+

CN109377626A - The method of electronic lock information processing and the acquisition electronic lock right to use based on block chain - Google Patents

The method of electronic lock information processing and the acquisition electronic lock right to use based on block chain Download PDF

Info

Publication number
CN109377626A
CN109377626A CN201811525827.9A CN201811525827A CN109377626A CN 109377626 A CN109377626 A CN 109377626A CN 201811525827 A CN201811525827 A CN 201811525827A CN 109377626 A CN109377626 A CN 109377626A
Authority
CN
China
Prior art keywords
information
electronic lock
user
lock
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811525827.9A
Other languages
Chinese (zh)
Inventor
王欣
江少明
陈立
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Yunge Artificial Intelligence Technology Co Ltd
Original Assignee
Shenzhen Yunge Artificial Intelligence Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Yunge Artificial Intelligence Technology Co Ltd filed Critical Shenzhen Yunge Artificial Intelligence Technology Co Ltd
Priority to CN201811525827.9A priority Critical patent/CN109377626A/en
Publication of CN109377626A publication Critical patent/CN109377626A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

This application discloses a kind of electronic lock information processing based on block chain and the methods for obtaining the electronic lock right to use.Wherein, based on the electronic lock information processing method of block chain, comprising: the registration request that electronic lock is registered in the request that receiving terminal apparatus is sent;According to the registration request, the first user information relevant to the user of the terminal device is obtained;Obtain the first electronics lock information relevant to the electronic lock;According to first user information, the first electronics lock information and predetermined cryptographic algorithm, encryption information is generated;And the encryption information is stored in the predetermined block of block chain.Having reached user data relevant to electronic lock can not the person's of being destroyed technical effect for distorting, steal and losing.And then it solves existing user data relevant to electronic lock and there is technical issues that easy to be distorted, steal and lose by other people.

Description

The method of electronic lock information processing and the acquisition electronic lock right to use based on block chain
Technical field
This application involves block chain fields, more particularly to a kind of electronic lock information processing based on block chain and obtain electricity The method of the son lock right to use.
Background technique
There are various locksets in the prior art, wherein electronic lock is deeply loved by the public.Electronic lock will unlock, Electron key must be used.Used in daily life is numerical value key, such as fingerprint, sound, shape of face, number etc..Also, The data of all people for possessing electronic lock depend on some Lock Factory and technology company to safeguard data safety.Therefore and electronic lock Relevant data safety all relies on the credit of some Lock Factory and technology company, exists simultaneously number relevant to electronic lock It is distorted or is stolen by other people according to easy, once the problem of Lock Factory's bankruptcy can also lose data.
For above-mentioned existing user data relevant to electronic lock existing in the prior art, there is be easy by him The technical issues of risk that people distorts, steals and loses, currently no effective solution has been proposed.
Summary of the invention
Embodiment of the disclosure provides a kind of electronic lock information processing based on block chain and obtains the electronic lock right to use Method, apparatus and storage medium, at least to solve existing number of users relevant to electronic lock existing in the prior art According to there is technical issues that be easy by other people to be distorted, steal and lost.
According to the one aspect of the embodiment of the present disclosure, a kind of electronic lock information processing method based on block chain is provided, It include: the registration request that electronic lock is registered in the request of receiving terminal apparatus transmission;According to registration request, acquisition and terminal Relevant first user information of the user of equipment;Obtain the first electronics lock information relevant to electronic lock;Believed according to the first user Breath, the first electronics lock information and predetermined cryptographic algorithm generate encryption information;And encryption information is stored in the pre- of block chain Determine block.
According to the other side of the embodiment of the present disclosure, a kind of method for obtaining electronic lock is additionally provided, comprising: receive and use The request of family input is requested using the use of electronic lock;Will use request, the first user information related to user and with electricity Son locks relevant first electronics lock information and is sent to server;The confirmation message that server is sent is received, wherein confirmation message is used Electronic lock has been distributed to user in instruction;And display confirmation message.
According to the other side of the embodiment of the present disclosure, a kind of storage medium is additionally provided, storage medium includes storage Program, wherein the method as described in processor execution any of the above one in program operation.
According to the other side of the embodiment of the present disclosure, a kind of electronic lock information processing apparatus based on block chain is additionally provided It sets, comprising: registration request receiving module, the registration request for the request electronic lock that receiving terminal apparatus is sent;First User profile acquisition module, for obtaining the first user information relevant to the user of terminal device according to registration request;First Electronic lock data obtaining module, for obtaining the first electronics lock information relevant to electronic lock;Generation module, for according to first User information, the first electronics lock information and predetermined cryptographic algorithm generate encryption information;And first memory module, for will Encryption information is stored in the predetermined block of block chain.
According to the other side of the embodiment of the present disclosure, a kind of device for obtaining electronic lock is additionally provided, comprising: registration is asked Receiving module is sought, the registration request of the acquisition electronic lock for receiving user's input;First sending module is asked for that will register It asks, the first user information related to user and the first electronics lock information relevant to electronic lock are sent to server;First Receiving module, for receiving the confirmation message of server transmission, wherein confirmation message, which is used to indicate, distributes electronic lock to use Family;And confirmation message display module, for showing confirmation message.
According to the other side of the embodiment of the present disclosure, a kind of electronic lock information processing apparatus based on block chain is additionally provided It sets, comprising: first processor;And first memory, connect with first processor, for for first processor provide processing with The instruction of lower processing step: the registration request for the request electronic lock that receiving terminal apparatus is sent;According to registration request, obtain The first user information relevant to the user of terminal device;Obtain the first electronics lock information relevant to electronic lock;According to first User information, the first electronics lock information and predetermined cryptographic algorithm generate encryption information;And encryption information is stored in block The predetermined block of chain.
According to the other side of the embodiment of the present disclosure, a kind of device for obtaining electronic lock is additionally provided, comprising: at second Manage device;And second memory, it is connect with second processor, for providing the finger for handling following processing step for second processor It enables: receiving the registration request of the acquisition electronic lock of user's input;By registration request, the first user information related to user and The first electronics lock information relevant to electronic lock is sent to server;The confirmation message that server is sent is received, wherein confirmation letter Breath, which is used to indicate, distributes electronic lock to user;And display confirmation message.
Detailed description of the invention
Attached drawing described herein is used to provide further understanding of the disclosure, constitutes part of this application, this public affairs The illustrative embodiments and their description opened do not constitute the improper restriction to the disclosure for explaining the disclosure.In the accompanying drawings:
Fig. 1 is [terminal (or mobile device)] for realizing the method according to the embodiment of the present disclosure 1 Hardware block diagram;
Fig. 2 is that the electronic lock information processing and acquisition electronic lock according to the embodiment of the present disclosure 1 based on block chain make With the schematic diagram of the system of the method for power;
Fig. 3 is the electronic lock information processing side according to the first aspect of the embodiment of the present disclosure 1 based on block chain The flow diagram of method;
Fig. 4 is the process that the method for the electronic lock right to use is obtained according to the second aspect of the embodiment of the present disclosure 1 Schematic diagram;
Fig. 5 is the electronic lock information processing apparatus according to the first aspect of the embodiment of the present disclosure 2 based on block chain The schematic diagram set;
Fig. 6 is the signal that the device of the electronic lock right to use is obtained according to the second aspect of the embodiment of the present disclosure 2 Figure;
Fig. 7 is the electronic lock information processing apparatus according to the first aspect of the embodiment of the present disclosure 3 based on block chain The schematic diagram set;And
Fig. 8 is the signal that the device of the electronic lock right to use is obtained according to the second aspect of the embodiment of the present disclosure 3 Figure.
Specific embodiment
In order to make those skilled in the art more fully understand the technical solution of the disclosure, implement below in conjunction with the disclosure Attached drawing in example, is clearly and completely described the technical solution in the embodiment of the present disclosure.Obviously, described embodiment The only embodiment of disclosure a part, instead of all the embodiments.Based on the embodiment in the disclosure, this field is common Disclosure protection all should belong in technical staff's every other embodiment obtained without making creative work Range.
It should be noted that the specification and claims of the disclosure and term " first " in above-mentioned attached drawing, " Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way Data be interchangeable under appropriate circumstances, so as to embodiment of the disclosure described herein can in addition to illustrating herein or Sequence other than those of description is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that cover Cover it is non-exclusive include, for example, the process, method, system, product or equipment for containing a series of steps or units are not necessarily limited to Step or unit those of is clearly listed, but may include be not clearly listed or for these process, methods, product Or other step or units that equipment is intrinsic.
Embodiment 1
According to the present embodiment, provides a kind of electronic lock information processing based on block chain and obtain the electronic lock right to use Embodiment of the method, it should be noted that step shown in the flowchart of the accompanying drawings can be in the executable finger of such as one group of computer It is executed in the computer system of order, although also, logical order is shown in flow charts, and it in some cases, can be with The steps shown or described are performed in an order that is different from the one herein.
Embodiment of the method provided by the present embodiment can be in mobile terminal, terminal or similar arithmetic unit Middle execution.Fig. 1 shows a kind of electronic lock information processing for realizing based on block chain and obtains the side of the electronic lock right to use The hardware block diagram of the terminal (or mobile device) of method.As shown in Figure 1, terminal 10 (or mobile device 10) It may include that (processor 102 can be with for one or more (using 102a, 102b ... ... in figure, 102n to show) processors 102 The including but not limited to processing unit of Micro-processor MCV or programmable logic device FPGA etc.), memory for storing data 104 and for communication function transmission module 106.It in addition to this, can also include: display, input/output interface (I/ O Interface), the port universal serial bus (USB) (a port that can be used as in the port of I/O interface is included), network connect Mouth, power supply and/or camera.It will appreciated by the skilled person that structure shown in FIG. 1 is only to illustrate, not to upper The structure for stating electronic device causes to limit.For example, terminal 10 may also include than shown in Fig. 1 more or less groups Part, or with the configuration different from shown in Fig. 1.
It is to be noted that said one or multiple processors 102 and/or other data processing circuits lead to herein Can often " data processing circuit " be referred to as.The data processing circuit all or part of can be presented as software, hardware, firmware Or any other combination.In addition, data processing circuit for single independent processing module or all or part of can be integrated to meter In any one in other elements in calculation machine terminal 10 (or mobile device).As involved in the embodiment of the present disclosure, The data processing circuit controls (such as the selection for the variable resistance end path connecting with interface) as a kind of processor.
Memory 104 can be used for storing the software program and module of application software, as in the embodiment of the present disclosure based on The electronic lock information processing of block chain and the corresponding program instruction/data storage device of method for obtaining the electronic lock right to use, place The software program and module that reason device 102 is stored in memory 104 by operation, thereby executing various function application and number According to processing, that is, realize the side of the electronic lock information processing and the acquisition electronic lock right to use based on block chain of above-mentioned application program Method.Memory 104 may include high speed random access memory, may also include nonvolatile memory, as one or more magnetism is deposited Storage device, flash memory or other non-volatile solid state memories.In some instances, memory 104 can further comprise opposite In the remotely located memory of processor 102, these remote memories can pass through network connection to terminal 10.It is above-mentioned The example of network includes but is not limited to internet, intranet, local area network, mobile radio communication and combinations thereof.
Transmitting device 106 is used to that data to be received or sent via a network.Above-mentioned network specific example may include The wireless network that the communication providers of terminal 10 provide.In an example, transmitting device 106 includes that a network is suitable Orchestration (Network Interface Controller, NIC), can be connected by base station with other network equipments so as to Internet is communicated.In an example, transmitting device 106 can be radio frequency (Radio Frequency, RF) module, For wirelessly being communicated with internet.
Display can such as touch-screen type liquid crystal display (LCD), the liquid crystal display aloow user with The user interface of terminal 10 (or mobile device) interacts.
Herein it should be noted that in some optional embodiments, above-mentioned computer equipment shown in FIG. 1 (or movement is set It is standby) it may include hardware element (including circuit), software element (including the computer generation that may be stored on the computer-readable medium Code) or both hardware element and software element combination.It should be pointed out that Fig. 1 is only a reality of particular embodiment Example, and it is intended to show that the type for the component that may be present in above-mentioned computer equipment (or mobile device).
Fig. 2 is the electronic lock information processing and the acquisition electronic lock right to use according to this present embodiment based on block chain System schematic diagram.Referring to shown in Fig. 2, which includes: terminal device 200 and server 300.Wherein server 300 Upper operation has block chain.In the case where user 100 is with the demand registered to electronic lock, user 100 can pass through end The transmission of end equipment 200 requests the registration request registered to electronic lock to server 300.Then server 300 is based on the note Volume request, user 100 is associated with electronic lock, and will be associated with obtained related information and be stored to running on server 300 On block chain predetermined block in.Then, server 300 sends the information that is successfully associated to terminal device 200, it means that The electronic lock is allocated to user 100 by server 300, i.e. user 100 obtains the electronic lock.It should be noted that system In the applicable hardware configuration recited above of terminal device 200 and server 300.
Under above-mentioned running environment, according to the first aspect of the present embodiment, a kind of information based on block chain is provided Processing method, this method are realized by server 300 shown in Fig. 2.Fig. 3 shows the flow diagram of this method, with reference to Fig. 3 It is shown, this method comprises:
S302: the registration request for the request electronic lock that receiving terminal apparatus is sent;
S304: according to registration request, the first user information relevant to the user of terminal device is obtained;
S306: the first electronics lock information relevant to electronic lock is obtained;
S308: according to the first user information, the first electronics lock information and predetermined cryptographic algorithm, encryption information is generated;With And
S310: encryption information is stored in the predetermined block of block chain.
As described in background, the data of existing all people for possessing electronic lock depend on some Lock Factory Data safety is safeguarded with technology company.Therefore data safety relevant to electronic lock all relies on some Lock Factory and technology The credit of company exists simultaneously data relevant to electronic lock and is easy to be distorted or stolen by other people, also can once Lock Factory closes down Lose data.
Therefore, for the relevant user data of above-mentioned existing and electronic lock, there is be easy to be distorted by other people, steal And lose risk the technical issues of, and refering to what is shown in Fig. 2, the user 100 in terminal device 200 has and obtains electronic lock In the case where demand, user 100 can send the registration request that electronic lock is registered in request by terminal device 200 and extremely take Business device 300.The present embodiment registers electronic lock by the request that 300 receiving terminal apparatus 200 of server is sent at this time Registration request.Then server 300 obtains first user letter relevant to the user 100 of terminal device 200 according to registration request Breath.Wherein the first user information can be phone number, fingerprint and the identification card number etc. of user.
Further, server 300 is in the case where obtaining to 100 relevant first user information of user, it is also necessary to Obtain the first electronics lock information relevant to electronic lock.Wherein the first electronics lock information can be number and the user of electronic lock Unlocking cipher or initial password of setting etc..Then first user information, first electronics lock information of the server 300 according to acquisition And scheduled Encryption Algorithm, generate encryption information.Wherein scheduled Encryption Algorithm can be symmetric encipherment algorithm.Then it services The encryption information that encryption obtains is stored in the predetermined block of the block chain run on server 300 by device 300.Such as: clothes Business device 300 after the processing of scheduled Encryption Algorithm, obtains encryption key, the first user information and the first electronics lock information It is stored in the predetermined block of block chain to encryption information, then by encryption information.
In this way, it so that the data of all people for having electronic lock are stored on block chain, is no longer rely on a certain A Lock Factory and technology company safeguard data safety, and the people of all participations is an one's share of expenses for a joint undertaking of block chain.Also, it takes at other people It is stored in after the encryption information in block chain, can not directly obtain the first user information and the first electronics lock information. Only possess encryption key user 100 can be decrypted by key pair encryption information after, could obtain first use Family information and the first electronics lock information.Since the present embodiment has the characteristic that can not be distorted using block chain technology, and make User data is encrypted with Encryption Algorithm.Thus reached user data relevant to electronic lock can not the person of being destroyed usurp The technical effect for changing, stealing and losing.Solving existing user data relevant to electronic lock in turn, there is easy quilts The technical issues of risk that other people distort, steal and lose.
Optionally, predetermined cryptographic algorithm is symmetric encipherment algorithm, and generates the operation of encryption information, comprising: according to One user information, the first electronics lock information and symmetric encipherment algorithm generate encryption information.Specifically, predetermined cryptographic algorithm is Symmetric encipherment algorithm, then server 300 is by encryption key, the first user information and the first electronics lock information by scheduled After Encryption Algorithm processing, encryption information is generated.Due to using symmetric encipherment algorithm, thus for encryption key be used for solve Close key is identical key.Therefore the computational complexity of ciphering process can be reduced, the speed of encryption and decryption is improved.
Optionally, further includes: the unlocking request for the request unlocking electronic lock that receiving terminal apparatus is sent;Acquisition is asked with unlocking Ask the second user information and the second electronics lock information relevant to electronic lock of relevant user;Determine second user information with Whether the second electronics lock information matches;And in the case where determining that second user information and the second electronics lock information match, Unlocking electronic lock.
Specifically, when user 100 has the demand of unlocking electronic lock, user 100 can be sent by terminal device 200 and be asked The unlatching of unlocking electronic lock is asked to request to be sent to server 300.The unlocking that 300 receiving terminal apparatus 200 of server is sent at this time Request, then server 300 obtains and the second user information of the relevant user 100 of unlocking request and relevant with electronic lock Second electronics lock information.Wherein second user information can be therein any one for user mobile phone number, fingerprint and identification card number , and the second electronics lock information can be the number of electronic lock and the unlocking cipher of user setting.Then server 300 is sentenced Determine whether second user information matches with the second electronics lock information.Due to servicing when 100 request electronic lock of user The first user information of user is associated with by device 300 with the first electronics lock information of electronic lock.At this point, server 300 need to determine whether in the first user information being stored in block chain include second user information and the first electronics Whether lock information and the second electronics lock information are consistent.Second user information and the second electronic lock item of information are determined in server 300 In matched situation, i.e., server 300 determines that the first user information includes second user information and the first electronics lock information It is consistent with the second electronics lock information, 300 unlocking electronic lock of server.In this way, ensured electronic lock in the mistake used Safety and preciseness in journey.To further ensure the personal safety and property safety of user.
Optionally, determine second user information and the whether matched operation of the second electronics lock information, comprising: to encryption information It is decrypted, obtains the first user information and the first electronics lock information;Determine whether the first user information includes second user Information;And determine whether the first electronics lock information is consistent with the second electronics lock information.
Specifically, server 300 determines second user information and the whether matched operation of the second electronics lock information, comprising: Server 300 can be according to encryption key and scheduled Encryption Algorithm to the encryption information being stored in the predetermined block of block chain It is decrypted, then obtains the first user information and the first electronics lock information.Then the judgement of server 30 is stored in block chain In the first user information in whether include that second user information and the first electronics lock information are with the second electronics lock information It is no consistent.To in this way, allow server 300 according to the first user information and the first electronics lock information Determine whether unlocking electronic lock, and then ensures the safety of electronic lock during use.
Optionally, further includes: the first use information relevant to electronic lock is obtained, wherein the first use information is electronic lock The information generated during use;And the first use information is stored in the predetermined block of block chain.
Specifically, server 300 obtains the first use information relevant to electronic lock.Wherein the first use information can wrap It includes: using the object of electronic lock, using time and access times etc..Then the first use information is stored in by server 300 In the predetermined block of block chain.In this way, so that user is stored in block chain using the information of electronic lock every time, It has ensured that use information relevant to electronic lock can not distort, while also providing subsequent query service for user.
Optionally, further includes: the second use information relevant to electronic lock is retrieved in the request that receiving terminal apparatus is sent Retrieval request, wherein the first use information includes the second use information;Obtain the second use information;And by the second use information It is sent to terminal device.
Specifically, when user 100 has the demand of the access times of electronic lock in retrieval nearly one month, user 100 can To send retrieval request to server 300 by terminal device 200.At this point, the request that server receiving terminal equipment 200 is sent Retrieve the second use information (access times of electronic lock in one month i.e. nearly) relevant to electronic lock.Then server 300 obtains The access times (i.e. the second use information) of the electronic lock in nearly one month are taken, such as: the use time in electronic lock nearly one month Number is 60 times.Then the second use information is sent to terminal device 200 by server 300.To, in this way, so that User 100 can retrieve use information relevant to electronic lock at any time.And then by the service condition of monitoring electronic lock, reach Monitor the effect of itself personal safety and property safety.
In addition, providing a kind of method for obtaining the electronic lock right to use, this method according to the second aspect of the present embodiment It is realized by terminal device 200 shown in Fig. 2.Fig. 4 shows the flow diagram of this method, refering to what is shown in Fig. 4, this method packet It includes:
S402: the use request of the request electronic lock of user's input is received;
S404: request, the first user information related to user and the first electronic lock relevant to electronic lock will be used Information is sent to server;
S406: the confirmation message that server is sent is received, wherein confirmation message, which is used to indicate, distributes electronic lock to use Family;And
S408: display confirmation message.
Specifically, in the case where user has the demand for obtaining electronic lock, user 100 asks to the input of terminal device 200 Ask the use request for obtaining electronic lock.At this point, terminal device 200 receives the use request that user 100 inputs.Then terminal device 200 by this using requesting, relevant to user 100 first user information (such as: cell-phone number, fingerprint and the identity of user 100 Demonstrate,prove number etc.) and the first electronics lock information relevant to electronic lock (such as: the number and initial password of electronic lock) it sends To server 300.Wherein, operation has block chain on server 300.Then terminal device 200 receives server 300 and sends really Recognize information, wherein confirmation message is used to indicate server 300 and distributes electronic lock to user 100.Wherein server 300 will Electronic lock, which is distributed to user 100, means that user 100 obtains electronic lock.Then terminal device 200 shows the confirmation message.This When, user 100 can by browsing terminal equipment 200 show confirmation message, learn oneself obtain electronic lock and with electricity Son locks relevant information.
To which in this way, the first user information and the first electronics lock information are sent to by terminal device Server 300 allows server 300 that the first user information received and the first electronics lock information are stored in operation In the block chain on server 300.And then there is the characteristic that can not be distorted according to block chain technology, reach and electronics locking phase The user data of pass can not the person's of being destroyed technical effect for distorting, steal and losing.And then solves existing and electronic lock Relevant user data there is technical issues that be easy to be distorted, steal and lose by other people.
Optionally, further includes: receive the unlocking instruction of the unlocking electronic lock of user's input;In response to unlocking instruction, will ask The unlocking of unlocking electronic lock is asked to request, second user information related to user and the second electronic lock relevant to electronic lock letter Breath is sent to server;The instruction information that server is sent is received, wherein instruction information is used to indicate whether electronic lock is opened;With And display instruction information.
Specifically, there is when needing of unlocking electronic lock in user 100, user 100 inputs finger print information to terminal device And unlocking instruction.At this point, terminal device 200 receives unlocking instruction and and the user for the unlocking electronic lock that user 100 inputs 100 relevant second user information (i.e. the finger print information of user 100).Then, terminal device 200, will in response to unlocking instruction Request unlocking request, second user information related to user and the second electronic lock relevant to electronic lock of unlocking electronic lock Information is sent to server 300.Wherein, the second electronics lock information is close with the unlocking of number and user setting for electronic lock Code.Then terminal device 200 receives the instruction information that server 300 is sent.Wherein whether instruction information is used to indicate electronic lock It opens, i.e. whether the finger print information of instruction user input is correct.Then the display of terminal device 200 instruction information.To user 100 can learn whether electronic lock opens success according to the instruction information that terminal device 200 is shown.And it is opened not in electronic lock In successful situation, user 100 can learn the unsuccessful reason that causes to unlock according to instruction information.Such as: it unlocks unsuccessful The reason of be that finger print information is not completed or fuzzy etc..In this way, allow user 100 according to instruction information instruction Content is learnt and unlocks successfully, or unlocks in unsuccessful situation learning, for unsuccessful reason of unlocking, then carries out one Secondary unlocking operation.
Optionally, further includes: the retrieval request of use information relevant to electronic lock is retrieved in the request for receiving user's input, Wherein use information is the information that electronic lock generates during use;Retrieval request is sent to server;Receive service The encrypted use information that device is sent;The key of user's input is received, and is carried out according to the use information after key pair encryption Decryption;And the use information after display decryption.
Specifically, when user 100 has the demand for retrieving relevant to electronic lock use information, user 100 can be to Terminal device 200 inputs retrieval request.At this point, terminal device 200 receives the retrieval request of user's input, and by retrieval request It is sent to server 300.Then terminal device 200 receives the encrypted use information that server 300 is sent.At this point, user After 100 need to be decrypted using the use information after key pair encryption, corresponding use information could be obtained.Then terminal Equipment 200 receives the key that user 100 inputs, and is decrypted according to the use information after key pair encryption.And show decryption Use information afterwards.To in this way, so that the user for only possessing key could obtain letter relevant to electronic lock Breath, and then ensured the safety of information relevant to electronic lock.
In addition, refering to what is shown in Fig. 1, providing a kind of storage medium 104 in terms of according to the third of the present embodiment.Storage Medium 104 includes the program of storage, wherein the method as described in processor execution any of the above one in program operation.
It should be noted that for the various method embodiments described above, for simple description, therefore, it is stated as a series of Combination of actions, but those skilled in the art should understand that, the present invention is not limited by the sequence of acts described because According to the present invention, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art should also know It knows, the embodiments described in the specification are all preferred embodiments, and related actions and modules is not necessarily of the invention It is necessary.
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation The method of example can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but it is very much In the case of the former be more preferably embodiment.Based on this understanding, technical solution of the present invention is substantially in other words to existing The part that technology contributes can be embodied in the form of software products, which is stored in a storage In medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, calculate Machine, server or network equipment etc.) execute method described in each embodiment of the present invention.
Embodiment 2
Fig. 5 shows the information processing unit 500 according to the first aspect of the present embodiment based on block chain, should Device 500 is corresponding with the method according to the first aspect of embodiment 1.Refering to what is shown in Fig. 5, the device 500 includes: note Volume request receiving module 510, the registration request that electronic lock is registered in the request for receiving terminal apparatus transmission;First uses Family data obtaining module 520, for obtaining the first user information relevant to the user of terminal device according to registration request;The One electronic lock data obtaining module 530, for obtaining the first electronics lock information relevant to electronic lock;Generation module 540, is used for According to the first user information, the first electronics lock information and predetermined cryptographic algorithm, encryption information is generated;And first memory module 550, for encryption information to be stored in the predetermined block of block chain.
Optionally, predetermined cryptographic algorithm is symmetric encipherment algorithm, and generation module 540 includes: generation submodule, is used for According to the first user information, the first electronics lock information and symmetric encipherment algorithm, encryption information is generated.
Optionally, further includes: unlocking request receiving module, the request unlocking electronic lock sent for receiving terminal apparatus It unlocks and requests;Second user information and the second electronic lock data obtaining module, request relevant user for obtaining and unlocking Second user information and the second electronics lock information relevant to electronic lock;Determination module, for determining second user information Whether matched with the second electronics lock information;And opening module, for determining second user information and the second electronics lock information In the case where matching, unlocking electronic lock.
Optionally, determination module includes: decryption submodule, for encryption information to be decrypted, obtains the first user letter Breath and the first electronics lock information;First decision sub-module, for determining whether the first user information includes second user information; And second decision sub-module, for determining whether the first electronics lock information is consistent with the second electronics lock information.
Optionally, further includes: the first use information obtains module, for obtaining relevant to electronic lock first using letter Breath, wherein the first use information is the information that electronic lock generates during use;And second memory module, for by the One use information is stored in the predetermined block of block chain.
Optionally, further includes: retrieval request receiving module, the request retrieval sent for receiving terminal apparatus and electronic lock The retrieval request of relevant second use information, wherein the first use information includes the second use information;Second use information obtains Modulus block, for obtaining the second use information;And the second use information sending module, for the second use information to be sent to Terminal device.
In addition, Fig. 6 shows the device for obtaining the electronic lock right to use according to the second aspect of the present embodiment 600, the device 600 is corresponding with the method according to the second aspect of embodiment 1.Refering to what is shown in Fig. 6, the device 600 It include: registration request receiving module 610, the request for receiving user's input is requested using the use of electronic lock;First sends Module 620, for that request, the first user information related to user and the first electronic lock relevant to electronic lock will be used to believe Breath is sent to server;First receiving module 630, for receiving the confirmation message of server transmission, wherein confirmation message is used for Instruction distributes electronic lock to user;And confirmation message display module 640, for showing confirmation message.
Optionally, further includes: the second receiving module, the unlocking instruction of the unlocking electronic lock for receiving user's input;The Two sending modules, for the unlocking of unlocking electronic lock will be requested to request, second user related to user in response to unlocking instruction Information and the second electronics lock information relevant to electronic lock are sent to server;Third receiving module, for receiving server The instruction information of transmission, wherein instruction information is used to indicate whether electronic lock is opened;And instruction information display module, for showing Show instruction information.
Optionally, further includes: the 4th receiving module, the request retrieval for receiving user's input relevant to electronic lock make With the retrieval request of information, wherein use information is the information that electronic lock generates during use;Third sending module is used In retrieval request is sent to server;5th receiving module, for receiving the encrypted use information of server transmission;The Six receiving modules for receiving the key of user's input, and are decrypted according to the use information after key pair encryption;And make With information display module, for showing the use information after decryption.
To pass through the device of information processing unit 500 and acquisition electronic lock based on block chain according to the present embodiment 600, so that the data of all people for having electronic lock are stored on block chain, it is no longer rely on some Lock Factory and technology company comes Safeguard data safety, the people of all participations is an one's share of expenses for a joint undertaking of block chain.Also, it is taken at other people and is stored in adding in block chain After confidential information, the first user information and the first electronics lock information can not be directly obtained.Only possess encryption key After user can be decrypted by key pair encryption information, the first user information and the first electronic lock letter could be obtained Breath.Since the present embodiment has the characteristic that can not distort using block chain technology, and using Encryption Algorithm to user data into Encryption is gone.Thus having reached user data relevant to electronic lock can not the person's of being destroyed technology for distorting, steal and losing Effect.And then it solves existing user data relevant to electronic lock and is distorted, steals and lost by other people there is easy Risk the technical issues of.
Embodiment 3
Fig. 7 shows the information processing unit 700 according to the first aspect of the present embodiment based on block chain, should Device 700 is corresponding with the method according to the first aspect of embodiment 1.Refering to what is shown in Fig. 7, the device 700 includes: One processor 710;And first memory 720, it is connect with first processor 710, for providing processing for first processor 710 The instruction of following processing step: the registration request that electronic lock is registered in the request that receiving terminal apparatus is sent;According to registration Request obtains the first user information relevant to the user of terminal device;Obtain the first electronics lock information relevant to electronic lock; According to the first user information, the first electronics lock information and predetermined cryptographic algorithm, encryption information is generated;And encryption information is deposited It is stored in the predetermined block of block chain.
Optionally, predetermined cryptographic algorithm is symmetric encipherment algorithm, and generates the operation of encryption information, comprising: according to One user information, the first electronics lock information and symmetric encipherment algorithm generate encryption information.
Optionally, first memory 720 is also used to provide the instruction for handling following processing step for first processor 710: The unlocking request for the request unlocking electronic lock that receiving terminal apparatus is sent;Obtain the second user of user relevant to request of unlocking Information and the second electronics lock information relevant to electronic lock;Determine second user information and the second electronics lock information whether Match;And in the case where determining that second user information and the second electronics lock information match, unlocking electronic lock.
Optionally, determine second user information and the whether matched operation of the second electronics lock information, comprising: to encryption information It is decrypted, obtains the first user information and the first electronics lock information;Determine whether the first user information includes second user Information;And determine whether the first electronics lock information is consistent with the second electronics lock information.
Optionally, first memory 720 is also used to provide the instruction for handling following processing step for first processor 710: The first use information relevant to electronic lock is obtained, wherein the first use information is the letter that electronic lock generates during use Breath;And the first use information is stored in the predetermined block of block chain.
Optionally, first memory 720 is also used to provide the instruction for handling following processing step for first processor 710: The retrieval request of the second use information relevant to electronic lock is retrieved in the request that receiving terminal apparatus is sent, wherein first uses letter Breath includes the second use information;Obtain the second use information;And the second use information is sent to terminal device.
In addition, Fig. 8 shows the device for obtaining the electronic lock right to use according to the second aspect of the present embodiment 800, the device 800 is corresponding with the method according to the second aspect of embodiment 1.Refering to what is shown in Fig. 8, the device 800 It include: second processor 810;And second memory 820, it is connect with second processor 810, for being second processor 810 There is provided the instruction for handling following processing step: the request for receiving user's input is requested using the use of electronic lock;Will use request, First user information related to user and the first electronics lock information relevant to electronic lock are sent to server;Receive service The confirmation message that device is sent, wherein confirmation message, which is used to indicate, distributes electronic lock to user;And display confirmation message.
Optionally, second memory 820 is also used to provide the instruction for handling following processing step for second processor 810: Receive the unlocking request and second user information related to user of the unlocking electronic lock of user's input;To unlock request, the Two user informations and the second electronics lock information relevant to electronic lock are sent to server;Receive the instruction letter that server is sent Breath, wherein instruction information is used to indicate whether electronic lock is opened;And display instruction information.
Optionally, second memory 820 is also used to provide the instruction for handling following processing step for second processor 810: The retrieval request of use information relevant to electronic lock is retrieved in the request for receiving user's input, and wherein use information is that electronic lock exists The information generated during use;Retrieval request is sent to server;Encrypted use that server is sent is received to believe Breath;The key of user's input is received, and is decrypted according to the use information after key pair encryption;And make after display decryption Use information.
To pass through the device of information processing unit 700 and acquisition electronic lock based on block chain according to the present embodiment 800, so that the data of all people for having electronic lock are stored on block chain, it is no longer rely on some Lock Factory and technology company comes Safeguard data safety, the people of all participations is an one's share of expenses for a joint undertaking of block chain.Also, it is taken at other people and is stored in adding in block chain After confidential information, the first user information and the first electronics lock information can not be directly obtained.Only possess encryption key After user can be decrypted by key pair encryption information, the first user information and the first electronic lock letter could be obtained Breath.Since the present embodiment has the characteristic that can not distort using block chain technology, and using Encryption Algorithm to user data into Encryption is gone.Thus having reached user data relevant to electronic lock can not the person's of being destroyed technology for distorting, steal and losing Effect.And then it solves existing user data relevant to electronic lock and is distorted, steals and lost by other people there is easy Risk the technical issues of.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
In the above embodiment of the invention, it all emphasizes particularly on different fields to the description of each embodiment, does not have in some embodiment The part of detailed description, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed technology contents can pass through others Mode is realized.Wherein, the apparatus embodiments described above are merely exemplary, such as the division of the unit, only A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of unit or module It connects, can be electrical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can for personal computer, server or network equipment etc.) execute each embodiment the method for the present invention whole or Part steps.And storage medium above-mentioned includes: that USB flash disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited Various Jie that can store program code such as reservoir (RAM, RandomAccess Memory), mobile hard disk, magnetic or disk Matter.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered It is considered as protection scope of the present invention.

Claims (10)

1. a kind of electronic lock information processing method based on block chain characterized by comprising
The registration request that electronic lock is registered in the request that receiving terminal apparatus is sent;
According to the registration request, the first user information relevant to the user of the terminal device is obtained;
Obtain the first electronics lock information relevant to the electronic lock;
According to first user information, the first electronics lock information and predetermined cryptographic algorithm, encryption information is generated;And
The encryption information is stored in the predetermined block of block chain.
2. the method according to claim 1, wherein the predetermined cryptographic algorithm be symmetric encipherment algorithm, and Generate the operation of the encryption information, comprising:
According to first user information, the first electronics lock information and the symmetric encipherment algorithm, the encryption is generated Information.
3. the method according to claim 1, wherein further include:
Receive the unlocking request that the electronic lock is opened in the request that the terminal device is sent;
The second user information of acquisition user relevant to the unlocking request and the second electronics relevant with the electronic lock Lock information;
Determine whether the second user information matches with the second electronics lock information;And
In the case where determining that the second user information and the second electronics lock information match, the electronic lock is opened.
4. according to the method described in claim 3, it is characterized in that, determining the second user information and second electronic lock The whether matched operation of information, comprising:
The encryption information is decrypted, first user information and the first electronics lock information are obtained;
Determine whether first user information includes the second user information;And
Determine whether the first electronics lock information is consistent with the second electronics lock information.
5. the method according to claim 1, wherein further include:
The first use information relevant to the electronic lock is obtained, wherein first use information is that the electronic lock is using During the information that generates;And
First use information is stored in the predetermined block of the block chain.
6. according to the method described in claim 5, it is characterized by further comprising:
The retrieval request that the second use information relevant to the electronic lock is retrieved in the request that the terminal device is sent is received, Described in the first use information include second use information;
Obtain second use information;And
Second use information is sent to the terminal device.
7. a kind of method for obtaining the electronic lock right to use characterized by comprising
The request for receiving user's input is requested using the use of electronic lock;
Request, the first user information relevant to the user and the first electronics relevant with the electronic lock are used by described Lock information is sent to server;
Receive the confirmation message that the server is sent, wherein the confirmation message be used to indicate by the electronic lock distribute to The user;And
Show the confirmation message.
8. the method according to the description of claim 7 is characterized in that further include:
Receive the unlocking instruction of the unlatching electronic lock of user's input;
In response to the unlocking instruction, the unlocking that the electronic lock is opened in request is requested, relevant to the user second uses Family information and the second electronics lock information relevant to the electronic lock are sent to the server;
The instruction information that the server is sent is received, wherein the instruction information is used to indicate whether the electronic lock is opened; And
Show the instruction information.
9. the method according to the description of claim 7 is characterized in that further include:
The retrieval request of use information relevant to the electronic lock is retrieved in the request for receiving user's input, wherein described make It is the information that the electronic lock generates during use with information;
The retrieval request is sent to the server;
Receive the encrypted use information that the server is sent;
The key of user's input is received, and is decrypted according to the use information after the key pair encryption;And
The use information after display decryption.
10. a kind of storage medium, which is characterized in that the storage medium includes the program of storage, wherein run in described program When as processor perform claim require any one of 1 to 9 described in method.
CN201811525827.9A 2018-12-13 2018-12-13 The method of electronic lock information processing and the acquisition electronic lock right to use based on block chain Pending CN109377626A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811525827.9A CN109377626A (en) 2018-12-13 2018-12-13 The method of electronic lock information processing and the acquisition electronic lock right to use based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811525827.9A CN109377626A (en) 2018-12-13 2018-12-13 The method of electronic lock information processing and the acquisition electronic lock right to use based on block chain

Publications (1)

Publication Number Publication Date
CN109377626A true CN109377626A (en) 2019-02-22

Family

ID=65373708

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811525827.9A Pending CN109377626A (en) 2018-12-13 2018-12-13 The method of electronic lock information processing and the acquisition electronic lock right to use based on block chain

Country Status (1)

Country Link
CN (1) CN109377626A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110136307A (en) * 2019-05-17 2019-08-16 袁园 A kind of access control system with authentication based on block chain technology
CN110211263A (en) * 2019-05-23 2019-09-06 烽火通信科技股份有限公司 A kind of intelligent door method for unlocking and system based on block chain technology
CN111861613A (en) * 2019-05-19 2020-10-30 北京骑胜科技有限公司 Electronic lock operation recording method and device
CN112052660A (en) * 2020-09-07 2020-12-08 深圳壹账通智能科技有限公司 Resource auditing method and device based on decentralization, computer equipment and medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103971435A (en) * 2014-05-22 2014-08-06 广东欧珀移动通信有限公司 Unlocking method, server, mobile terminal, electronic lock and unlocking system
CN106652109A (en) * 2015-10-30 2017-05-10 东莞酷派软件技术有限公司 Intelligent lock control method, device and lock management server
CN107331012A (en) * 2017-07-04 2017-11-07 济南浪潮高新科技投资发展有限公司 A kind of finger vein gate control system based on block chain
KR101875725B1 (en) * 2017-04-12 2018-07-06 서강대학교산학협력단 Smart door lock system, smart door lock and terminal for controlling the smart door lock
CN108564692A (en) * 2018-04-10 2018-09-21 周伟 A kind of unlock verification method and system for unlocking based on block chain
CN108629337A (en) * 2018-06-11 2018-10-09 深圳市益鑫智能科技有限公司 A kind of face recognition door control system based on block chain
CN108830983A (en) * 2018-05-29 2018-11-16 广州蛙管家科技有限公司 A kind of access control system and its working method based on block chain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103971435A (en) * 2014-05-22 2014-08-06 广东欧珀移动通信有限公司 Unlocking method, server, mobile terminal, electronic lock and unlocking system
CN106652109A (en) * 2015-10-30 2017-05-10 东莞酷派软件技术有限公司 Intelligent lock control method, device and lock management server
KR101875725B1 (en) * 2017-04-12 2018-07-06 서강대학교산학협력단 Smart door lock system, smart door lock and terminal for controlling the smart door lock
CN107331012A (en) * 2017-07-04 2017-11-07 济南浪潮高新科技投资发展有限公司 A kind of finger vein gate control system based on block chain
CN108564692A (en) * 2018-04-10 2018-09-21 周伟 A kind of unlock verification method and system for unlocking based on block chain
CN108830983A (en) * 2018-05-29 2018-11-16 广州蛙管家科技有限公司 A kind of access control system and its working method based on block chain
CN108629337A (en) * 2018-06-11 2018-10-09 深圳市益鑫智能科技有限公司 A kind of face recognition door control system based on block chain

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110136307A (en) * 2019-05-17 2019-08-16 袁园 A kind of access control system with authentication based on block chain technology
CN111861613A (en) * 2019-05-19 2020-10-30 北京骑胜科技有限公司 Electronic lock operation recording method and device
CN111861613B (en) * 2019-05-19 2024-04-16 北京骑胜科技有限公司 Electronic lock operation recording method and device
CN110211263A (en) * 2019-05-23 2019-09-06 烽火通信科技股份有限公司 A kind of intelligent door method for unlocking and system based on block chain technology
CN110211263B (en) * 2019-05-23 2021-05-14 烽火通信科技股份有限公司 Intelligent door unlocking method and system based on block chain technology
CN112052660A (en) * 2020-09-07 2020-12-08 深圳壹账通智能科技有限公司 Resource auditing method and device based on decentralization, computer equipment and medium

Similar Documents

Publication Publication Date Title
CN109377626A (en) The method of electronic lock information processing and the acquisition electronic lock right to use based on block chain
KR0143568B1 (en) How to identify a portable object with an offline terminal and a device using the method
US20190356472A1 (en) Blockchain-implemented method and system
US8832453B2 (en) Token recycling
CN104769602B (en) Method and system for authentication-access request
CN100380356C (en) Machine Authentication System
CN109257342A (en) Authentication method, system, server and readable storage medium storing program for executing of the block chain across chain
CN106664311A (en) Supporting differentiated secure communications among heterogeneous electronic devices
US20070067835A1 (en) Remote unblocking with a security agent
CN207409010U (en) The newer temporary password access control system of encryption parameter dynamic
CN109064169A (en) Method of commerce, equipment and storage medium
CN101517562A (en) Method for registering and certificating user of one time password by a plurality of mode and computer-readable recording medium where program executing the same method is recorded
CN108711209A (en) dynamic password generation and verification method and system
CN108768963A (en) The communication means and system of trusted application and safety element
CN107004077A (en) Method and system for providing safe and independently operable biological characteristic authentication
CN110895839A (en) Intelligent door lock unlocking method and device in network-free state
CA3184856A1 (en) Method, participatant unit, transaction register, and payment system for managing transaction data sets
CN108667791A (en) Identity authentication method
CN107920052A (en) A kind of encryption method and intelligent apparatus
CN104954132A (en) Information processing apparatus, information processing method, and recording medium
CN106650372B (en) The activating method and device of administrator right
WO2009069872A1 (en) System and method for authenticating one-time virtual secret information
CN109075972A (en) Password anti-theft authentication and encryption system and method
US6606387B1 (en) Secure establishment of cryptographic keys
CN109088729A (en) Key storage method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190222

RJ01 Rejection of invention patent application after publication
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载