Nothing Special   »   [go: up one dir, main page]

CN109660514A - A kind of implementation method of smart machine system, smart machine control method and system - Google Patents

A kind of implementation method of smart machine system, smart machine control method and system Download PDF

Info

Publication number
CN109660514A
CN109660514A CN201811359532.9A CN201811359532A CN109660514A CN 109660514 A CN109660514 A CN 109660514A CN 201811359532 A CN201811359532 A CN 201811359532A CN 109660514 A CN109660514 A CN 109660514A
Authority
CN
China
Prior art keywords
user
smart machine
intelligent contract
privately owned
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811359532.9A
Other languages
Chinese (zh)
Other versions
CN109660514B (en
Inventor
姚雷
姚平
李蕊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suningcom Group Co Ltd
Original Assignee
Suningcom Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suningcom Group Co Ltd filed Critical Suningcom Group Co Ltd
Priority to CN201811359532.9A priority Critical patent/CN109660514B/en
Publication of CN109660514A publication Critical patent/CN109660514A/en
Priority to PCT/CN2019/106753 priority patent/WO2020098382A1/en
Priority to CA3160728A priority patent/CA3160728A1/en
Application granted granted Critical
Publication of CN109660514B publication Critical patent/CN109660514B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of implementation method of smart machine system, smart machine control method and systems, belong to block chain technical field, and method includes: to constitute privately owned chain network to multiple smart machines of access to LAN;Each smart machine obtains the intelligent contract with multiple functions of user's publication respectively, and intelligent contract is deployed in privately owned chain network after user confirms;When smart machine receives the equipment initialization requests of user, user's sensitive data in equipment initialization requests is obtained by smart machine, and corresponding first initial information is generated to user's sensitive data;And call the increase function of intelligent contract that the first initial information is written in privately owned chain.User's sensitive data that smart machine is got is stored on privately owned chain by the embodiment of the present invention by intelligent contract, be can be avoided the leakage of user's sensitive data, is fully ensured that privacy and the safety of user's sensitive data.

Description

A kind of implementation method of smart machine system, smart machine control method and system
Technical field
The present invention relates to block chain technical field, in particular to a kind of implementation method of smart machine system, smart machine Control method and system.
Background technique
Smart machine refers to any equipment, instrument or machine with calculation processing ability, with the day of science It opens up increasingly, more and more smart machines occur in people's daily life, such as intelligent door lock, intelligent sound box, Intelligent air Tune, smart television, Intelligent routing etc., these smart machines are linked into network by the WiFi of home router, then by intelligence Can the application program of mobile phone control.
In the implementation of the present invention, inventor has found: many data of existing smart machine are all to be put into production The cloud of manufacturer is stored, then is controlled by mobile phone terminal, be easy to cause the leakage of personal information, while illegal point in this way Son also can use loophole altered data, achieve the purpose that control smart machine.
Summary of the invention
It is an object of that present invention to provide a kind of implementation method of smart machine system, smart machine control method and system, User's sensitive data in smart machine is stored on privately owned chain by intelligent contract, can be avoided letting out for user's sensitive data Dew, has fully ensured that privacy and the safety of user's sensitive data.
Specific technical solution provided in an embodiment of the present invention is as follows:
In a first aspect, providing a kind of implementation method of smart machine system, comprising:
Privately owned chain network is constituted to multiple smart machines of access to LAN;
Each smart machine obtains the intelligent contract with multiple functions of user's publication respectively, and through the user The intelligent contract is deployed in the privately owned chain network after confirmation;
When the smart machine receives the equipment initialization requests of the user, as described in smart machine acquisition User's sensitive data in equipment initialization requests;
Corresponding first initial information is generated to user's sensitive data, and calls the increase function of the intelligent contract First initial information is written in privately owned chain.
Further, after privately owned chain step is written in the information by the increase function of calling the intelligent contract, The method also includes:
When the smart machine receives the equipment of the user using request, set as described in smart machine acquisition The standby user input data using in request, and corresponding information to be checked is generated to the user input data;And
The query function of the intelligent contract is called to inquire the information to be checked in the privately owned chain;
The smart machine determines whether to be used operation according to the query result of the intelligent contract.
Further, user's sensitive data is the initial fingerprint data of user input, described, described to described User's sensitive data generates corresponding first initial information, and calls the increase function of the intelligent contract initial by described first Information is written in privately owned chain, comprising:
Initial hash value is converted by the initial fingerprint data by the smart machine, and according to the initial hash value Initial composite key is generated with the device id of the smart machine;
Value value is generated according to the entry time of the Starting mode of the smart machine and the initial fingerprint data;
Described in the initial composite key, the value value are accordingly written by the increase function of the intelligent contract In privately owned chain.
Further, the user input data is the finger print data of the user, described to the user input data Corresponding information to be checked is generated, and calls the query function of the intelligent contract to the information to be checked in the privately owned chain In inquired, comprising:
Hash value is converted by the finger print data by the smart machine, and is set according to the hash value and the intelligence Standby device id generates compound key;
Call the query function of the intelligent contract to inquire in the privately owned chain with the presence or absence of corresponding with the compound key Value value, and receive the query result that the intelligent contract returns;
Wherein, the query result is used to indicate whether the smart machine allows to be used operation.
Further, the method also includes:
When the client receives equipment initialization requests of the user to the smart machine, by the client End obtains the initial password set by user, and generates the corresponding second initial letter to the initial password using preset algorithm Breath;And
The intelligence is accordingly written into the device id of the smart machine, second initial information and the preset algorithm In the authentication function of energy contract, to be updated to the intelligent contract;
The intelligent contract is upgraded according to the confirmation operation of the user by each smart machine.
Further, it is described by each smart machine according to the confirmation operation of the user to the intelligent contract into After row upgrade step, the method also includes:
When the smart machine receives the equipment of the user using request, the use is obtained by the smart machine The input password at family;
The authentication function of the intelligent contract is called to generate corresponding letter to the input password using the preset algorithm Breath, and verifying is compared in the information second initial information corresponding with the device id of the smart machine;
The verification result that the intelligent contract returns is received, and is determined whether to be used behaviour according to the verification result Make.
Further, the preset algorithm is hash algorithm.
Further, the method also includes:
When the smart machine, which receives the user, requests the modification of user's sensitive data, the intelligence is called The modification function of energy contract modifies to user's sensitive data;
When the smart machine receives removal request of the user to user's sensitive data, the intelligence is called The deletion function of energy contract deletes user's sensitive data.
Second aspect, provides a kind of smart machine control method, and the method is applied to the intelligence in privately owned chain network In equipment, the privately owned chain network is made of the smart machine and other smart machines, and the privately owned chain network is deployed with The intelligent contract of user's publication, which comprises
When the smart machine receives the equipment of the user using request, set as described in smart machine acquisition The standby user input data using in request;
Corresponding information to be checked is generated to the user input data, and calls the intelligent contract to described to be checked Information is inquired in privately owned chain, wherein is previously stored in the privately owned chain based on the initial of user's sensitive data generation Information;
It determines whether to be used operation according to the query result of the intelligent contract.
The third aspect, provides a kind of smart machine control method, and the intelligence that the method is applied in privately owned chain network is set Standby upper, the privately owned chain network is made of the smart machine and other smart machines, and the privately owned chain network deployment is useful The intelligent contract of family publication, which comprises
When the smart machine receives the equipment of the user using request, the use is obtained by the smart machine The input password at family;
The intelligent contract is called, so that the intelligence contract generates phase to the input password using the preset algorithm The information answered, and verifying is compared in information initial information corresponding with the device id of the smart machine, wherein institute Stating initial information is generated based on the initial password set by user;
The verification result that the intelligent contract returns is received, and is determined whether to be used behaviour according to the verification result Make.
Fourth aspect provides a kind of smart machine system, and the system comprises the multiple of client and access to LAN Smart machine, multiple smart machines constitute privately owned chain network;
Each smart machine respectively include:
Contract obtains module, for obtaining user respectively described in other smart machines in the privately owned chain network The intelligent contract with multiple functions of client publication;
Contract deployment module, for the intelligent contract to be deployed to the privately owned chain network after user confirmation On;
Data acquisition module, for it is initial to obtain the equipment when receiving the equipment initialization requests of the user Change user's sensitive data in request;
First generation module, for generating corresponding first initial information to user's sensitive data;And
Contract calling module, for calling the increase function of the intelligent contract that first initial information write-in is privately owned In chain.
Further, the data acquisition module is also used to obtain when receiving the equipment of the user using request The equipment uses the user input data in request;
First generation module is also used to the user input data and generates corresponding information to be checked;
Contract calling module is also used to call the query function of the intelligent contract to the information to be checked in the private Have in chain and is inquired;
Each smart machine difference further include:
Control module is operated, for determining whether the smart machine allows quilt according to the query result of the intelligent contract Use operation.
Further, user's sensitive data is the initial fingerprint data of user input, and described first generates mould Block is specifically used for:
Initial hash value is converted by the initial fingerprint data, and according to the initial hash value and the intelligence is set Standby device id generates initial composite key;And
Value value is generated according to the entry time of the Starting mode of the smart machine and the initial fingerprint data;
The contract calling module is specifically used for:
Described in the initial composite key, the value value are accordingly written by the increase function of the intelligent contract In privately owned chain.
Further, the user input data is the finger print data of the user, and first generation module is specifically gone back For:
Hash value is converted by the finger print data, and is generated according to the device id of the hash value and the smart machine Compound key;
The contract calling module is specifically also used to:
Call the query function of the intelligent contract to inquire in the privately owned chain with the presence or absence of corresponding with the compound key Value value, and receive the query result that the intelligent contract returns;
Wherein, the query result is used to indicate whether the smart machine allows to be used operation.
Further, the system also includes client, the client includes:
Password obtains module, for when receiving equipment initialization requests of the user to the smart machine, by The client obtains the initial password set by user;
Second generation module, for generating corresponding second initial information to the initial password using preset algorithm;
Information writing module, for by the device id of the smart machine, second initial information and the pre- imputation Method is accordingly written in the authentication function of the intelligent contract, to be updated to the intelligent contract;
Each smart machine difference further include:
Contract upgraded module, for being upgraded according to the confirmation operation of the user to the intelligent contract.
Further, the data acquisition module is specifically also used to:
When receiving the equipment of the user using request, the input password of the user is obtained;
The contract calling module is specifically also used to:
The authentication function of the intelligent contract is called, so that the intelligence contract is using the preset algorithm to the input Password generates corresponding information, and by the information second initial information corresponding with the device id of the smart machine into Row comparison;
The verification result that the intelligent contract returns is received, and is determined whether to be used behaviour according to the verification result Make.
Further, the preset algorithm is hash algorithm.
Further, the contract calling module is specifically also used to:
When receiving modification request of the user to user's sensitive data, the modification of the intelligent contract is called Function modifies to user's sensitive data;
When receiving removal request of the user to user's sensitive data, the deletion of the intelligent contract is called Function deletes user's sensitive data.
Technical solution provided in an embodiment of the present invention has the benefit that
1, it is written in privately owned chain since the initial information that user's sensitive data generates passes through intelligent contract, and single intelligence is set For that can not modify intelligent treaty content when being broken, all smart machines only broken through in privately owned chain network could pass through portion The new intelligent contract of administration could be around the intelligent contract originally disposed, so that criminal is difficult to obtain user's sensitivity number According to so that user's sensitive data is safer;
2, the embodiment of the present invention is stored in the privately owned chain of local area network due to user's sensitive data, avoids user's sensitive data Leakage, so that criminal is difficult to obtain user's sensitive data, while user's sensitive data can only be operated and be read by user It takes, thus avoids user's sensitive data in the prior art and store beyond the clouds or be stored in local safety issue;
3, since the multiple smart machines for constituting privately owned chain network are in access to LAN, so that criminal can not lead to It crosses public network and carries out malicious attack;
4, compare in the prior art user's sensitive data storage beyond the clouds when, user must be connected by public network server into Row authentication, since user's sensitive data is stored in the privately owned chain of local area network, user can be directly accessed the embodiment of the present invention Local area network carries out authentication, and authentication is more efficient.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other Attached drawing.
Fig. 1 is a kind of flow chart of the implementation method of smart machine system provided by the invention;
Fig. 2 is a kind of flow chart of the implementation method of smart machine system provided by the invention;
Fig. 3 is a kind of flow chart of the implementation method of smart machine system provided by the invention;
Fig. 4 is a kind of flow chart of the implementation method of smart machine system provided by the invention;
Fig. 5 is the configuration diagram of smart machine system provided by the invention;
Fig. 6 is the flow diagram of intelligent door lock secret number provided by the invention;
Fig. 7 is a kind of system block diagram of smart machine system provided by the invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached in the embodiment of the present invention Figure, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only this Invention a part of the embodiment, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art exist Every other embodiment obtained under the premise of creative work is not made, shall fall within the protection scope of the present invention.
In the description of the present application, it is to be understood that term " first ", " second " etc. are used for description purposes only, without It can be interpreted as indication or suggestion relative importance.In addition, in the description of the present application, unless otherwise indicated, the meaning of " multiple " It is two or more.
Before the implementation method to smart machine system provided by the invention is illustrated, first to each implementation of the present invention Term involved in example is introduced.
About block chain, block chain is a kind of by Distributed Storage, point-to-point transmission, common recognition mechanism, Encryption Algorithm Etc. computer technologies fusion get up new application mode.According to the difference of block chain network centralization degree, 3 kinds are differentiated not With the block chain under application scenarios:
1, the whole network discloses, the block chain of no user licensing scheme, referred to as publicly-owned chain;
2, network is added in the node for allowing to authorize, and information can be checked according to permission, is often used for inter-agency block chain, Referred to as alliance's chain;
3, the node in all-network all rests in a mechanism hand, referred to as privately owned chain.
Embodiment one
Fig. 1 is a kind of flow chart of the implementation method of smart machine system provided by the invention, as shown in Figure 1, this method It may comprise steps of:
101, privately owned chain network is constituted to multiple smart machines of access to LAN.
Wherein, multiple smart machines include but is not limited to intelligent door lock, intelligent sound box, intelligent air condition, smart television, intelligence Routing etc..Smart machine can use sensor and collect the information such as user fingerprints data, environmental data, wherein sensor can To integrate on intelligent devices, can also be attached by wired or wireless way and smart machine.
102, each smart machine obtains the intelligent contract with multiple functions of user's publication respectively, and confirms through user Intelligent contract is deployed in privately owned chain network afterwards.
Wherein, intelligent contract have multiple functions, comprising: increase function, delete function, query function, modification function and Authentication function;
Specifically, the process may include:
Each smart machine obtains the intelligent contract of user's one of in the following way publication respectively:
Client with contract issuing function;
The smart machine with contract issuing function in multiple smart machines;
Wherein, client specifically can be the terminal devices such as mobile terminal, individual PC.
After each smart machine is confirmed by user by button, intelligent contract is deployed in privately owned chain network.
103, when smart machine receives the equipment initialization requests of user, equipment initialization is obtained by smart machine and is asked User's sensitive data in asking.
Wherein, user's sensitive data can be the user's characteristic informations such as user fingerprints data, iris data, can also be it His sensitive data.
In the present embodiment, user needs to carry out initial after carrying out multiple smart machines deployment and constituting privately owned chain network Change smart machine, the smart machine can be used so as to subsequent.It, can when user needs initialize smart machine To be initialized using fingerprint input mode, by taking intelligent door lock as an example, user can be by sensor by the fingerprint number of oneself According to being input in intelligent door lock, initialization intelligent door lock is carried out.
104, corresponding first initial information is generated to user's sensitive data, and calls the increase function of intelligent contract by the One initial information is written in privately owned chain.
Specifically, converting initial hash value for initial fingerprint data by smart machine, and according to initial hash value and it is somebody's turn to do The device id of smart machine generates initial composite key;When according to the typing of the Starting mode of smart machine and initial fingerprint data Between generate value value;The increase function that initial composite key, value value passes through intelligent contract is accordingly written in privately owned chain.
In the specific implementation process, smart machine can be used hash algorithm and carry out hash operation to initial fingerprint data, Generate initial hash value, wherein the hash algorithm can be any safe and reliable hash algorithm, such as SHA256, the close SM3 of state or Close SM4 of state etc..
In the embodiment of the present invention, privately owned chain is written since the initial information that user's sensitive data generates passes through intelligent contract In, and when single smart machine is broken, can not modify intelligent treaty content, only break through all intelligence in privately owned chain network Energy equipment could could bypass the intelligent contract originally disposed by disposing new intelligent contract, so that criminal is difficult to User's sensitive data is obtained, while user's sensitive data can only be operated and be read by user, so that user's sensitivity number According to safer;Simultaneously as the multiple smart machines for constituting privately owned chain network are in access to LAN, so that criminal Malicious attack can not be carried out by public network;In addition, compare in the prior art, when user's sensitive data is stored beyond the clouds, user It must be connected into server by public network and carry out authentication, the embodiment of the present invention is privately owned since user's sensitive data is stored in local area network In chain, user can be directly accessed local area network and carry out authentication, and authentication is more efficient.
Further, method provided in an embodiment of the present invention can also include:
When smart machine receives the modification request of user to user sensitive data, the modification function of intelligent contract is called It modifies to user's sensitive data;When smart machine receives the removal request of user to user sensitive data, intelligence is called The deletion function of energy contract deletes user's sensitive data.
In the embodiment of the present invention, by the modification function of intelligent contract or delete function, convenient for user's sensitive data into Row modification is deleted.
Further, method provided in an embodiment of the present invention can also include:
By smart machine by the operation note to user's sensitive data on privately owned chain, so that user traces and looks into It sees.
In the embodiment of the present invention, by the operation note to user's sensitive data on privately owned chain, user can be prevented quick Sense data are illegally inquired, are distorted, and then can fully ensure that privacy and the safety of user's sensitive data.
Embodiment two
Fig. 2 is a kind of flow chart of the implementation method of smart machine system provided by the invention, in this embodiment, the intelligence The implementation method of energy device systems further includes step 201~204, in order to describe letter other than including step described in Fig. 1 For the sake of clean, step described in Fig. 1 is omitted.As shown in Fig. 2, the implementation method of the smart machine system further include:
201, when smart machine receives the equipment of user using request, equipment is obtained by smart machine and is used in request User input data.
In the present embodiment, user can carry out corresponding operation to smart machine after completing to initialize smart machine.With For intelligent door lock, when user needs to open intelligent door lock, unlatching intelligent door lock can be carried out by the way of fingerprint input, Finger print data is input in intelligent door lock by sensor.
202, corresponding information to be checked is generated to user input data.
Wherein, which is the finger print data of user.
Specifically, convert hash value for finger print data by smart machine, and setting according to hash value and the smart machine Standby ID generates compound key, using as information to be checked.
In the specific implementation process, smart machine can be used hash algorithm and carry out hash operation to user input data, Generate hash value, wherein the hash algorithm can be any safe and reliable hash algorithm, such as SHA256, the close SM3 of state or state are close SM4 etc..
203, it calls the query function of intelligent contract to treat query information to be inquired in privately owned chain.
Specifically, calling the query function of intelligent contract to inquire in privately owned chain with the presence or absence of corresponding with compound key Value value, and receive the query result that intelligent contract returns;Wherein, query result is used to indicate whether smart machine allows quilt Use operation.
204, smart machine determines whether to be used operation according to the query result of intelligent contract.
Wherein, when query result indicates successful inquiring, then smart machine permission is used operation, when query result indicates When inquiry failure, then smart machine does not allow to be used operation.
In the embodiment of the present invention, user use smart machine when, obtain the input data of user and generate accordingly to Query information, by calling the query function of intelligent contract to be inquired accordingly, so that smart machine is returned according to intelligent contract Return query result determine whether to be used operation, thus, it is possible to avoid smart machine from being controlled by criminal.
Embodiment three
Fig. 3 is a kind of flow chart of the implementation method of smart machine system provided by the invention, in this embodiment, the intelligence The implementation method of energy device systems further includes step 301~304, in order to describe letter other than including step described in Fig. 1 For the sake of clean, step described in Fig. 1 is omitted.As shown in figure 3, the implementation method of the smart machine system further include:
301, it when the client of user receives equipment initialization requests of the user to smart machine, is obtained by client Initial password set by user.
In the present embodiment, user needs to carry out initial after carrying out multiple smart machines deployment and constituting privately owned chain network Change smart machine, the smart machine can be used so as to subsequent.When user needs initialize smart machine, remove Except can be using fingerprint input mode initialization smart machine, it can also be set using password input mode initialization intelligence It is standby.By taking intelligent door lock as an example, the door-opening password of cell phone client setting intelligent door lock is can be used in user, carries out initialization intelligence Door lock.
302, corresponding second initial information is generated to initial password using preset algorithm.
Wherein, which is hash algorithm.
Specifically, hash algorithm, which can be used, in client carries out hash operation to initial password, initial hash value is generated, In, which can be any safe and reliable hash algorithm, such as SHA256, the close SM3 of state or the close SM4 of state etc..
303, the device id of smart machine, the second initial information and preset algorithm are accordingly written to the verifying of intelligent contract In function, to be updated to intelligent contract.
304, intelligent contract is upgraded according to the confirmation operation of user by each smart machine.
Specifically, upgrading after each smart machine is confirmed by user by button to intelligent contract.
In the embodiment of the present invention, since the second initial information that initial password set by user generates is write by intelligent contract Enter in privately owned chain, when user needs to change initial password, can be realized by the upgrading of contract.
Example IV
Fig. 4 is a kind of flow chart of the implementation method of smart machine system provided by the invention, in this embodiment, the intelligence The implementation method of energy device systems further includes step 401~403, in order to describe letter other than including step described in Fig. 3 For the sake of clean, step described in Fig. 3 is omitted.As shown in figure 4, the implementation method of the smart machine system further include:
401, when smart machine receives the equipment of user using request, the input for obtaining user by smart machine is close Code.
In the present embodiment, user can carry out corresponding operation to smart machine after completing to initialize smart machine.With For intelligent door lock, when user needs to open intelligent door lock, unlatching intelligent door lock can be carried out by the way of Password Input, Entered a password into intelligent door lock by mobile client.
402, the authentication function of intelligence contract is called, so that intelligent contract generates accordingly input password using preset algorithm Information, and verifying is compared in information the second initial information corresponding with the device id of smart machine.
Specifically, calling the authentication function of intelligent contract by smart machine, input password is carried out by intelligent contract Verifying is compared with the hash operation result for the initial password that intelligent contract is written in the hash operation result by hash operation, Generate verification result;Wherein, verification result is used to indicate whether smart machine allows to be used operation.
403, the verification result that intelligent contract returns is received, and is determined whether to be used operation according to verification result.
Wherein, verification result is used to indicate whether smart machine allows to be used operation.
Wherein, when verification result expression is verified, then smart machine permission is used operation, when verification result indicates It is obstructed out-of-date to verify, then smart machine does not allow to be used operation.
In the embodiment of the present invention, when user uses smart machine, the input password of user is obtained, and by calling intelligence The authentication function of contract is verified accordingly, so that smart machine determines whether to permit according to the verification result that intelligent contract returns Perhaps operation is used, thus, it is possible to avoid smart machine from being controlled by criminal.
Embodiment five
The embodiment of the invention provides a kind of smart machine control method, the method is applied to the intelligence in privately owned chain network Energy equipment, privately owned chain network are made of smart machine and other smart machines, and privately owned chain network is deployed with the intelligence of user's publication Energy contract, method include:
501, when smart machine receives the equipment of user using request, equipment is obtained by smart machine and is used in request User input data.
Specifically, the step is identical as step 201, it is not repeated here herein.
502, corresponding information to be checked is generated to user input data.
Specifically, the step is identical as step 202, it is not repeated here herein.
503, it calls intelligent contract to treat query information to be inquired in privately owned chain, wherein be stored in advance in privately owned chain There is the initial information generated based on user's sensitive data.
Specifically, the step is identical as step 203, it is not repeated here herein.
504, it is determined whether to be used operation according to the query result of intelligent contract.
Specifically, the step is identical as step 204, it is not repeated here herein.
In the embodiment of the present invention, user use smart machine when, obtain the input data of user and generate accordingly to Query information, by calling intelligent contract to be inquired accordingly, so that the inquiry knot that smart machine is returned according to intelligent contract Fruit determines whether to be used operation, and thus, it is possible to avoid smart machine from being controlled by criminal.
Embodiment six
The embodiment of the present invention provides a kind of smart machine control method, and the intelligence that method is applied in privately owned chain network is set Standby, privately owned chain network is made of smart machine and other smart machines, and privately owned chain network is deployed with the intelligence conjunction of user's publication About, method includes:
601, when smart machine receives the equipment of user using request, the input for obtaining user by smart machine is close Code;
Specifically, the step is identical as step 401, it is not repeated here herein.
602, intelligent contract is called, so that intelligent contract generates corresponding information to input password using preset algorithm, and Verifying is compared in information initial information corresponding with the device id of smart machine, wherein initial information is set based on user What fixed initial password generated;
Specifically, the step is identical as step 402, it is not repeated here herein.
603, the verification result that intelligent contract returns is received, and is determined whether to be used operation according to verification result.
Specifically, the step is identical as step 403, it is not repeated here herein.
In the embodiment of the present invention, when user uses smart machine, the input password of user is obtained, and by calling intelligence Contract is verified accordingly, so that smart machine determines whether to be used behaviour according to the verification result that intelligent contract returns Make, thus, it is possible to avoid smart machine from being controlled by criminal.
Method, which is provided for the embodiments of the invention, below with reference to Fig. 5 and Fig. 6 makees exemplary illustration.Assuming that access to LAN Multiple smart machines include intelligent door lock, intelligent sound box, smart television and Intelligent routing, sheet is executed to multiple smart machine After the method for inventive embodiments, the configuration diagram of obtained smart machine system is referred to shown in Fig. 5.If user uses Intelligent door lock opens the door, as shown in fig. 6, Fig. 6 is the flow diagram of intelligent door lock secret number provided by the invention, user Password is inputted, intelligent door lock calls the authentication function of intelligent contract to be verified accordingly, and when the authentication succeeds, intelligent door lock is permitted Perhaps opening door operation.
Embodiment seven
Fig. 7 is a kind of system block diagram of smart machine system provided by the invention, which may include client and connect Entering multiple smart machines of local area network, multiple smart machines constitute privately owned chain network, as shown in fig. 7, it is clear for ease of description, under Face only carries out the smart machine system based on block chain with client 710 and positioned at the smart machine 710 of privately owned chain network Explanation, wherein smart machine 720 is configured as any one in multiple smart machines:
Client 710 includes:
Contract release module 711, for having the intelligence of multiple functions to the publication of each smart machine of privately owned chain network Contract;
Smart machine 720 includes:
Contract obtains module 721, for obtaining the intelligence of user's publication respectively with other smart machines in privately owned chain network It can contract;
Contract deployment module 722, for intelligent contract to be deployed to privately owned chain network after user confirms;
Data acquisition module 723, for obtaining equipment initialization requests when receiving the equipment initialization requests of user In user's sensitive data;
First generation module 724, for generating corresponding first initial information to user's sensitive data;And
Contract calling module 725, for calling the increase function of intelligent contract that the first initial information is written in privately owned chain.
Further, data acquisition module 723 are also used to obtain equipment when receiving the equipment of user using request Use the user input data in request;
First generation module 724 is also used to user input data and generates corresponding information to be checked;
Contract calling module 725, be also used to call the query function of intelligent contract treat query information in privately owned chain into Row inquiry;
Smart machine 720 further include:
Control module 726 is operated, for determining whether smart machine allows to be used according to the query result of intelligent contract Operation.
Further, user's sensitive data is the initial fingerprint data of user's input, and the first generation module 724 is specifically used In:
Initial hash value is converted by initial fingerprint data, and is generated according to the device id of initial hash value and smart machine Initial composite key;And
Value value is generated according to the entry time of the Starting mode of smart machine and initial fingerprint data;
Contract calling module is specifically used for:
The increase function that initial composite key, value value passes through intelligent contract is accordingly written in privately owned chain.
Further, user input data is the finger print data of user, and the first generation module 724 is specifically also used to:
Hash value is converted by finger print data, and generates compound key according to hash value and to the device id of smart machine;
Contract calling module 725 is specifically also used to:
Call the query function of intelligent contract to inquire with the presence or absence of value value corresponding with compound key in privately owned chain, and Receive the query result that intelligent contract returns;
Wherein, query result is used to indicate whether smart machine allows to be used operation.
Further, client 710 further include:
Password obtains module 712, for when receiving equipment initialization requests of the user to smart machine, by client Obtain initial password set by user;
Second generation module 713, for generating corresponding second initial information to initial password using preset algorithm;
Information writing module 714, for accordingly writing the device id of smart machine, the second initial information and preset algorithm In the authentication function for entering intelligent contract, to be updated to intelligent contract;
Smart machine further include:
Contract upgraded module 727, for being upgraded according to the confirmation operation of user to intelligent contract.
Further, data acquisition module 723 is specifically also used to:
When receiving the equipment of user using request, the input password of user is obtained;
Contract calling module 725 is specifically also used to:
The authentication function of intelligent contract is called, so that intelligent contract generates corresponding letter to input password using preset algorithm Breath, and verifying is compared in information the second initial information corresponding with the device id of smart machine;
The verification result that intelligent contract returns is received, and is determined whether to be used operation according to verification result.
Further, preset algorithm is hash algorithm.
Further, contract calling module 725 is specifically also used to:
When the modification for receiving user to user sensitive data is requested, call the modification function of intelligent contract quick to user Sense data are modified;
When receiving the removal request of user to user sensitive data, call the deletion function of intelligent contract quick to user Sense data are deleted.
It should be understood that in smart machine system provided by the above embodiment, only with the division of above-mentioned each functional module It is illustrated, in practical application, can according to need and be completed by different functional modules above-mentioned function distribution, i.e., will The internal structure of device is divided into different functional modules, to complete all or part of the functions described above.In addition, above-mentioned The implementation method and smart machine control method embodiment of smart machine system and smart machine system belong to same design, Specific implementation process and beneficial effect are detailed in embodiment of the method, and which is not described herein again.
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware It completes, associated hardware can also be instructed to complete by program, the program can store can in a kind of computer It reads in storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.

Claims (12)

1. a kind of implementation method of smart machine system characterized by comprising
Privately owned chain network is constituted to multiple smart machines of access to LAN;
Each smart machine obtains the intelligent contract with multiple functions of user's publication respectively, and confirms through the user The intelligent contract is deployed in the privately owned chain network afterwards;
When the smart machine receives the equipment initialization requests of the user, the equipment is obtained by the smart machine User's sensitive data in initialization requests;
Corresponding first initial information is generated to user's sensitive data, and calls the increase function of the intelligent contract by institute The first initial information is stated to be written in privately owned chain.
2. the method according to claim 1, wherein the increase function of calling the intelligent contract will be described Information is written after privately owned chain step, the method also includes:
When the smart machine receives the equipment of the user using request, obtaining the equipment by the smart machine makes With the user input data in request;
Corresponding information to be checked is generated to the user input data, and calls the query function of the intelligent contract to described Information to be checked is inquired in the privately owned chain;
The smart machine determines whether to be used operation according to the query result of the intelligent contract.
3. method according to claim 1 or 2, which is characterized in that user's sensitive data is user input Initial fingerprint data, it is described that corresponding first initial information is generated to user's sensitive data, and call the intelligent contract Increase function first initial information is written in privately owned chain, comprising:
Initial hash value is converted by the initial fingerprint data by the smart machine, and according to the initial hash value and right The device id of the smart machine generates initial composite key;
Value value is generated according to the entry time of the Starting mode of the smart machine and the initial fingerprint data;
The initial composite key, the value value are accordingly written by the increase function of the intelligent contract described privately owned In chain.
4. according to the method described in claim 3, it is characterized in that, the user input data is the fingerprint number of the user According to, it is described that corresponding information to be checked is generated to the user input data, and call the query function pair of the intelligent contract The information to be checked is inquired in the privately owned chain, comprising:
Hash value is converted by the finger print data by the smart machine, and according to the hash value and the smart machine Device id generates compound key;
Call the query function of the intelligent contract to inquire in the privately owned chain with the presence or absence of corresponding with the compound key Value value, and receive the query result that the intelligent contract returns;
Wherein, the query result is used to indicate whether the smart machine allows to be used operation.
5. the method according to claim 1, wherein the method also includes:
When the client of the user receives equipment initialization requests of the user to the smart machine, by the visitor Family end obtains the initial password set by user;
Corresponding second initial information is generated to the initial password using preset algorithm;
The intelligence is accordingly written in the device id of the smart machine, second initial information and the preset algorithm to close In authentication function about, to be updated to the intelligent contract;
The intelligent contract is upgraded according to the confirmation operation of the user by each smart machine.
6. according to the method described in claim 5, it is characterized in that, it is described by each smart machine according to the user's After confirmation operation carries out upgrade step to the intelligent contract, the method also includes:
When the smart machine receives the equipment of the user using request, obtain the user's by the smart machine Input password;
The authentication function of the intelligent contract is called, so that the intelligence contract is using the preset algorithm to the input password Corresponding information is generated, and the information second initial information corresponding with the device id of the smart machine is compared To verifying;
The verification result that the intelligent contract returns is received, and is determined whether to be used operation according to the verification result.
7. method according to claim 5 or 6, which is characterized in that the preset algorithm is hash algorithm.
8. the method according to claim 1, wherein the method also includes:
When the smart machine, which receives the user, requests the modification of user's sensitive data, the intelligence is called to close Modification function about modifies to user's sensitive data;
When the smart machine receives removal request of the user to user's sensitive data, the intelligence is called to close Deletion function about deletes user's sensitive data.
9. a kind of smart machine control method, which is characterized in that the method is applied on the smart machine in privately owned chain network, The privately owned chain network is made of the smart machine and other smart machines, and the privately owned chain network is deployed with user's publication Intelligent contract, which comprises
When the smart machine receives the equipment of the user using request, obtaining the equipment by the smart machine makes With the user input data in request;
Corresponding information to be checked is generated to the user input data, and calls the intelligent contract to the information to be checked It is inquired in privately owned chain, wherein the initial information generated based on user's sensitive data is previously stored in the privately owned chain;
It determines whether to be used operation according to the query result of the intelligent contract.
10. a kind of smart machine control method, which is characterized in that the method is applied to the smart machine in privately owned chain network On, the privately owned chain network is made of the smart machine and other smart machines, and the privately owned chain network is deployed with user The intelligent contract of publication, which comprises
When the smart machine receives the equipment of the user using request, obtain the user's by the smart machine Input password;
The intelligent contract is called, so that the intelligence contract generates accordingly the input password using the preset algorithm Information, and verifying is compared in information initial information corresponding with the device id of the smart machine, wherein it is described first Beginning information is generated based on the initial password set by user;
The verification result that the intelligent contract returns is received, and is determined whether to be used operation according to the verification result.
11. a kind of smart machine system, which is characterized in that multiple the system comprises multiple smart machines of access to LAN The smart machine constitutes privately owned chain network;
Each smart machine respectively include:
Contract obtains module, more for obtaining having for user's publication respectively with other smart machines in the privately owned chain network The intelligent contract of kind function;
Contract deployment module, for the intelligent contract to be deployed to the privately owned chain network after user confirmation;
Data acquisition module is asked for when receiving the equipment initialization requests of the user, obtaining the equipment initialization User's sensitive data in asking;
First generation module, for generating corresponding first initial information to user's sensitive data;And contract calls mould Block, for calling the increase function of the intelligent contract that the initial information is written in privately owned chain.
12. system according to claim 11, which is characterized in that
The data acquisition module is also used to obtain the equipment when receiving the equipment of the user using request and use User input data in request;
First generation module is also used to the user input data and generates corresponding information to be checked;
Contract calling module is also used to call the query function of the intelligent contract to the information to be checked in the privately owned chain In inquired;
Each smart machine difference further include:
Control module is operated, for determining whether the smart machine allows to be used according to the query result of the intelligent contract Operation.
CN201811359532.9A 2018-11-15 2018-11-15 Implementation method of intelligent equipment system, intelligent equipment control method and system Active CN109660514B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201811359532.9A CN109660514B (en) 2018-11-15 2018-11-15 Implementation method of intelligent equipment system, intelligent equipment control method and system
PCT/CN2019/106753 WO2020098382A1 (en) 2018-11-15 2019-09-19 Implementation method for smart device system, smart device control method and system
CA3160728A CA3160728A1 (en) 2018-11-15 2019-09-19 Method of realizing intelligent equipment system, method of controlling intelligent equipement, and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811359532.9A CN109660514B (en) 2018-11-15 2018-11-15 Implementation method of intelligent equipment system, intelligent equipment control method and system

Publications (2)

Publication Number Publication Date
CN109660514A true CN109660514A (en) 2019-04-19
CN109660514B CN109660514B (en) 2020-06-09

Family

ID=66112020

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811359532.9A Active CN109660514B (en) 2018-11-15 2018-11-15 Implementation method of intelligent equipment system, intelligent equipment control method and system

Country Status (3)

Country Link
CN (1) CN109660514B (en)
CA (1) CA3160728A1 (en)
WO (1) WO2020098382A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110716745A (en) * 2019-10-21 2020-01-21 星矿科技(北京)有限公司 Method for constructing off-center community by using block chain and intelligent contract
CN111046078A (en) * 2019-11-11 2020-04-21 北京海益同展信息科技有限公司 Block chain-based credit investigation query method and device and electronic equipment
WO2020098382A1 (en) * 2018-11-15 2020-05-22 苏宁云计算有限公司 Implementation method for smart device system, smart device control method and system
CN112637274A (en) * 2020-12-04 2021-04-09 山西特信环宇信息技术有限公司 Cone block chain terminal and access method thereof

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113347185B (en) * 2021-06-01 2023-04-18 佳乔(深圳)投资有限公司 Internet of things equipment management method based on block chain

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107341702A (en) * 2017-03-08 2017-11-10 阿里巴巴集团控股有限公司 A kind of method and device of business processing
CN107622385A (en) * 2017-08-28 2018-01-23 南京邮电大学 A kind of copyright distributing method based on block chain intelligence contract
CN108171430A (en) * 2017-12-29 2018-06-15 深圳市轱辘车联数据技术有限公司 Data processing method, mobile unit and UBI analysis centers server
KR101881045B1 (en) * 2017-11-15 2018-07-23 주식회사 가온시스템 System and method for providing medical information based on block chain
CN108364180A (en) * 2018-01-31 2018-08-03 复旦大学 A kind of shared electricity transaction method based on block chain
CN108460290A (en) * 2017-12-27 2018-08-28 江苏省卫生统计信息中心 A kind of Electronic Health Record management system and method
CN108494090A (en) * 2018-04-16 2018-09-04 华东师范大学 A kind of energy net connection intelligent apparatus and system based on block chain
CN108717861A (en) * 2018-04-16 2018-10-30 上海交通大学 A kind of medical data sharing method based on block chain
US20180315055A1 (en) * 2017-05-01 2018-11-01 International Business Machines Corporation Blockchain For Issue/Defect Tracking System

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107306183B (en) * 2016-04-22 2021-12-21 索尼公司 Client, server, method and identity verification system
CN106796685A (en) * 2016-12-30 2017-05-31 深圳前海达闼云端智能科技有限公司 Block chain authority control method and device and node equipment
WO2019036831A1 (en) * 2017-08-21 2019-02-28 达闼科技成都有限公司 Information selection method, apparatus, electronic device and computer-readable storage medium
CN108647966A (en) * 2018-05-09 2018-10-12 深圳市融讯科技有限公司 A kind of data interactive method and device based on block chain
CN109660514B (en) * 2018-11-15 2020-06-09 苏宁易购集团股份有限公司 Implementation method of intelligent equipment system, intelligent equipment control method and system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107341702A (en) * 2017-03-08 2017-11-10 阿里巴巴集团控股有限公司 A kind of method and device of business processing
US20180315055A1 (en) * 2017-05-01 2018-11-01 International Business Machines Corporation Blockchain For Issue/Defect Tracking System
CN107622385A (en) * 2017-08-28 2018-01-23 南京邮电大学 A kind of copyright distributing method based on block chain intelligence contract
KR101881045B1 (en) * 2017-11-15 2018-07-23 주식회사 가온시스템 System and method for providing medical information based on block chain
CN108460290A (en) * 2017-12-27 2018-08-28 江苏省卫生统计信息中心 A kind of Electronic Health Record management system and method
CN108171430A (en) * 2017-12-29 2018-06-15 深圳市轱辘车联数据技术有限公司 Data processing method, mobile unit and UBI analysis centers server
CN108364180A (en) * 2018-01-31 2018-08-03 复旦大学 A kind of shared electricity transaction method based on block chain
CN108494090A (en) * 2018-04-16 2018-09-04 华东师范大学 A kind of energy net connection intelligent apparatus and system based on block chain
CN108717861A (en) * 2018-04-16 2018-10-30 上海交通大学 A kind of medical data sharing method based on block chain

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020098382A1 (en) * 2018-11-15 2020-05-22 苏宁云计算有限公司 Implementation method for smart device system, smart device control method and system
CN110716745A (en) * 2019-10-21 2020-01-21 星矿科技(北京)有限公司 Method for constructing off-center community by using block chain and intelligent contract
CN111046078A (en) * 2019-11-11 2020-04-21 北京海益同展信息科技有限公司 Block chain-based credit investigation query method and device and electronic equipment
CN111046078B (en) * 2019-11-11 2023-09-05 京东科技信息技术有限公司 Credit investigation method and device based on block chain and electronic equipment
CN112637274A (en) * 2020-12-04 2021-04-09 山西特信环宇信息技术有限公司 Cone block chain terminal and access method thereof

Also Published As

Publication number Publication date
CA3160728A1 (en) 2020-05-22
CN109660514B (en) 2020-06-09
WO2020098382A1 (en) 2020-05-22

Similar Documents

Publication Publication Date Title
JP7051766B2 (en) Self-provisioning access control
CN109660514A (en) A kind of implementation method of smart machine system, smart machine control method and system
US20240330424A1 (en) Locking device biometric access
CN111464556B (en) Portable user terminal
US10219154B1 (en) Frictionless or near-frictionless 3 factor user authentication method and system by use of triad network
US20080290988A1 (en) Systems and methods for controlling access within a system of networked and non-networked processor-based systems
US20140354401A1 (en) Resource Management Based on Biometric Data
CN108091011A (en) Method and system of the verification technique to equipment progress permission control is unified by the testimony of a witness
CN103544749A (en) Cloud control access control management system and authentication method thereof
US20200098208A1 (en) Security control device, security control method, security system and storage medium
CN110535880A (en) The access control method and system of Internet of Things
CN110766850B (en) Visitor information management method, access control system, server and storage medium
KR102093145B1 (en) Object Storage Cloud System for optimization data on basis of biometrics
CN115240300A (en) Control method, system and device of intelligent security system and storage medium
US20220046016A1 (en) Access to physical resources based through identity provider
CN106933605A (en) A kind of intelligent progress recognizing control method and system
CN109584421A (en) A kind of intelligent door lock authentication administrative system based on domestic safety chip
CN113240836A (en) Bluetooth lock connection method adopting two-dimensional code and related configuration system
KR101133210B1 (en) Mobile Authentication System and Central Control System
CN108460872A (en) The control method and device of smart lock
CN109955934A (en) Electric vehicle identity authorization system and method
US20120068814A1 (en) Systems and methods of operating a secured facility
US20230075252A1 (en) Methods, systems, apparatus, and devices for controlling access to access control locations
CN106856471A (en) AD domains login authentication method under 802.1X
Catuogno et al. Flexible and robust enterprise right management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant