chain - Google Patents
The method of electronic lock information processing and the acquisition electronic lock right to use based on block chain Download PDFInfo
- Publication number
- CN109377626A CN109377626A CN201811525827.9A CN201811525827A CN109377626A CN 109377626 A CN109377626 A CN 109377626A CN 201811525827 A CN201811525827 A CN 201811525827A CN 109377626 A CN109377626 A CN 109377626A
- Authority
- CN
- China
- Prior art keywords
- information
- electronic lock
- user
- lock
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 47
- 230000010365 information processing Effects 0.000 title claims abstract description 23
- 238000003672 processing method Methods 0.000 claims abstract description 4
- 238000012790 confirmation Methods 0.000 claims description 26
- 230000004044 response Effects 0.000 claims description 4
- 230000000694 effects Effects 0.000 abstract description 6
- 230000015654 memory Effects 0.000 description 25
- 238000012545 processing Methods 0.000 description 22
- 238000005516 engineering process Methods 0.000 description 16
- 238000010586 diagram Methods 0.000 description 10
- 230000005540 biological transmission Effects 0.000 description 8
- 238000004891 communication Methods 0.000 description 5
- 230000008569 process Effects 0.000 description 4
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000005611 electricity Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 230000008878 coupling Effects 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000005389 magnetism Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
This application discloses a kind of electronic lock information processing based on block chain and the methods for obtaining the electronic lock right to use.Wherein, based on the electronic lock information processing method of block chain, comprising: the registration request that electronic lock is registered in the request that receiving terminal apparatus is sent;According to the registration request, the first user information relevant to the user of the terminal device is obtained;Obtain the first electronics lock information relevant to the electronic lock;According to first user information, the first electronics lock information and predetermined cryptographic algorithm, encryption information is generated;And the encryption information is stored in the predetermined block of block chain.Having reached user data relevant to electronic lock can not the person's of being destroyed technical effect for distorting, steal and losing.And then it solves existing user data relevant to electronic lock and there is technical issues that easy to be distorted, steal and lose by other people.
Description
Technical field
This application involves block chain fields, more particularly to a kind of electronic lock information processing based on block chain and obtain electricity
The method of the son lock right to use.
Background technique
There are various locksets in the prior art, wherein electronic lock is deeply loved by the public.Electronic lock will unlock,
Electron key must be used.Used in daily life is numerical value key, such as fingerprint, sound, shape of face, number etc..Also,
The data of all people for possessing electronic lock depend on some Lock Factory and technology company to safeguard data safety.Therefore and electronic lock
Relevant data safety all relies on the credit of some Lock Factory and technology company, exists simultaneously number relevant to electronic lock
It is distorted or is stolen by other people according to easy, once the problem of Lock Factory's bankruptcy can also lose data.
For above-mentioned existing user data relevant to electronic lock existing in the prior art, there is be easy by him
The technical issues of risk that people distorts, steals and loses, currently no effective solution has been proposed.
Summary of the invention
Embodiment of the disclosure provides a kind of electronic lock information processing based on block chain and obtains the electronic lock right to use
Method, apparatus and storage medium, at least to solve existing number of users relevant to electronic lock existing in the prior art
According to there is technical issues that be easy by other people to be distorted, steal and lost.
According to the one aspect of the embodiment of the present disclosure, a kind of electronic lock information processing method based on block chain is provided,
It include: the registration request that electronic lock is registered in the request of receiving terminal apparatus transmission;According to registration request, acquisition and terminal
Relevant first user information of the user of equipment;Obtain the first electronics lock information relevant to electronic lock;Believed according to the first user
Breath, the first electronics lock information and predetermined cryptographic algorithm generate encryption information;And encryption information is stored in the pre- of block chain
Determine block.
According to the other side of the embodiment of the present disclosure, a kind of method for obtaining electronic lock is additionally provided, comprising: receive and use
The request of family input is requested using the use of electronic lock;Will use request, the first user information related to user and with electricity
Son locks relevant first electronics lock information and is sent to server;The confirmation message that server is sent is received, wherein confirmation message is used
Electronic lock has been distributed to user in instruction;And display confirmation message.
According to the other side of the embodiment of the present disclosure, a kind of storage medium is additionally provided, storage medium includes storage
Program, wherein the method as described in processor execution any of the above one in program operation.
According to the other side of the embodiment of the present disclosure, a kind of electronic lock information processing apparatus based on block chain is additionally provided
It sets, comprising: registration request receiving module, the registration request for the request electronic lock that receiving terminal apparatus is sent;First
User profile acquisition module, for obtaining the first user information relevant to the user of terminal device according to registration request;First
Electronic lock data obtaining module, for obtaining the first electronics lock information relevant to electronic lock;Generation module, for according to first
User information, the first electronics lock information and predetermined cryptographic algorithm generate encryption information;And first memory module, for will
Encryption information is stored in the predetermined block of block chain.
According to the other side of the embodiment of the present disclosure, a kind of device for obtaining electronic lock is additionally provided, comprising: registration is asked
Receiving module is sought, the registration request of the acquisition electronic lock for receiving user's input;First sending module is asked for that will register
It asks, the first user information related to user and the first electronics lock information relevant to electronic lock are sent to server;First
Receiving module, for receiving the confirmation message of server transmission, wherein confirmation message, which is used to indicate, distributes electronic lock to use
Family;And confirmation message display module, for showing confirmation message.
According to the other side of the embodiment of the present disclosure, a kind of electronic lock information processing apparatus based on block chain is additionally provided
It sets, comprising: first processor;And first memory, connect with first processor, for for first processor provide processing with
The instruction of lower processing step: the registration request for the request electronic lock that receiving terminal apparatus is sent;According to registration request, obtain
The first user information relevant to the user of terminal device;Obtain the first electronics lock information relevant to electronic lock;According to first
User information, the first electronics lock information and predetermined cryptographic algorithm generate encryption information;And encryption information is stored in block
The predetermined block of chain.
According to the other side of the embodiment of the present disclosure, a kind of device for obtaining electronic lock is additionally provided, comprising: at second
Manage device;And second memory, it is connect with second processor, for providing the finger for handling following processing step for second processor
It enables: receiving the registration request of the acquisition electronic lock of user's input;By registration request, the first user information related to user and
The first electronics lock information relevant to electronic lock is sent to server;The confirmation message that server is sent is received, wherein confirmation letter
Breath, which is used to indicate, distributes electronic lock to user;And display confirmation message.
Detailed description of the invention
Attached drawing described herein is used to provide further understanding of the disclosure, constitutes part of this application, this public affairs
The illustrative embodiments and their description opened do not constitute the improper restriction to the disclosure for explaining the disclosure.In the accompanying drawings:
Fig. 1 is [terminal (or mobile device)] for realizing the method according to the embodiment of the present disclosure 1
Hardware block diagram;
Fig. 2 is that the electronic lock information processing and acquisition electronic lock according to the embodiment of the present disclosure 1 based on block chain make
With the schematic diagram of the system of the method for power;
Fig. 3 is the electronic lock information processing side according to the first aspect of the embodiment of the present disclosure 1 based on block chain
The flow diagram of method;
Fig. 4 is the process that the method for the electronic lock right to use is obtained according to the second aspect of the embodiment of the present disclosure 1
Schematic diagram;
Fig. 5 is the electronic lock information processing apparatus according to the first aspect of the embodiment of the present disclosure 2 based on block chain
The schematic diagram set;
Fig. 6 is the signal that the device of the electronic lock right to use is obtained according to the second aspect of the embodiment of the present disclosure 2
Figure;
Fig. 7 is the electronic lock information processing apparatus according to the first aspect of the embodiment of the present disclosure 3 based on block chain
The schematic diagram set;And
Fig. 8 is the signal that the device of the electronic lock right to use is obtained according to the second aspect of the embodiment of the present disclosure 3
Figure.
Specific embodiment
In order to make those skilled in the art more fully understand the technical solution of the disclosure, implement below in conjunction with the disclosure
Attached drawing in example, is clearly and completely described the technical solution in the embodiment of the present disclosure.Obviously, described embodiment
The only embodiment of disclosure a part, instead of all the embodiments.Based on the embodiment in the disclosure, this field is common
Disclosure protection all should belong in technical staff's every other embodiment obtained without making creative work
Range.
It should be noted that the specification and claims of the disclosure and term " first " in above-mentioned attached drawing, "
Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way
Data be interchangeable under appropriate circumstances, so as to embodiment of the disclosure described herein can in addition to illustrating herein or
Sequence other than those of description is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that cover
Cover it is non-exclusive include, for example, the process, method, system, product or equipment for containing a series of steps or units are not necessarily limited to
Step or unit those of is clearly listed, but may include be not clearly listed or for these process, methods, product
Or other step or units that equipment is intrinsic.
Embodiment 1
According to the present embodiment, provides a kind of electronic lock information processing based on block chain and obtain the electronic lock right to use
Embodiment of the method, it should be noted that step shown in the flowchart of the accompanying drawings can be in the executable finger of such as one group of computer
It is executed in the computer system of order, although also, logical order is shown in flow charts, and it in some cases, can be with
The steps shown or described are performed in an order that is different from the one herein.
Embodiment of the method provided by the present embodiment can be in mobile terminal, terminal or similar arithmetic unit
Middle execution.Fig. 1 shows a kind of electronic lock information processing for realizing based on block chain and obtains the side of the electronic lock right to use
The hardware block diagram of the terminal (or mobile device) of method.As shown in Figure 1, terminal 10 (or mobile device 10)
It may include that (processor 102 can be with for one or more (using 102a, 102b ... ... in figure, 102n to show) processors 102
The including but not limited to processing unit of Micro-processor MCV or programmable logic device FPGA etc.), memory for storing data
104 and for communication function transmission module 106.It in addition to this, can also include: display, input/output interface (I/
O Interface), the port universal serial bus (USB) (a port that can be used as in the port of I/O interface is included), network connect
Mouth, power supply and/or camera.It will appreciated by the skilled person that structure shown in FIG. 1 is only to illustrate, not to upper
The structure for stating electronic device causes to limit.For example, terminal 10 may also include than shown in Fig. 1 more or less groups
Part, or with the configuration different from shown in Fig. 1.
It is to be noted that said one or multiple processors 102 and/or other data processing circuits lead to herein
Can often " data processing circuit " be referred to as.The data processing circuit all or part of can be presented as software, hardware, firmware
Or any other combination.In addition, data processing circuit for single independent processing module or all or part of can be integrated to meter
In any one in other elements in calculation machine terminal 10 (or mobile device).As involved in the embodiment of the present disclosure,
The data processing circuit controls (such as the selection for the variable resistance end path connecting with interface) as a kind of processor.
Memory 104 can be used for storing the software program and module of application software, as in the embodiment of the present disclosure based on
The electronic lock information processing of block chain and the corresponding program instruction/data storage device of method for obtaining the electronic lock right to use, place
The software program and module that reason device 102 is stored in memory 104 by operation, thereby executing various function application and number
According to processing, that is, realize the side of the electronic lock information processing and the acquisition electronic lock right to use based on block chain of above-mentioned application program
Method.Memory 104 may include high speed random access memory, may also include nonvolatile memory, as one or more magnetism is deposited
Storage device, flash memory or other non-volatile solid state memories.In some instances, memory 104 can further comprise opposite
In the remotely located memory of processor 102, these remote memories can pass through network connection to terminal 10.It is above-mentioned
The example of network includes but is not limited to internet, intranet, local area network, mobile radio communication and combinations thereof.
Transmitting device 106 is used to that data to be received or sent via a network.Above-mentioned network specific example may include
The wireless network that the communication providers of terminal 10 provide.In an example, transmitting device 106 includes that a network is suitable
Orchestration (Network Interface Controller, NIC), can be connected by base station with other network equipments so as to
Internet is communicated.In an example, transmitting device 106 can be radio frequency (Radio Frequency, RF) module,
For wirelessly being communicated with internet.
Display can such as touch-screen type liquid crystal display (LCD), the liquid crystal display aloow user with
The user interface of terminal 10 (or mobile device) interacts.
Herein it should be noted that in some optional embodiments, above-mentioned computer equipment shown in FIG. 1 (or movement is set
It is standby) it may include hardware element (including circuit), software element (including the computer generation that may be stored on the computer-readable medium
Code) or both hardware element and software element combination.It should be pointed out that Fig. 1 is only a reality of particular embodiment
Example, and it is intended to show that the type for the component that may be present in above-mentioned computer equipment (or mobile device).
Fig. 2 is the electronic lock information processing and the acquisition electronic lock right to use according to this present embodiment based on block chain
System schematic diagram.Referring to shown in Fig. 2, which includes: terminal device 200 and server 300.Wherein server 300
Upper operation has block chain.In the case where user 100 is with the demand registered to electronic lock, user 100 can pass through end
The transmission of end equipment 200 requests the registration request registered to electronic lock to server 300.Then server 300 is based on the note
Volume request, user 100 is associated with electronic lock, and will be associated with obtained related information and be stored to running on server 300
On block chain predetermined block in.Then, server 300 sends the information that is successfully associated to terminal device 200, it means that
The electronic lock is allocated to user 100 by server 300, i.e. user 100 obtains the electronic lock.It should be noted that system
In the applicable hardware configuration recited above of terminal device 200 and server 300.
Under above-mentioned running environment, according to the first aspect of the present embodiment, a kind of information based on block chain is provided
Processing method, this method are realized by server 300 shown in Fig. 2.Fig. 3 shows the flow diagram of this method, with reference to Fig. 3
It is shown, this method comprises:
S302: the registration request for the request electronic lock that receiving terminal apparatus is sent;
S304: according to registration request, the first user information relevant to the user of terminal device is obtained;
S306: the first electronics lock information relevant to electronic lock is obtained;
S308: according to the first user information, the first electronics lock information and predetermined cryptographic algorithm, encryption information is generated;With
And
S310: encryption information is stored in the predetermined block of block chain.
As described in background, the data of existing all people for possessing electronic lock depend on some Lock Factory
Data safety is safeguarded with technology company.Therefore data safety relevant to electronic lock all relies on some Lock Factory and technology
The credit of company exists simultaneously data relevant to electronic lock and is easy to be distorted or stolen by other people, also can once Lock Factory closes down
Lose data.
Therefore, for the relevant user data of above-mentioned existing and electronic lock, there is be easy to be distorted by other people, steal
And lose risk the technical issues of, and refering to what is shown in Fig. 2, the user 100 in terminal device 200 has and obtains electronic lock
In the case where demand, user 100 can send the registration request that electronic lock is registered in request by terminal device 200 and extremely take
Business device 300.The present embodiment registers electronic lock by the request that 300 receiving terminal apparatus 200 of server is sent at this time
Registration request.Then server 300 obtains first user letter relevant to the user 100 of terminal device 200 according to registration request
Breath.Wherein the first user information can be phone number, fingerprint and the identification card number etc. of user.
Further, server 300 is in the case where obtaining to 100 relevant first user information of user, it is also necessary to
Obtain the first electronics lock information relevant to electronic lock.Wherein the first electronics lock information can be number and the user of electronic lock
Unlocking cipher or initial password of setting etc..Then first user information, first electronics lock information of the server 300 according to acquisition
And scheduled Encryption Algorithm, generate encryption information.Wherein scheduled Encryption Algorithm can be symmetric encipherment algorithm.Then it services
The encryption information that encryption obtains is stored in the predetermined block of the block chain run on server 300 by device 300.Such as: clothes
Business device 300 after the processing of scheduled Encryption Algorithm, obtains encryption key, the first user information and the first electronics lock information
It is stored in the predetermined block of block chain to encryption information, then by encryption information.
In this way, it so that the data of all people for having electronic lock are stored on block chain, is no longer rely on a certain
A Lock Factory and technology company safeguard data safety, and the people of all participations is an one's share of expenses for a joint undertaking of block chain.Also, it takes at other people
It is stored in after the encryption information in block chain, can not directly obtain the first user information and the first electronics lock information.
Only possess encryption key user 100 can be decrypted by key pair encryption information after, could obtain first use
Family information and the first electronics lock information.Since the present embodiment has the characteristic that can not be distorted using block chain technology, and make
User data is encrypted with Encryption Algorithm.Thus reached user data relevant to electronic lock can not the person of being destroyed usurp
The technical effect for changing, stealing and losing.Solving existing user data relevant to electronic lock in turn, there is easy quilts
The technical issues of risk that other people distort, steal and lose.
Optionally, predetermined cryptographic algorithm is symmetric encipherment algorithm, and generates the operation of encryption information, comprising: according to
One user information, the first electronics lock information and symmetric encipherment algorithm generate encryption information.Specifically, predetermined cryptographic algorithm is
Symmetric encipherment algorithm, then server 300 is by encryption key, the first user information and the first electronics lock information by scheduled
After Encryption Algorithm processing, encryption information is generated.Due to using symmetric encipherment algorithm, thus for encryption key be used for solve
Close key is identical key.Therefore the computational complexity of ciphering process can be reduced, the speed of encryption and decryption is improved.
Optionally, further includes: the unlocking request for the request unlocking electronic lock that receiving terminal apparatus is sent;Acquisition is asked with unlocking
Ask the second user information and the second electronics lock information relevant to electronic lock of relevant user;Determine second user information with
Whether the second electronics lock information matches;And in the case where determining that second user information and the second electronics lock information match,
Unlocking electronic lock.
Specifically, when user 100 has the demand of unlocking electronic lock, user 100 can be sent by terminal device 200 and be asked
The unlatching of unlocking electronic lock is asked to request to be sent to server 300.The unlocking that 300 receiving terminal apparatus 200 of server is sent at this time
Request, then server 300 obtains and the second user information of the relevant user 100 of unlocking request and relevant with electronic lock
Second electronics lock information.Wherein second user information can be therein any one for user mobile phone number, fingerprint and identification card number
, and the second electronics lock information can be the number of electronic lock and the unlocking cipher of user setting.Then server 300 is sentenced
Determine whether second user information matches with the second electronics lock information.Due to servicing when 100 request electronic lock of user
The first user information of user is associated with by device 300 with the first electronics lock information of electronic lock.At this point, server
300 need to determine whether in the first user information being stored in block chain include second user information and the first electronics
Whether lock information and the second electronics lock information are consistent.Second user information and the second electronic lock item of information are determined in server 300
In matched situation, i.e., server 300 determines that the first user information includes second user information and the first electronics lock information
It is consistent with the second electronics lock information, 300 unlocking electronic lock of server.In this way, ensured electronic lock in the mistake used
Safety and preciseness in journey.To further ensure the personal safety and property safety of user.
Optionally, determine second user information and the whether matched operation of the second electronics lock information, comprising: to encryption information
It is decrypted, obtains the first user information and the first electronics lock information;Determine whether the first user information includes second user
Information;And determine whether the first electronics lock information is consistent with the second electronics lock information.
Specifically, server 300 determines second user information and the whether matched operation of the second electronics lock information, comprising:
Server 300 can be according to encryption key and scheduled Encryption Algorithm to the encryption information being stored in the predetermined block of block chain
It is decrypted, then obtains the first user information and the first electronics lock information.Then the judgement of server 30 is stored in block chain
In the first user information in whether include that second user information and the first electronics lock information are with the second electronics lock information
It is no consistent.To in this way, allow server 300 according to the first user information and the first electronics lock information
Determine whether unlocking electronic lock, and then ensures the safety of electronic lock during use.
Optionally, further includes: the first use information relevant to electronic lock is obtained, wherein the first use information is electronic lock
The information generated during use;And the first use information is stored in the predetermined block of block chain.
Specifically, server 300 obtains the first use information relevant to electronic lock.Wherein the first use information can wrap
It includes: using the object of electronic lock, using time and access times etc..Then the first use information is stored in by server 300
In the predetermined block of block chain.In this way, so that user is stored in block chain using the information of electronic lock every time,
It has ensured that use information relevant to electronic lock can not distort, while also providing subsequent query service for user.
Optionally, further includes: the second use information relevant to electronic lock is retrieved in the request that receiving terminal apparatus is sent
Retrieval request, wherein the first use information includes the second use information;Obtain the second use information;And by the second use information
It is sent to terminal device.
Specifically, when user 100 has the demand of the access times of electronic lock in retrieval nearly one month, user 100 can
To send retrieval request to server 300 by terminal device 200.At this point, the request that server receiving terminal equipment 200 is sent
Retrieve the second use information (access times of electronic lock in one month i.e. nearly) relevant to electronic lock.Then server 300 obtains
The access times (i.e. the second use information) of the electronic lock in nearly one month are taken, such as: the use time in electronic lock nearly one month
Number is 60 times.Then the second use information is sent to terminal device 200 by server 300.To, in this way, so that
User 100 can retrieve use information relevant to electronic lock at any time.And then by the service condition of monitoring electronic lock, reach
Monitor the effect of itself personal safety and property safety.
In addition, providing a kind of method for obtaining the electronic lock right to use, this method according to the second aspect of the present embodiment
It is realized by terminal device 200 shown in Fig. 2.Fig. 4 shows the flow diagram of this method, refering to what is shown in Fig. 4, this method packet
It includes:
S402: the use request of the request electronic lock of user's input is received;
S404: request, the first user information related to user and the first electronic lock relevant to electronic lock will be used
Information is sent to server;
S406: the confirmation message that server is sent is received, wherein confirmation message, which is used to indicate, distributes electronic lock to use
Family;And
S408: display confirmation message.
Specifically, in the case where user has the demand for obtaining electronic lock, user 100 asks to the input of terminal device 200
Ask the use request for obtaining electronic lock.At this point, terminal device 200 receives the use request that user 100 inputs.Then terminal device
200 by this using requesting, relevant to user 100 first user information (such as: cell-phone number, fingerprint and the identity of user 100
Demonstrate,prove number etc.) and the first electronics lock information relevant to electronic lock (such as: the number and initial password of electronic lock) it sends
To server 300.Wherein, operation has block chain on server 300.Then terminal device 200 receives server 300 and sends really
Recognize information, wherein confirmation message is used to indicate server 300 and distributes electronic lock to user 100.Wherein server 300 will
Electronic lock, which is distributed to user 100, means that user 100 obtains electronic lock.Then terminal device 200 shows the confirmation message.This
When, user 100 can by browsing terminal equipment 200 show confirmation message, learn oneself obtain electronic lock and with electricity
Son locks relevant information.
To which in this way, the first user information and the first electronics lock information are sent to by terminal device
Server 300 allows server 300 that the first user information received and the first electronics lock information are stored in operation
In the block chain on server 300.And then there is the characteristic that can not be distorted according to block chain technology, reach and electronics locking phase
The user data of pass can not the person's of being destroyed technical effect for distorting, steal and losing.And then solves existing and electronic lock
Relevant user data there is technical issues that be easy to be distorted, steal and lose by other people.
Optionally, further includes: receive the unlocking instruction of the unlocking electronic lock of user's input;In response to unlocking instruction, will ask
The unlocking of unlocking electronic lock is asked to request, second user information related to user and the second electronic lock relevant to electronic lock letter
Breath is sent to server;The instruction information that server is sent is received, wherein instruction information is used to indicate whether electronic lock is opened;With
And display instruction information.
Specifically, there is when needing of unlocking electronic lock in user 100, user 100 inputs finger print information to terminal device
And unlocking instruction.At this point, terminal device 200 receives unlocking instruction and and the user for the unlocking electronic lock that user 100 inputs
100 relevant second user information (i.e. the finger print information of user 100).Then, terminal device 200, will in response to unlocking instruction
Request unlocking request, second user information related to user and the second electronic lock relevant to electronic lock of unlocking electronic lock
Information is sent to server 300.Wherein, the second electronics lock information is close with the unlocking of number and user setting for electronic lock
Code.Then terminal device 200 receives the instruction information that server 300 is sent.Wherein whether instruction information is used to indicate electronic lock
It opens, i.e. whether the finger print information of instruction user input is correct.Then the display of terminal device 200 instruction information.To user
100 can learn whether electronic lock opens success according to the instruction information that terminal device 200 is shown.And it is opened not in electronic lock
In successful situation, user 100 can learn the unsuccessful reason that causes to unlock according to instruction information.Such as: it unlocks unsuccessful
The reason of be that finger print information is not completed or fuzzy etc..In this way, allow user 100 according to instruction information instruction
Content is learnt and unlocks successfully, or unlocks in unsuccessful situation learning, for unsuccessful reason of unlocking, then carries out one
Secondary unlocking operation.
Optionally, further includes: the retrieval request of use information relevant to electronic lock is retrieved in the request for receiving user's input,
Wherein use information is the information that electronic lock generates during use;Retrieval request is sent to server;Receive service
The encrypted use information that device is sent;The key of user's input is received, and is carried out according to the use information after key pair encryption
Decryption;And the use information after display decryption.
Specifically, when user 100 has the demand for retrieving relevant to electronic lock use information, user 100 can be to
Terminal device 200 inputs retrieval request.At this point, terminal device 200 receives the retrieval request of user's input, and by retrieval request
It is sent to server 300.Then terminal device 200 receives the encrypted use information that server 300 is sent.At this point, user
After 100 need to be decrypted using the use information after key pair encryption, corresponding use information could be obtained.Then terminal
Equipment 200 receives the key that user 100 inputs, and is decrypted according to the use information after key pair encryption.And show decryption
Use information afterwards.To in this way, so that the user for only possessing key could obtain letter relevant to electronic lock
Breath, and then ensured the safety of information relevant to electronic lock.
In addition, refering to what is shown in Fig. 1, providing a kind of storage medium 104 in terms of according to the third of the present embodiment.Storage
Medium 104 includes the program of storage, wherein the method as described in processor execution any of the above one in program operation.
It should be noted that for the various method embodiments described above, for simple description, therefore, it is stated as a series of
Combination of actions, but those skilled in the art should understand that, the present invention is not limited by the sequence of acts described because
According to the present invention, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art should also know
It knows, the embodiments described in the specification are all preferred embodiments, and related actions and modules is not necessarily of the invention
It is necessary.
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation
The method of example can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but it is very much
In the case of the former be more preferably embodiment.Based on this understanding, technical solution of the present invention is substantially in other words to existing
The part that technology contributes can be embodied in the form of software products, which is stored in a storage
In medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, calculate
Machine, server or network equipment etc.) execute method described in each embodiment of the present invention.
Embodiment 2
Fig. 5 shows the information processing unit 500 according to the first aspect of the present embodiment based on block chain, should
Device 500 is corresponding with the method according to the first aspect of embodiment 1.Refering to what is shown in Fig. 5, the device 500 includes: note
Volume request receiving module 510, the registration request that electronic lock is registered in the request for receiving terminal apparatus transmission;First uses
Family data obtaining module 520, for obtaining the first user information relevant to the user of terminal device according to registration request;The
One electronic lock data obtaining module 530, for obtaining the first electronics lock information relevant to electronic lock;Generation module 540, is used for
According to the first user information, the first electronics lock information and predetermined cryptographic algorithm, encryption information is generated;And first memory module
550, for encryption information to be stored in the predetermined block of block chain.
Optionally, predetermined cryptographic algorithm is symmetric encipherment algorithm, and generation module 540 includes: generation submodule, is used for
According to the first user information, the first electronics lock information and symmetric encipherment algorithm, encryption information is generated.
Optionally, further includes: unlocking request receiving module, the request unlocking electronic lock sent for receiving terminal apparatus
It unlocks and requests;Second user information and the second electronic lock data obtaining module, request relevant user for obtaining and unlocking
Second user information and the second electronics lock information relevant to electronic lock;Determination module, for determining second user information
Whether matched with the second electronics lock information;And opening module, for determining second user information and the second electronics lock information
In the case where matching, unlocking electronic lock.
Optionally, determination module includes: decryption submodule, for encryption information to be decrypted, obtains the first user letter
Breath and the first electronics lock information;First decision sub-module, for determining whether the first user information includes second user information;
And second decision sub-module, for determining whether the first electronics lock information is consistent with the second electronics lock information.
Optionally, further includes: the first use information obtains module, for obtaining relevant to electronic lock first using letter
Breath, wherein the first use information is the information that electronic lock generates during use;And second memory module, for by the
One use information is stored in the predetermined block of block chain.
Optionally, further includes: retrieval request receiving module, the request retrieval sent for receiving terminal apparatus and electronic lock
The retrieval request of relevant second use information, wherein the first use information includes the second use information;Second use information obtains
Modulus block, for obtaining the second use information;And the second use information sending module, for the second use information to be sent to
Terminal device.
In addition, Fig. 6 shows the device for obtaining the electronic lock right to use according to the second aspect of the present embodiment
600, the device 600 is corresponding with the method according to the second aspect of embodiment 1.Refering to what is shown in Fig. 6, the device 600
It include: registration request receiving module 610, the request for receiving user's input is requested using the use of electronic lock;First sends
Module 620, for that request, the first user information related to user and the first electronic lock relevant to electronic lock will be used to believe
Breath is sent to server;First receiving module 630, for receiving the confirmation message of server transmission, wherein confirmation message is used for
Instruction distributes electronic lock to user;And confirmation message display module 640, for showing confirmation message.
Optionally, further includes: the second receiving module, the unlocking instruction of the unlocking electronic lock for receiving user's input;The
Two sending modules, for the unlocking of unlocking electronic lock will be requested to request, second user related to user in response to unlocking instruction
Information and the second electronics lock information relevant to electronic lock are sent to server;Third receiving module, for receiving server
The instruction information of transmission, wherein instruction information is used to indicate whether electronic lock is opened;And instruction information display module, for showing
Show instruction information.
Optionally, further includes: the 4th receiving module, the request retrieval for receiving user's input relevant to electronic lock make
With the retrieval request of information, wherein use information is the information that electronic lock generates during use;Third sending module is used
In retrieval request is sent to server;5th receiving module, for receiving the encrypted use information of server transmission;The
Six receiving modules for receiving the key of user's input, and are decrypted according to the use information after key pair encryption;And make
With information display module, for showing the use information after decryption.
To pass through the device of information processing unit 500 and acquisition electronic lock based on block chain according to the present embodiment
600, so that the data of all people for having electronic lock are stored on block chain, it is no longer rely on some Lock Factory and technology company comes
Safeguard data safety, the people of all participations is an one's share of expenses for a joint undertaking of block chain.Also, it is taken at other people and is stored in adding in block chain
After confidential information, the first user information and the first electronics lock information can not be directly obtained.Only possess encryption key
After user can be decrypted by key pair encryption information, the first user information and the first electronic lock letter could be obtained
Breath.Since the present embodiment has the characteristic that can not distort using block chain technology, and using Encryption Algorithm to user data into
Encryption is gone.Thus having reached user data relevant to electronic lock can not the person's of being destroyed technology for distorting, steal and losing
Effect.And then it solves existing user data relevant to electronic lock and is distorted, steals and lost by other people there is easy
Risk the technical issues of.
Embodiment 3
Fig. 7 shows the information processing unit 700 according to the first aspect of the present embodiment based on block chain, should
Device 700 is corresponding with the method according to the first aspect of embodiment 1.Refering to what is shown in Fig. 7, the device 700 includes:
One processor 710;And first memory 720, it is connect with first processor 710, for providing processing for first processor 710
The instruction of following processing step: the registration request that electronic lock is registered in the request that receiving terminal apparatus is sent;According to registration
Request obtains the first user information relevant to the user of terminal device;Obtain the first electronics lock information relevant to electronic lock;
According to the first user information, the first electronics lock information and predetermined cryptographic algorithm, encryption information is generated;And encryption information is deposited
It is stored in the predetermined block of block chain.
Optionally, predetermined cryptographic algorithm is symmetric encipherment algorithm, and generates the operation of encryption information, comprising: according to
One user information, the first electronics lock information and symmetric encipherment algorithm generate encryption information.
Optionally, first memory 720 is also used to provide the instruction for handling following processing step for first processor 710:
The unlocking request for the request unlocking electronic lock that receiving terminal apparatus is sent;Obtain the second user of user relevant to request of unlocking
Information and the second electronics lock information relevant to electronic lock;Determine second user information and the second electronics lock information whether
Match;And in the case where determining that second user information and the second electronics lock information match, unlocking electronic lock.
Optionally, determine second user information and the whether matched operation of the second electronics lock information, comprising: to encryption information
It is decrypted, obtains the first user information and the first electronics lock information;Determine whether the first user information includes second user
Information;And determine whether the first electronics lock information is consistent with the second electronics lock information.
Optionally, first memory 720 is also used to provide the instruction for handling following processing step for first processor 710:
The first use information relevant to electronic lock is obtained, wherein the first use information is the letter that electronic lock generates during use
Breath;And the first use information is stored in the predetermined block of block chain.
Optionally, first memory 720 is also used to provide the instruction for handling following processing step for first processor 710:
The retrieval request of the second use information relevant to electronic lock is retrieved in the request that receiving terminal apparatus is sent, wherein first uses letter
Breath includes the second use information;Obtain the second use information;And the second use information is sent to terminal device.
In addition, Fig. 8 shows the device for obtaining the electronic lock right to use according to the second aspect of the present embodiment
800, the device 800 is corresponding with the method according to the second aspect of embodiment 1.Refering to what is shown in Fig. 8, the device 800
It include: second processor 810;And second memory 820, it is connect with second processor 810, for being second processor 810
There is provided the instruction for handling following processing step: the request for receiving user's input is requested using the use of electronic lock;Will use request,
First user information related to user and the first electronics lock information relevant to electronic lock are sent to server;Receive service
The confirmation message that device is sent, wherein confirmation message, which is used to indicate, distributes electronic lock to user;And display confirmation message.
Optionally, second memory 820 is also used to provide the instruction for handling following processing step for second processor 810:
Receive the unlocking request and second user information related to user of the unlocking electronic lock of user's input;To unlock request, the
Two user informations and the second electronics lock information relevant to electronic lock are sent to server;Receive the instruction letter that server is sent
Breath, wherein instruction information is used to indicate whether electronic lock is opened;And display instruction information.
Optionally, second memory 820 is also used to provide the instruction for handling following processing step for second processor 810:
The retrieval request of use information relevant to electronic lock is retrieved in the request for receiving user's input, and wherein use information is that electronic lock exists
The information generated during use;Retrieval request is sent to server;Encrypted use that server is sent is received to believe
Breath;The key of user's input is received, and is decrypted according to the use information after key pair encryption;And make after display decryption
Use information.
To pass through the device of information processing unit 700 and acquisition electronic lock based on block chain according to the present embodiment
800, so that the data of all people for having electronic lock are stored on block chain, it is no longer rely on some Lock Factory and technology company comes
Safeguard data safety, the people of all participations is an one's share of expenses for a joint undertaking of block chain.Also, it is taken at other people and is stored in adding in block chain
After confidential information, the first user information and the first electronics lock information can not be directly obtained.Only possess encryption key
After user can be decrypted by key pair encryption information, the first user information and the first electronic lock letter could be obtained
Breath.Since the present embodiment has the characteristic that can not distort using block chain technology, and using Encryption Algorithm to user data into
Encryption is gone.Thus having reached user data relevant to electronic lock can not the person's of being destroyed technology for distorting, steal and losing
Effect.And then it solves existing user data relevant to electronic lock and is distorted, steals and lost by other people there is easy
Risk the technical issues of.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
In the above embodiment of the invention, it all emphasizes particularly on different fields to the description of each embodiment, does not have in some embodiment
The part of detailed description, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed technology contents can pass through others
Mode is realized.Wherein, the apparatus embodiments described above are merely exemplary, such as the division of the unit, only
A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or
Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual
Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of unit or module
It connects, can be electrical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially
The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words
It embodies, which is stored in a storage medium, including some instructions are used so that a computer
Equipment (can for personal computer, server or network equipment etc.) execute each embodiment the method for the present invention whole or
Part steps.And storage medium above-mentioned includes: that USB flash disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
Various Jie that can store program code such as reservoir (RAM, RandomAccess Memory), mobile hard disk, magnetic or disk
Matter.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered
It is considered as protection scope of the present invention.
Claims (10)
1. a kind of electronic lock information processing method based on block chain characterized by comprising
The registration request that electronic lock is registered in the request that receiving terminal apparatus is sent;
According to the registration request, the first user information relevant to the user of the terminal device is obtained;
Obtain the first electronics lock information relevant to the electronic lock;
According to first user information, the first electronics lock information and predetermined cryptographic algorithm, encryption information is generated;And
The encryption information is stored in the predetermined block of block chain.
2. the method according to claim 1, wherein the predetermined cryptographic algorithm be symmetric encipherment algorithm, and
Generate the operation of the encryption information, comprising:
According to first user information, the first electronics lock information and the symmetric encipherment algorithm, the encryption is generated
Information.
3. the method according to claim 1, wherein further include:
Receive the unlocking request that the electronic lock is opened in the request that the terminal device is sent;
The second user information of acquisition user relevant to the unlocking request and the second electronics relevant with the electronic lock
Lock information;
Determine whether the second user information matches with the second electronics lock information;And
In the case where determining that the second user information and the second electronics lock information match, the electronic lock is opened.
4. according to the method described in claim 3, it is characterized in that, determining the second user information and second electronic lock
The whether matched operation of information, comprising:
The encryption information is decrypted, first user information and the first electronics lock information are obtained;
Determine whether first user information includes the second user information;And
Determine whether the first electronics lock information is consistent with the second electronics lock information.
5. the method according to claim 1, wherein further include:
The first use information relevant to the electronic lock is obtained, wherein first use information is that the electronic lock is using
During the information that generates;And
First use information is stored in the predetermined block of the block chain.
6. according to the method described in claim 5, it is characterized by further comprising:
The retrieval request that the second use information relevant to the electronic lock is retrieved in the request that the terminal device is sent is received,
Described in the first use information include second use information;
Obtain second use information;And
Second use information is sent to the terminal device.
7. a kind of method for obtaining the electronic lock right to use characterized by comprising
The request for receiving user's input is requested using the use of electronic lock;
Request, the first user information relevant to the user and the first electronics relevant with the electronic lock are used by described
Lock information is sent to server;
Receive the confirmation message that the server is sent, wherein the confirmation message be used to indicate by the electronic lock distribute to
The user;And
Show the confirmation message.
8. the method according to the description of claim 7 is characterized in that further include:
Receive the unlocking instruction of the unlatching electronic lock of user's input;
In response to the unlocking instruction, the unlocking that the electronic lock is opened in request is requested, relevant to the user second uses
Family information and the second electronics lock information relevant to the electronic lock are sent to the server;
The instruction information that the server is sent is received, wherein the instruction information is used to indicate whether the electronic lock is opened;
And
Show the instruction information.
9. the method according to the description of claim 7 is characterized in that further include:
The retrieval request of use information relevant to the electronic lock is retrieved in the request for receiving user's input, wherein described make
It is the information that the electronic lock generates during use with information;
The retrieval request is sent to the server;
Receive the encrypted use information that the server is sent;
The key of user's input is received, and is decrypted according to the use information after the key pair encryption;And
The use information after display decryption.
10. a kind of storage medium, which is characterized in that the storage medium includes the program of storage, wherein run in described program
When as processor perform claim require any one of 1 to 9 described in method.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201811525827.9A CN109377626A (en) | 2018-12-13 | 2018-12-13 | The method of electronic lock information processing and the acquisition electronic lock right to use based on block chain |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201811525827.9A CN109377626A (en) | 2018-12-13 | 2018-12-13 | The method of electronic lock information processing and the acquisition electronic lock right to use based on block chain |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN109377626A true CN109377626A (en) | 2019-02-22 |
Family
ID=65373708
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201811525827.9A Pending CN109377626A (en) | 2018-12-13 | 2018-12-13 | The method of electronic lock information processing and the acquisition electronic lock right to use based on block chain |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN109377626A (en) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110136307A (en) * | 2019-05-17 | 2019-08-16 | 袁园 | A kind of access control system with authentication based on block chain technology |
| CN110211263A (en) * | 2019-05-23 | 2019-09-06 | 烽火通信科技股份有限公司 | A kind of intelligent door method for unlocking and system based on block chain technology |
| CN111861613A (en) * | 2019-05-19 | 2020-10-30 | 北京骑胜科技有限公司 | Electronic lock operation recording method and device |
| CN112052660A (en) * | 2020-09-07 | 2020-12-08 | 深圳壹账通智能科技有限公司 | Resource auditing method and device based on decentralization, computer equipment and medium |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103971435A (en) * | 2014-05-22 | 2014-08-06 | 广东欧珀移动通信有限公司 | Unlocking method, server, mobile terminal, electronic lock and unlocking system |
| CN106652109A (en) * | 2015-10-30 | 2017-05-10 | 东莞酷派软件技术有限公司 | Intelligent lock control method, device and lock management server |
| CN107331012A (en) * | 2017-07-04 | 2017-11-07 | 济南浪潮高新科技投资发展有限公司 | A kind of finger vein gate control system based on block chain |
| KR101875725B1 (en) * | 2017-04-12 | 2018-07-06 | 서강대학교산학협력단 | Smart door lock system, smart door lock and terminal for controlling the smart door lock |
| CN108564692A (en) * | 2018-04-10 | 2018-09-21 | 周伟 | A kind of unlock verification method and system for unlocking based on block chain |
| CN108629337A (en) * | 2018-06-11 | 2018-10-09 | 深圳市益鑫智能科技有限公司 | A kind of face recognition door control system based on block chain |
| CN108830983A (en) * | 2018-05-29 | 2018-11-16 | 广州蛙管家科技有限公司 | A kind of access control system and its working method based on block chain |
-
2018
- 2018-12-13 CN CN201811525827.9A patent/CN109377626A/en active Pending
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103971435A (en) * | 2014-05-22 | 2014-08-06 | 广东欧珀移动通信有限公司 | Unlocking method, server, mobile terminal, electronic lock and unlocking system |
| CN106652109A (en) * | 2015-10-30 | 2017-05-10 | 东莞酷派软件技术有限公司 | Intelligent lock control method, device and lock management server |
| KR101875725B1 (en) * | 2017-04-12 | 2018-07-06 | 서강대학교산학협력단 | Smart door lock system, smart door lock and terminal for controlling the smart door lock |
| CN107331012A (en) * | 2017-07-04 | 2017-11-07 | 济南浪潮高新科技投资发展有限公司 | A kind of finger vein gate control system based on block chain |
| CN108564692A (en) * | 2018-04-10 | 2018-09-21 | 周伟 | A kind of unlock verification method and system for unlocking based on block chain |
| CN108830983A (en) * | 2018-05-29 | 2018-11-16 | 广州蛙管家科技有限公司 | A kind of access control system and its working method based on block chain |
| CN108629337A (en) * | 2018-06-11 | 2018-10-09 | 深圳市益鑫智能科技有限公司 | A kind of face recognition door control system based on block chain |
Cited By (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110136307A (en) * | 2019-05-17 | 2019-08-16 | 袁园 | A kind of access control system with authentication based on block chain technology |
| CN111861613A (en) * | 2019-05-19 | 2020-10-30 | 北京骑胜科技有限公司 | Electronic lock operation recording method and device |
| CN111861613B (en) * | 2019-05-19 | 2024-04-16 | 北京骑胜科技有限公司 | Electronic lock operation recording method and device |
| CN110211263A (en) * | 2019-05-23 | 2019-09-06 | 烽火通信科技股份有限公司 | A kind of intelligent door method for unlocking and system based on block chain technology |
| CN110211263B (en) * | 2019-05-23 | 2021-05-14 | 烽火通信科技股份有限公司 | Intelligent door unlocking method and system based on block chain technology |
| CN112052660A (en) * | 2020-09-07 | 2020-12-08 | 深圳壹账通智能科技有限公司 | Resource auditing method and device based on decentralization, computer equipment and medium |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN109377626A (en) | The method of electronic lock information processing and the acquisition electronic lock right to use based on block chain | |
| KR0143568B1 (en) | How to identify a portable object with an offline terminal and a device using the method | |
| US20190356472A1 (en) | Blockchain-implemented method and system | |
| US8832453B2 (en) | Token recycling | |
| CN104769602B (en) | Method and system for authentication-access request | |
| CN100380356C (en) | Machine Authentication System | |
| CN109257342A (en) | Authentication method, system, server and readable storage medium storing program for executing of the block chain across chain | |
| CN106664311A (en) | Supporting differentiated secure communications among heterogeneous electronic devices | |
| US20070067835A1 (en) | Remote unblocking with a security agent | |
| CN207409010U (en) | The newer temporary password access control system of encryption parameter dynamic | |
| CN109064169A (en) | Method of commerce, equipment and storage medium | |
| CN101517562A (en) | Method for registering and certificating user of one time password by a plurality of mode and computer-readable recording medium where program executing the same method is recorded | |
| CN108711209A (en) | dynamic password generation and verification method and system | |
| CN108768963A (en) | The communication means and system of trusted application and safety element | |
| CN107004077A (en) | Method and system for providing safe and independently operable biological characteristic authentication | |
| CN110895839A (en) | Intelligent door lock unlocking method and device in network-free state | |
| CA3184856A1 (en) | Method, participatant unit, transaction register, and payment system for managing transaction data sets | |
| CN108667791A (en) | Identity authentication method | |
| CN107920052A (en) | A kind of encryption method and intelligent apparatus | |
| CN104954132A (en) | Information processing apparatus, information processing method, and recording medium | |
| CN106650372B (en) | The activating method and device of administrator right | |
| WO2009069872A1 (en) | System and method for authenticating one-time virtual secret information | |
| CN109075972A (en) | Password anti-theft authentication and encryption system and method | |
| US6606387B1 (en) | Secure establishment of cryptographic keys | |
| CN109088729A (en) | Key storage method and device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190222 |
|
| RJ01 | Rejection of invention patent application after publication |