CN109035510A - A method of controlling the access of express delivery smart lock by block chain - Google Patents
A method of controlling the access of express delivery smart lock by block chain Download PDFInfo
- Publication number
- CN109035510A CN109035510A CN201810763116.9A CN201810763116A CN109035510A CN 109035510 A CN109035510 A CN 109035510A CN 201810763116 A CN201810763116 A CN 201810763116A CN 109035510 A CN109035510 A CN 109035510A
- Authority
- CN
- China
- Prior art keywords
- access
- receiving device
- smart lock
- code
- processor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Lock And Its Accessories (AREA)
Abstract
The present invention provides a kind of methods of access that express delivery smart lock is controlled by block chain, the described method includes: generating fetcher code and private key associated with the fetcher code by the processor of computing system, the fetcher code is used to obtain the access to the smart lock;Processor hashes access code to obtain hash access code;Processor hashes access code using public key encryption to create digital signature, wherein hash access code and digital signature are stored in block chain on block;Processor response in the access smart lock from receiving device request and authenticate receiving device;Private key and digital signature is sent to by processor the receiving device of certification;Certification receiving device decrypts digital signature using private key to obtain hash access code, and hash access code is sent to computing system;In response to receiving hash access code from receiving device, processor controls smart lock and is unlocked or locked.
Description
Technical field
The present invention relates to block chain application fields, control express delivery smart lock by block chain in particular to a kind of
The method of access.
Background technique
It is more and more convenient that the prosperity of express delivery industry makes the modern life, but the safety of express delivery is a tender subject, weight
Wanting article to dispense by express delivery, risk is very high, now with dispatching is by the progress such as combination lock but password cracks so that the party
Formula safety reduces.And it is current by Internet of Things encryption technology, can market not allowed to trust completely.And block chain is encrypting
Aspect is advantageous.Block chain is the computers skills such as Distributed Storage, point-to-point transmission, common recognition mechanism, Encryption Algorithm
The new application mode of art.So-called common recognition mechanism is to realize to establish between different nodes in block catenary system trust, obtain equity
Mathematical algorithm.It is, in general, that block catenary system is by data Layer, network layer, common recognition layer, excitation layer, contract layer and application layer group
At.Wherein, data Layer encapsulates bottom data block and the basic datas such as relevant data encryption and timestamp and basic calculation
Method;Network layer then includes distributed networking mechanism, data dissemination mechanism and data authentication mechanism etc.;Common recognition layer predominant package network
All kinds of common recognition algorithms of node;Economic factor is integrated into block chain technical system by excitation layer, mainly includes economic incentives
Issuing mechanism and distribution mechanism etc.;All kinds of scripts of contract layer predominant package, algorithm and intelligent contract are the programmable spies of block chain
The basis of property;Application layer then encapsulates the various application scenarios and case of block chain.In the model, the chain type area based on timestamp
Block structure, the common recognition mechanism of distributed node, the intelligent contract based on the know together economic incentives and flexible programmable of calculating power are areas
The most representative innovative point of block chain technology.Due to using distributed accounting and storage, there is no the hardware of centralization or management
Mechanism, the rights and duties of arbitrary node be all it is impartial, data block in system by whole system with maintenance function
Node is jointly safeguarded.System be it is open, in addition to the private information of Trading parties is encrypted outer, the data of block chain are to owning
People discloses, anyone can be by disclosed interface polls block chain data and exploitation related application, therefore whole system is believed
Cease highly transparent.Block chain is used to be made entirely based on consensus specification and agreement (such as a set of open and clear algorithm)
All nodes in system can be in the exchange data that going the free safety of the environment trusted, so that being changed to pair to the trust of " people "
The trust of machine, any artificial intervention do not work.Once information permanent will be deposited by verifying and being added to block chain
Storage is got up, unless can control simultaneously be more than in system 51% node, be otherwise to the modification of database on individual node
Invalid, therefore the data stability of block chain and reliability are high.Since the exchange between node follows fixed algorithm,
Data interaction without trust (rules of order in block chain can voluntarily judge whether activity effective), therefore counterparty without
Other side must be allowed to generate oneself by way of public identity to trust, it is very helpful to the accumulation of credit.
Block chain as future generation computer system, the practical problem urgently handled in practical application there are also it is many not
It is proposed specific solution.
Summary of the invention
The invention proposes a kind of methods of access that express delivery smart lock is controlled by block chain, which is characterized in that described
Method includes: to generate fetcher code and private key associated with the fetcher code, the access by the processor of computing system
Code is used to obtain the access to the smart lock;Processor hashes access code to obtain hash access code;Processor
Using public key encryption hash access code to create digital signature, wherein hash access code and digital signature are stored in block on block
Chain;Processor response in the access smart lock from receiving device request and authenticate receiving device;By processor by private key and
Digital signature is sent to the receiving device of certification;Certification receiving device decrypts digital signature using private key to obtain hash access
Code, and hash access code is sent to computing system;In response to receiving hash access code from receiving device, processor is to intelligence
Lock is controlled and is unlocked or locked.
Further, wherein being coupled to one or more input mechanisms of the computing system in the predetermined of the smart lock
The presence of the detection receiving device in the adopted degree of approach, wherein enter in response to the receiving device and send the private key.Into
One step, the smart lock can access in finite time, and work as the finite time past tense, and the private key is no longer valid
To obtain the access to smart lock and generate new fetcher code.
It further, further include the access that the receiving device acquisition is generated on the block chain to the smart lock
Affairs, and the block chain prevents the computing system from sending more than one private key.
Further, the smart lock is located on express delivery delivery container, and the receiving device is to transport public affairs by package
Take charge of the mobile computing device of operation.
Specific embodiment
In order to enable the objectives, technical solutions, and advantages of the present invention are more clearly understood, below in conjunction with embodiment, to this
Invention is further elaborated;It should be appreciated that described herein, the specific embodiments are only for explaining the present invention, and does not have to
It is of the invention in limiting.To those skilled in the art, after access is described in detail below, other systems of the present embodiment
System, method and/or feature will become obvious.All such additional systems, method, feature and advantage are intended to be included in
It in this specification, is included within the scope of the invention, and by the protection of the appended claims.In description described in detail below
The other feature of the disclosed embodiments, and these characteristic roots will be apparent according to described in detail below.
Embodiment one.
A kind of method that the present embodiment explains access that express delivery smart lock is controlled by block chain, wherein the smart lock position
In on express delivery delivery container, and the receiving device is the mobile computing device operated by package transport company, such as hand-held
The barcode scanning gun or NFC of formula read equipment.
The described method includes: generating fetcher code and private associated with the fetcher code by the processor of computing system
Key, the fetcher code are used to obtain the access to the smart lock;Processor hashes access code to obtain hash and visit
Ask code;Processor hashes access code using public key encryption to create digital signature, wherein hash access code and digital signature storage
The block chain on block;Processor response in the access smart lock from receiving device request and authenticate receiving device;By handling
Device sends private key and digital signature to the receiving device of certification;Receiving device is authenticated using private key decryption digital signature to obtain
Access code is hashed, and hash access code is sent to computing system;In response to receiving hash access code from receiving device, handle
Device controls smart lock and is unlocked or locked.
Further, wherein being coupled to one or more input mechanisms of the computing system in the predetermined of the smart lock
The presence of the detection receiving device in the adopted degree of approach, wherein enter in response to the receiving device and send the private key.Into
One step, the smart lock can access in finite time, and work as the finite time past tense, and the private key is no longer valid
To obtain the access to smart lock and generate new fetcher code.
It further, further include the access that the receiving device acquisition is generated on the block chain to the smart lock
Affairs, and the block chain prevents the computing system from sending more than one private key.
Embodiment two.
For design of the invention is explained further, it is explained further here based on a kind of computer system, computer system
It include: processor;At least one is coupled to the input mechanism of the processor;It is coupled to the memory devices of the processor;
With the computer readable storage devices for being coupled to processor, wherein storage equipment includes program code, which can be by
It manages device to execute via memory devices to realize the method for controlling the access to smart lock, this method comprises: being by calculating
The processor of system generates, fetcher code and private key associated with fetcher code, and fetcher code is used to obtain the visit to smart lock
It asks;By processor hash fetcher code to obtain hash fetcher code;By processor encryption public key hash access code to create
Digital signature, wherein hash access code and digital signature are stored on the block of block chain;By processor response in from reception dress
Reception device is verified in the request set.Obtain the access to smart lock;It is sent private key and digital signature to through recognizing by processor
The receiving device of card;By processor instruction receiving device using private key decryption digital signature to obtain hash access code, and will dissipate
Column access code is sent to computing system;In response to receiving hash access code from receiving device, processor smart lock, such as by intelligence
It can lock locking or unlock.Smart lock can be the intelligent cipher lock of existing express delivery, belong to existing device dress on the market
It sets, no longer just plays structure here and repeat.
Wherein it is coupled to the predefined degree of approach of one or more input mechanisms in the smart lock of the computing system
The presence of the interior detection receiving device, wherein send the private key in response to the receiving device.And the smart lock can
It is accessed in finite time, and works as the finite time past tense, the private key is no longer valid to obtain the visit to smart lock
It asks and generates new fetcher code.Wherein the fetcher code keeps unknown for the receiving device.It further include described
Generate the affairs for the access that the receiving device is obtained to the lock space on block chain, and the block chain prevent it is described
Computing system sends more than one private key.
Embodiment three.
The present embodiment provides a kind of method for sending express delivery comprising arranges smart lock on the container of express delivery, then leads to
Cross block chain control express delivery smart lock access, access include: by computing system processor generate fetcher code and with it is described
The associated private key of fetcher code, the fetcher code are used to obtain the access to the smart lock;Processor to access code into
Row hash is to obtain hash access code;Processor, to create digital signature, is visited using public key encryption hash access code wherein hashing
Ask that code and digital signature are stored in block chain on block;Processor response in the access smart lock from receiving device request and recognize
Demonstrate,prove receiving device;Private key and digital signature is sent to by processor the receiving device of certification;It authenticates receiving device and uses private key
Hash access code is sent to computing system to obtain hash access code by decryption digital signature;In response to being connect from receiving device
Hash access code is received, processor controls smart lock and unlocked or locked.
Wherein it is coupled to the predefined degree of approach of one or more input mechanisms in the smart lock of the computing system
The presence of the interior detection receiving device, wherein enter in response to the receiving device and send the private key.
The smart lock can access in finite time, and work as the finite time past tense, the private key there is no
Effect is to obtain the access to smart lock and generate new fetcher code.
Further include the affairs for the access that the receiving device is obtained to the smart lock are generated on the block chain, and
The block chain prevents the computing system from sending more than one private key.
Example IV.
The method concept of the invention is configured to a kind of computer program product by the present embodiment, including storage computer can
The computer-readable hardware storage device of reader code, the computer readable program code include when the meter by computing system
The algorithm of the method for controlling the access to lock space is realized when calculation machine processor executes.It include: by computing system
It manages device and generates fetcher code and private key associated with fetcher code, fetcher code is used to obtain the access to lock space;By
Processor hashes fetcher code to obtain hash access code;By hash access code of the processor encryption with public key to create number
Signature, wherein hash access code and digital signature are stored on the block of block chain;It is set by processor auth response in from reception
Standby request receiving device is to obtain the access to lock space;Authenticating step is sent by private key and digital signature by processor
Receiving device;Processor indicates that receiving device decrypts digital signature using private key to obtain hash access code, and hash is accessed
Code is sent to computing system;In response to receiving hash access code, processor lock space from receiving device.Wherein it is coupled to institute
The one or more input mechanisms for stating computing system detect the receiving device in the predefined degree of approach of the lock space
Presence, wherein in response to the reception, send the private key.Equipment enters the predefined degree of approach of lock space.The lock
Determining space can access in finite time, and work as the finite time past tense, and the private key is no longer valid to obtain to lock
Determine the access in space and generates new fetcher code.
And the transaction for the access that the receiving device is obtained to the lock space is generated on the block chain.It is described
Block chain prevents the computing system from sending more than one private key.
Although describing the present invention by reference to various embodiments above, but it is to be understood that of the invention not departing from
In the case where range, many changes and modifications can be carried out.Therefore, be intended to foregoing detailed description be considered as it is illustrative and
It is unrestricted, and it is to be understood that following following claims (including all equivalents) is intended to limit spirit and model of the invention
It encloses.The above embodiment is interpreted as being merely to illustrate the present invention rather than limit the scope of the invention.It is reading
After the content of record of the invention, technical staff can be made various changes or modifications the present invention, these equivalence changes and
Modification equally falls into the scope of the claims in the present invention.
Claims (5)
1. a kind of method for the access for controlling express delivery smart lock by block chain, which is characterized in that the described method includes: by calculating
The processor of system generates fetcher code and private key associated with the fetcher code, and the fetcher code is for obtaining to institute
State the access of smart lock;Processor hashes access code to obtain hash access code;Processor is hashed using public key encryption
Access code is to create digital signature, wherein hash access code and digital signature are stored in block chain on block;
Processor response in the access smart lock from receiving device request and authenticate receiving device;By processor by private key and
Digital signature is sent to the receiving device of certification;Certification receiving device decrypts digital signature using private key to obtain hash access
Code, and hash access code is sent to computing system;In response to receiving hash access code from receiving device, processor is to intelligence
Lock is controlled and is unlocked or locked.
2. the method according to claim 1, wherein the one or more for being wherein coupled to the computing system is defeated
Enter the presence that mechanism detects the receiving device in the predefined degree of approach of the smart lock, wherein in response to the reception
Equipment enters and sends the private key.
3. method according to claim 2, which is characterized in that the smart lock can access in finite time, and work as institute
Finite time past tense is stated, the private key is no longer valid to obtain the access to smart lock and generate new fetcher code.
4. the method as claimed in claims 1-3, which is characterized in that further include generating the receiving device on the block chain
The affairs of the access to the smart lock are obtained, and the block chain prevents the computing system from sending more than one private key.
5. the method according to one of preceding claims, which is characterized in that the smart lock is located on express delivery delivery container,
And the receiving device is the mobile computing device operated by package transport company.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810763116.9A CN109035510A (en) | 2018-07-12 | 2018-07-12 | A method of controlling the access of express delivery smart lock by block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810763116.9A CN109035510A (en) | 2018-07-12 | 2018-07-12 | A method of controlling the access of express delivery smart lock by block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109035510A true CN109035510A (en) | 2018-12-18 |
Family
ID=64642218
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810763116.9A Withdrawn CN109035510A (en) | 2018-07-12 | 2018-07-12 | A method of controlling the access of express delivery smart lock by block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109035510A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109800897A (en) * | 2018-12-26 | 2019-05-24 | 中链科技有限公司 | Hotel occupancy processing method, device, system and calculating equipment based on block chain |
CN110490505A (en) * | 2019-06-25 | 2019-11-22 | 北京京东振世信息技术有限公司 | Logistics information processing method, device and equipment |
CN113661527A (en) * | 2019-04-09 | 2021-11-16 | 通力股份公司 | Access rights management |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101490687A (en) * | 2006-07-07 | 2009-07-22 | 桑迪士克股份有限公司 | Control system and method using identity objects |
CN104851159A (en) * | 2014-12-01 | 2015-08-19 | 讯美电子科技有限公司 | Network-type door access control system |
CN105847276A (en) * | 2016-04-28 | 2016-08-10 | 乐视控股(北京)有限公司 | Access control method and device |
US20170270721A1 (en) * | 2016-03-18 | 2017-09-21 | Dangerous Things LLC. | In vivo identity and security application implant and method |
CN107978047A (en) * | 2017-12-04 | 2018-05-01 | 北京深思数盾科技股份有限公司 | Use the methods, devices and systems of password unlocking |
CN108009878A (en) * | 2017-11-24 | 2018-05-08 | 深圳市轱辘车联数据技术有限公司 | A kind of information processing method and its device |
US20180167394A1 (en) * | 2016-12-14 | 2018-06-14 | Wal-Mart Stores, Inc. | Controlling access to a locked space using cryptographic keys stored on a blockchain |
-
2018
- 2018-07-12 CN CN201810763116.9A patent/CN109035510A/en not_active Withdrawn
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101490687A (en) * | 2006-07-07 | 2009-07-22 | 桑迪士克股份有限公司 | Control system and method using identity objects |
CN104851159A (en) * | 2014-12-01 | 2015-08-19 | 讯美电子科技有限公司 | Network-type door access control system |
US20170270721A1 (en) * | 2016-03-18 | 2017-09-21 | Dangerous Things LLC. | In vivo identity and security application implant and method |
CN105847276A (en) * | 2016-04-28 | 2016-08-10 | 乐视控股(北京)有限公司 | Access control method and device |
US20180167394A1 (en) * | 2016-12-14 | 2018-06-14 | Wal-Mart Stores, Inc. | Controlling access to a locked space using cryptographic keys stored on a blockchain |
CN108009878A (en) * | 2017-11-24 | 2018-05-08 | 深圳市轱辘车联数据技术有限公司 | A kind of information processing method and its device |
CN107978047A (en) * | 2017-12-04 | 2018-05-01 | 北京深思数盾科技股份有限公司 | Use the methods, devices and systems of password unlocking |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109800897A (en) * | 2018-12-26 | 2019-05-24 | 中链科技有限公司 | Hotel occupancy processing method, device, system and calculating equipment based on block chain |
CN113661527A (en) * | 2019-04-09 | 2021-11-16 | 通力股份公司 | Access rights management |
CN113661527B (en) * | 2019-04-09 | 2023-09-01 | 通力股份公司 | Access rights management |
CN110490505A (en) * | 2019-06-25 | 2019-11-22 | 北京京东振世信息技术有限公司 | Logistics information processing method, device and equipment |
WO2020258954A1 (en) * | 2019-06-25 | 2020-12-30 | 北京京东振世信息技术有限公司 | Method, apparatus and device for processing logstical information |
US11922743B2 (en) | 2019-06-25 | 2024-03-05 | Beijing Jingdong Zhenshi Information Technology Co., Ltd. | Logistics information processing method based on electronic lock, blockchain and waybill, and apparatus and device thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jangirala et al. | Designing secure lightweight blockchain-enabled RFID-based authentication protocol for supply chains in 5G mobile edge computing environment | |
US10635801B2 (en) | Systems and methods for securing access to storage and retrieval systems | |
Alqassem et al. | A taxonomy of security and privacy requirements for the Internet of Things (IoT) | |
CN101937528B (en) | Systems and methods for implementing supply chain visibility policies | |
TW201945970A (en) | Methods and systems for automatic object recognition and authentication | |
Wei et al. | A mutual authentication protocol for RFID | |
CA3124167A1 (en) | Methods and systems for preparing and performing an object authentication | |
CN111886828B (en) | Online authentication based on consensus | |
US20230133756A1 (en) | Safe delivery container, and system and method thereof | |
CN102394896A (en) | Privacy-protection fingerprint authentication method and system based on token | |
CN109903135A (en) | A kind of jewelry electronic information shared system based on block chain | |
CN109035510A (en) | A method of controlling the access of express delivery smart lock by block chain | |
CN108846297B (en) | A method of distributing and retrieve data in the block chain network with peer node | |
CN106789059A (en) | A kind of long-range two-way access control system and method based on trust computing | |
US20230100623A1 (en) | Safe Delivery Tower | |
CN110300971A (en) | Telnet based on biological characteristic | |
CN109285256A (en) | Computer room based on block chain authentication enter permission give method | |
GB2599416A (en) | Authentication system and method | |
KR102497076B1 (en) | Computer device, method and computer program for providing fido biometric authentication security key based blockchain wallet service | |
Liu et al. | The security of blockchain-based medical systems: Research challenges and opportunities | |
Prada-Delgado et al. | A blockchain-based crypto-anchor platform for interoperable product authentication | |
Yang et al. | A Hybrid Blockchain-Based Authentication Scheme for Smart Home | |
CN109035509A (en) | A method of intelligent door lock is opened and closed by block chain | |
CN101425901A (en) | Control method and device for customer identity verification in processing terminals | |
Chabbi et al. | RFID and NFC authentication protocol for securing a payment transaction |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20181218 |