CN110675543A - Method for configuring access control card, door lock control method and door lock - Google Patents

Method for configuring access control card, door lock control method and door lock Download PDF

Info

Publication number
CN110675543A
CN110675543A CN201911019534.8A CN201911019534A CN110675543A CN 110675543 A CN110675543 A CN 110675543A CN 201911019534 A CN201911019534 A CN 201911019534A CN 110675543 A CN110675543 A CN 110675543A
Authority
CN
China
Prior art keywords
card
door lock
access control
identification data
control card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911019534.8A
Other languages
Chinese (zh)
Other versions
CN110675543B (en
Inventor
李昱
唐杰
陈道远
杨苗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai, Zhuhai Lianyun Technology Co Ltd filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201911019534.8A priority Critical patent/CN110675543B/en
Publication of CN110675543A publication Critical patent/CN110675543A/en
Application granted granted Critical
Publication of CN110675543B publication Critical patent/CN110675543B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/40Indexing scheme relating to groups G07C9/20 - G07C9/29
    • G07C2209/41Indexing scheme relating to groups G07C9/20 - G07C9/29 with means for the generation of identity documents

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a method for configuring an access control card, the access control card, a control method of a door lock and the door lock, wherein the method for configuring the access control card comprises the following steps: selecting at least one piece of identification data from a plurality of pieces of identification data prestored in the door lock; the effective information and at least one of the entrance guard card are written into the identification data in the entrance guard card, wherein, at least one of the identification data is used for binding the entrance guard card with the door lock. The invention selects at least one piece of identification data from a plurality of pieces of identification data prestored in the door lock; the card issuing time and the valid period of the access control card, the secret key for opening the door lock and at least one piece of identification data are written into the access control card, so that the access authority and the valid period of the access control card can be successfully configured under the condition that the door lock is offline from the server.

Description

Method for configuring access control card, door lock control method and door lock
Technical Field
The invention belongs to the technical field of communication, and particularly relates to a method for configuring an access control card, the access control card, a control method of a door lock and the door lock.
Background
At present, with the process of urbanization accelerating, a large number of mobile population is rushing into the city, so that the number of public rental houses, short rental houses, hotel-type talent apartments and the like complying with the market demand is increasing day by day, most of the public rental houses, short rental houses, hotel-type talent apartments and the like are the same as the way of entrance guard of hotel rooms in the traditional hotel management, and the specific process is as follows: the method comprises the steps that information of tenants is registered in a foreground, the doorkeeper is issued by the foreground, for example, NFC house cards are issued by the foreground, the tenants swipe cards to enter doors in corresponding rooms through the NFC house cards, and most of the NFC house cards adopt read-write supporting non-contact logic encryption smart cards such as MIFARE S50 or S70 cards.
The specific process of configuring the NFC house card is as follows: the proscenium is with writing the information that the card machine read the NFC room card (generally including the serial number of NFC room card and the special content of NFC room card storage) to set up the life of NFC room card, issue corresponding room lock together through hotel's server, the room lock stores the information and the life of NFC room card, surpasss this card information deletion of time limit back lock with storage before, can't match the reopening door during the punching card.
However, the method for configuring the NFC house card has a drawback that the door lock and the server must be always connected during card writing, and once the door lock is offline during card writing, the information and the validity period of the NFC house card cannot be issued to the door lock, so that when the door lock is disconnected from the server, the access right and the validity period of the NFC house card in a room cannot be configured, and the card must be written again after the door lock is online connected to the server, which limits the configuration of the NFC house card and is very inconvenient.
There is a need for a method of configuring an access card, a method of controlling a door lock, and a door lock.
Disclosure of Invention
The invention aims to solve the technical problems that in the prior art, when a door lock is configured with a house card, a server is required to send information of the house card to the door lock, when the connection between the server and the door lock is interrupted, the house card cannot be configured for the door lock, and the card can be written again only after the door lock is connected with the server on line.
Aiming at the problems, the invention provides a method for configuring an access control card, the access control card, a control method of a door lock and the door lock.
In a first aspect, the present invention provides a method for configuring an access card, which is applied to an access control system, wherein the access control system comprises a door lock and an access card for opening the door lock, and the method comprises the following steps:
selecting at least one piece of identification data from a plurality of pieces of identification data prestored in the door lock;
the effective information and at least one of the entrance guard card are written into the identification data in the entrance guard card, wherein, at least one of the identification data is used for binding the entrance guard card with the door lock.
According to the embodiment of the present invention, preferably, the writing the valid information of the access card and the at least one piece of identification data into the access card includes:
and writing the card issuing time and the valid period of the access control card, a secret key for opening the door lock and at least one piece of identification data into the access control card.
According to an embodiment of the present invention, preferably, the method for configuring an access card further includes the following steps:
and when the service life of the access control card exceeds the valid period of the access control card, deleting at least one piece of identification data from the door lock so as to unbind the access control card from the door lock.
According to the embodiment of the present invention, preferably, writing the card issuing time, the expiration date, and the key for opening the door lock of the access control card and at least one piece of the identification data into the access control card includes:
and correspondingly writing the card issuing time and the valid period of the access control card, the secret key for opening the door lock and at least one piece of identification data into the same sector of the access control card.
According to an embodiment of the present invention, preferably, when the key for unlocking the door lock is a plurality of keys, writing the card issuing time, the valid period, the key for unlocking the door lock, and at least one piece of the identification data into the door lock card includes:
correspondingly writing the card issuing time, the valid period and at least one piece of identification data of the access control card into the same sector of the access control card;
and respectively writing the plurality of secret keys into a plurality of sectors of the access control card.
According to an embodiment of the present invention, preferably, when the key for unlocking the door lock is a plurality of keys and at least one piece of the identification data is a plurality of pieces of identification data, writing the card issuing time, the valid period, the key for unlocking the door lock, and at least one piece of the identification data into the door access card includes:
correspondingly writing the card issuing time and the valid period of the access control card into the same sector of the access control card;
writing the identification data into a plurality of sectors of the access card respectively;
and respectively writing the plurality of secret keys into a plurality of sectors of the access control card.
In a second aspect, the present invention provides an access card configured by a method of configuring an access card.
In a third aspect, the present invention provides a method for controlling a door lock, which is applied to the door lock, and comprises the following steps:
when the distance between the access control card and the door lock is smaller than a preset threshold value, reading the card issuing time, the valid period, the identification data and the secret key of the access control card stored in the access control card;
and comparing the secret key in the access control card with the secret key stored in the door lock, and judging whether the secret key in the access control card is consistent with the secret key stored in the door lock:
when the secret key in the access control card is consistent with the secret key stored in the door lock, comparing the identification data in the access control card with the identification data stored in the door lock, and judging whether the identification data in the access control card is the identification data stored in the door lock:
when the identification data is the identification data stored in the door lock, judging whether the door lock is valid according to the card issuing time, the valid period and the local time of the door lock:
and when the access control card is effective, controlling the door lock to be opened.
According to an embodiment of the present invention, preferably, the method for controlling a door lock further includes:
and before judging whether the access control card is valid according to the card issuing time and the valid period of the access control card and the local time of the door lock, calibrating the local time of the door lock.
According to the embodiment of the present invention, preferably, whether the access card is valid is judged according to the card issuing time, the valid period and the local time of the door lock of the access card, and the method specifically includes the following steps:
calculating the time difference between the card issuing time of the access control card and the local time of the door lock;
judging whether the time difference is smaller than the valid period of the access control card:
and when the time difference is smaller than the valid period of the access control card, judging that the access control card is valid.
In a fourth aspect, the present invention provides a door lock, which includes a memory and a processor, wherein the memory stores a computer program, and the computer program implements the steps of the control method of the door lock when being executed by the processor.
Compared with the prior art, one or more embodiments in the above scheme can have the following advantages or beneficial effects:
1) by applying the method for configuring the access control card, the issuing time and the valid period of the access control card, the secret key for opening the door lock and at least one piece of identification data are written into the access control card, so that the access authority and the valid period of the access control card can be successfully configured under the condition that the door lock is offline from a server;
2) by applying the method for configuring the access control card, at least one piece of identification data is deleted from the door lock, so that the access control card is unbound with the door lock, a secret key of the door lock does not need to be changed, and the method is simple and convenient;
3) by applying the method for configuring the access control card, the plurality of secret keys are respectively written into the plurality of sectors of the access control card, so that when the secret keys in the access control card are judged to be consistent with the secret keys stored in the door lock, and the secret keys of each sector in the access control card are consistent with the secret keys stored in the door lock, the comparison of identification data is further carried out, and the matching safety of the access control card and the door lock is improved.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
FIG. 1 is a flow chart illustrating a method for configuring an access card according to an embodiment of the invention;
FIG. 2 is a flowchart illustrating a method for configuring an access card according to a second embodiment of the present invention;
FIG. 3 is a flow chart illustrating a method for configuring an access control card according to an embodiment of the present invention;
fig. 4 shows a flowchart of a control method of a five-door lock according to an embodiment of the present invention.
Detailed Description
The following detailed description of the embodiments of the present invention will be provided with reference to the drawings and examples, so that how to apply the technical means to solve the technical problems and achieve the technical effects can be fully understood and implemented. It should be noted that, as long as there is no conflict, the embodiments and the features of the embodiments of the present invention may be combined with each other, and the technical solutions formed are within the scope of the present invention.
Example one
In order to solve the technical problems in the prior art, an embodiment of the present invention provides a method for configuring an access card, where in this embodiment, only one piece of identification data and one key pre-stored in a door lock are written into the access card.
Referring to fig. 1, an embodiment of the present invention provides a method for configuring an access card, which is applied to an access control system, where the access control system includes a door lock and an access card for opening the door lock, and the method includes the following steps:
s110, selecting one piece of identification data from a plurality of pieces of identification data prestored in the door lock;
s120, correspondingly writing the card issuing time and the valid period of the access control card, a secret key for opening the door lock and the identification data into the same sector of the access control card, so that the access control card can be identified, and the door lock is opened;
s130, judging whether the service time of the access control card exceeds the valid period of the access control card according to the time of swiping the door lock by the access control card: if yes, go to step S140; if not, no response is given;
and S140, deleting the piece of identification data from the door lock so as to unbind the access control card from the door lock.
In step S120, the key is used to read and write the sector data block, the sector data block must be read and written by the key, and the keys of the card sectors corresponding to the same door lock are the same, except that the special information is different. The secret keys of the card sectors corresponding to different door locks are different, and the cards corresponding to different door locks are distinguished. Therefore, two locks can not be unlocked by one card, the information of the data block in the card needs to be compared during unlocking, and the information can only be read when the secret keys are matched.
In the embodiment of the invention, the blank card of the access card can be a mifare 50 card, and the standard structure of the mifare 50 card is as follows: each card has sixteen independent sectors, the block3 of each sector stores the key of the sector, each card uses the key of the sector to pair with the door lock, and then reads and writes data, wherein, for higher safety, the method with the highest safety is: at most, sixteen secret keys are used, sixteen secret keys are stored in the door lock, and when the card is used, the secret keys of each sector of the card are matched successfully, and then data block comparison can be carried out continuously.
The implementation of the method for configuring an access card according to the embodiment of the present invention is described in detail below by way of example:
the door lock prestores a plurality of pieces of identification information such as 100 pieces of identification information before leaving a factory, each piece of identification information is a random number with 16 bytes, a MIFARE S50 card is arranged in the foreground to be used as an access card, the card has a unique table identifier UID, the card has a read-write function and a memory function, the card has a plurality of sectors, each sector can store a key of the sector and an access condition of each sector data block, and the foreground is provided with a card writer to support read-write operation on the MIFARE S50 card.
When the tenant registers in the foreground: the method comprises the steps that a foreground administrator writes an access control card into a randomly extracted one of 100 pieces of identification information prestored in a door lock by using a card writer, simultaneously writes the card issuing time and the valid period of the access control card, stores the card issuing time in hexadecimal data format in the following table 1, wherein the card issuing time is 0x7E3 in hexadecimal format in 2019 and 0x10E0 in valid period 3 days in 4320 minutes, so that the configuration of the access authority of the visitor access control card and the setting of the valid time of the visitor access control card by the foreground administrator are completed, and the door lock is not required to be connected with a server in an online mode in the process.
When the tenant swipes the card, the door lock identifies whether the identification information in the access control card is one of 100 pieces of pre-stored identification information, reads the card issuing time and the valid period recorded in the specified data block in the following table 1 after successful identification, and judges whether the access control card is in the valid period.
Table 1 shows the structure of the access card (MIFARE S50 card) configured by the method for configuring the access card according to the embodiment of the present invention.
TABLE 1
Figure BDA0002246747060000061
In table 1 above, in Block2 of sector 0, the card issuance time + expiration date is: the card-issuing time year + month + day (2 bytes +2 bytes) + the effective time year + month + day (2 bytes +2 bytes), and 12 bytes in total.
In table 1 above, an identification data, a card issuing time, a valid period of the access control card, and a key pre-stored in the door lock are all written into sector 0 of the access control card, and actually, an identification data, a card issuing time, a valid period of the access control card, and a key pre-stored in the door lock may also be written into other sectors of the access control card.
In more detail, in practical applications, a piece of identification data, the card issuing time and the valid period of the access card and a key pre-stored in the door lock may be written in any three sectors, for example, a piece of identification data is written in sector 0, the card issuing time and the valid period of the access card are written in sector 2, and a key pre-stored in the door lock is written in sector 15, as long as a piece of identification data, the card issuing time and the valid period of the access card and a key pre-stored in the door lock are written in specified different blocks. For example, a key is written in a Block3 of any sector, an identification datum is written in a Block1 of any sector, and a card issuing time and the validity period of an access card are written in a Block2 of any sector for a door lock to read.
The invention can support the offline configuration of the entrance guard card by pre-storing a plurality of pieces of identification information in the door lock, randomly extracting one piece of identification information from the pre-stored plurality of pieces of identification information to write in when the foreground writes the card into the entrance guard card, inputting the card issuing time and the valid period while writing the card, recording the card issuing time and the valid period when the door lock reads the card for the first time, and calibrating the local time of the door lock after the door lock is reconnected with the server to calculate whether the time difference between the card issuing time and the local time of the door lock exceeds the valid period, thus supporting the offline configuration of the entrance guard card.
Example two
In order to solve the above technical problems in the prior art, an embodiment of the present invention further provides a method for configuring an access card, where in this embodiment, in order to improve security of door lock opening, the number of keys written in the access card is increased, that is: and writing an identification datum and a plurality of keys prestored in the door lock into the access control card.
Referring to fig. 2, an embodiment of the present invention provides a method for configuring an access card, which is applied to an access control system, where the access control system includes a door lock and an access card for opening the door lock, and the method includes the following steps:
s210, selecting one piece of identification data from a plurality of pieces of identification data prestored in the door lock;
s220, correspondingly writing the card issuing time, the valid period and the identification data of the access control card into the same sector of the access control card;
s230, writing the plurality of secret keys into a plurality of sectors of the access control card respectively, so that the access control card can be identified, and the door lock is opened;
s240, judging whether the service time of the access control card exceeds the valid period of the access control card according to the time of swiping the door lock by the access control card: if yes, go to step S250; if not, no response is given;
and S250, deleting the piece of identification data from the door lock so as to unbind the access control card from the door lock.
Table 2 shows the structure of the access card (MIFARE S50 card) configured by the method for configuring an access card according to the embodiment of the present invention.
TABLE 2
In table 2 above, the validity period of an identification data, a card issuing time and an access control card is written into the same sector of the access control card, and in fact, the validity period of an identification data, a card issuing time and an access control card can be written into the same sector of the access control card.
In particular, the number of keys is greater than 1 and less than the number of sectors, which is not limited herein.
In more detail, in practical applications, a piece of identification data, the card issuing time and the validity period of the access card may be written in any two sectors, for example, a piece of identification data is written in the sector 0, and the card issuing time and the validity period of the access card are written in the sector 2, as long as a piece of identification data is written in a Block different from the designated Block with respect to the card issuing time and the validity period of the access card.
EXAMPLE III
In order to solve the above technical problems in the prior art, an embodiment of the present invention further provides a method for configuring an access card, wherein in this embodiment, in order to further improve security of door lock opening, the number of keys and the number of identification data written into the access card are increased, that is: and writing a plurality of pieces of identification data and a plurality of secret keys prestored in the door lock into the access control card.
Referring to fig. 3, an embodiment of the present invention provides a method for configuring an access card, which is applied to an access control system, where the access control system includes a door lock and an access card for opening the door lock, and the method includes the following steps:
s310, selecting a plurality of identification data from a plurality of identification data prestored in the door lock;
s320, correspondingly writing the card issuing time and the valid period of the access control card into the same sector of the access control card;
s330, writing the selected identification data into a plurality of sectors of the access control card respectively;
s340, writing the plurality of secret keys into a plurality of sectors of the access control card respectively, so that the access control card can be identified, and the door lock is opened;
s350, judging whether the service time of the access control card exceeds the valid period of the access control card according to the door-lock swiping time of the access control card: if yes, go to step S360; if not, no response is given.
And S360, deleting the selected identification data from the door lock so as to unbind the access control card from the door lock.
Table 3 shows the structure of the access card (MIFARE S50 card) configured by the method for configuring the access card according to the embodiment of the present invention.
TABLE 3
Figure BDA0002246747060000101
Example four
In order to solve the technical problems in the prior art, the embodiment of the invention also provides the access control card.
The access control card provided by the embodiment of the invention is configured by the method for configuring the access control card in the first embodiment to the third embodiment.
EXAMPLE five
In order to solve the technical problems in the prior art, the embodiment of the invention also provides a control method of the door lock.
Referring to fig. 4, the present invention provides a method for controlling a door lock, including the steps of:
s510, when the distance between the access control card and the door lock is smaller than a preset threshold value, reading the card issuing time, the valid period, the identification data and the secret key of the access control card stored in the access control card;
s520, comparing the secret key in the access control card with the secret key stored in the door lock, and judging whether the secret key in the access control card is consistent with the secret key stored in the door lock: if yes, go to step S530; if not, no response is given;
s530, comparing the identification data in the access control card with the identification data stored in the door lock, and judging whether the identification data in the access control card is the identification data stored in the door lock: if yes, go to step S550; if not, no response is given;
s540, calibrating the local time of the door lock;
s550, calculating the time difference between the card issuing time and the local time of the door lock, and judging whether the time difference is smaller than the valid period of the access control card: if yes, controlling the door lock to open; if not, no response is given.
Step S540 is not limited to be after step S530, but may be before step S530, step S520, and step S510 as long as step S540 is before step S550.
The following describes in detail the implementation of the control method of the door lock according to the embodiment of the present invention by way of example:
when the tenant swipes the card every time after the card is swiped for the first time, the card information is identified by the door lock, the card issuing time and the valid period in the data block are read, the time difference between the local time of the door lock and the card issuing time is calculated and compared with the valid period, the door lock can be unlocked when the door lock is in the valid period range, and the unlocking action is not executed if the door lock exceeds the valid period.
The local time of the door lock is calculated through an RTC real-time clock module or a chip, if the door lock is offline with a server for a long time, the local time and the accurate time of the door lock have errors of a single digit minute level, once the door lock is connected with the server again, the server sends the current accurate time to the door lock, and the door lock can calibrate the local time of the door lock through the current accurate time so as to prevent the calculation errors that a tenant cannot swipe a card into the door within the valid period.
EXAMPLE six
In order to solve the technical problems in the prior art, the embodiment of the invention also provides a door lock.
The door lock provided by the embodiment of the invention comprises a memory and a processor, wherein the memory is stored with a computer program, and the computer program realizes the steps of the door lock control method when being executed by the processor.
Although the embodiments of the present invention have been described above, the above description is only for the convenience of understanding the present invention, and is not intended to limit the present invention. It will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (11)

1. The method for configuring the access control card is applied to an access control system, wherein the access control system comprises a door lock and the access control card, and is characterized by comprising the following steps:
selecting at least one piece of identification data from a plurality of pieces of identification data prestored in the door lock;
the effective information and at least one of the entrance guard card are written into the identification data in the entrance guard card, wherein, at least one of the identification data is used for binding the entrance guard card with the door lock.
2. The method of claim 1, wherein writing the valid information of the access card and the at least one piece of identification data into the access card comprises:
and writing the card issuing time and the valid period of the access control card, a secret key for opening the door lock and at least one piece of identification data into the access control card.
3. The method of claim 2, further comprising the steps of:
and when the service life of the access control card exceeds the valid period of the access control card, deleting at least one piece of identification data from the door lock so as to unbind the access control card from the door lock.
4. The method of claim 2, wherein writing the card issuance time, the expiration date, and the key for opening the door lock of the access card and at least one piece of the identification data into the access card comprises:
and correspondingly writing the card issuing time and the valid period of the access control card, the secret key for opening the door lock and at least one piece of identification data into the same sector of the access control card.
5. The method of claim 2, wherein when the key for opening the door lock is a plurality of keys, writing a card issuance time, an expiration date of an access card, the key for opening the door lock, and at least one piece of the identification data into the access card, comprises:
correspondingly writing the card issuing time, the valid period and at least one piece of identification data of the access control card into the same sector of the access control card;
and respectively writing the plurality of secret keys into a plurality of sectors of the access control card.
6. The method of claim 2, wherein when the key for opening the door lock is a plurality of keys and the at least one piece of identification data is a plurality of pieces of identification data, writing a card issuance time, an expiration date of an access card, the key for opening the door lock, and the at least one piece of identification data into the access card comprises:
correspondingly writing the card issuing time and the valid period of the access control card into the same sector of the access control card;
writing the identification data into a plurality of sectors of the access card respectively;
and respectively writing the plurality of secret keys into a plurality of sectors of the access control card.
7. An access card configured by the method of any one of claims 1 to 6.
8. A method of controlling a door lock that mates with the access card of claim 7, comprising the steps of:
when the distance between the access control card and the door lock is smaller than a preset threshold value, reading the card issuing time, the valid period, the identification data and the secret key of the access control card stored in the access control card;
and comparing the secret key in the access control card with the secret key stored in the door lock, and judging whether the secret key in the access control card is consistent with the secret key stored in the door lock:
when the secret key in the access control card is consistent with the secret key stored in the door lock, comparing the identification data in the access control card with the identification data stored in the door lock, and judging whether the identification data in the access control card is the identification data stored in the door lock:
when the identification data is the identification data stored in the door lock, judging whether the door lock is valid according to the card issuing time, the valid period and the local time of the door lock:
and when the access control card is effective, controlling the door lock to be opened.
9. The method of claim 8, further comprising the steps of:
and before judging whether the access control card is valid according to the card issuing time and the valid period of the access control card and the local time of the door lock, calibrating the local time of the door lock.
10. The method according to claim 8, wherein whether the access card is valid is judged according to the card issuing time, the valid period and the local time of the door lock of the access card, and the method specifically comprises the following steps:
calculating the time difference between the card issuing time of the access control card and the local time of the door lock;
judging whether the time difference is smaller than the valid period of the access control card:
and when the time difference is smaller than the valid period of the access control card, judging that the access control card is valid.
11. A door lock comprising a memory and a processor, characterized in that the memory has stored thereon a computer program which, when executed by the processor, carries out the steps of the method according to any one of claims 8 to 10.
CN201911019534.8A 2019-10-24 2019-10-24 Method for configuring access card, control method of door lock and door lock Active CN110675543B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911019534.8A CN110675543B (en) 2019-10-24 2019-10-24 Method for configuring access card, control method of door lock and door lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911019534.8A CN110675543B (en) 2019-10-24 2019-10-24 Method for configuring access card, control method of door lock and door lock

Publications (2)

Publication Number Publication Date
CN110675543A true CN110675543A (en) 2020-01-10
CN110675543B CN110675543B (en) 2024-02-13

Family

ID=69084424

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911019534.8A Active CN110675543B (en) 2019-10-24 2019-10-24 Method for configuring access card, control method of door lock and door lock

Country Status (1)

Country Link
CN (1) CN110675543B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111489464A (en) * 2020-03-25 2020-08-04 北京小米移动软件有限公司 Identity verification method and device, electronic equipment and computer readable storage medium
CN114005208A (en) * 2021-12-30 2022-02-01 深圳灏鹏科技有限公司 Access control method, device, equipment and storage medium
CN115240308A (en) * 2022-09-26 2022-10-25 深圳市极致科技股份有限公司 Access control machine authorization method, device and system, access control machine and computer storage medium
CN116645751A (en) * 2023-06-27 2023-08-25 深圳市亲邻科技有限公司 IC card information changing method and system

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101937586A (en) * 2010-09-10 2011-01-05 上海贝岭股份有限公司 Access control system of residential community
US20130091404A1 (en) * 2011-10-07 2013-04-11 Panasonic Corporation Memory controller and storage device
US20130127594A1 (en) * 2011-11-23 2013-05-23 Tokai Riken Co., Ltd. Key management box
CN104751545A (en) * 2015-02-16 2015-07-01 张泽 System, method and device for processing permissions of door lock
CN106555513A (en) * 2016-10-20 2017-04-05 顺丰科技有限公司 Intelligent storage cabinet, intelligent door lock and its control method
CN106920306A (en) * 2017-03-01 2017-07-04 成都优客智家信息科技有限公司 Intelligent door card encryption system
CN107945324A (en) * 2017-11-14 2018-04-20 广东安居宝数码科技股份有限公司 Card writing method, card reading method and the device of access control system
CN108064398A (en) * 2016-12-20 2018-05-22 深圳中兴力维技术有限公司 Electron key management method and device
CN108091024A (en) * 2018-01-11 2018-05-29 成都千帆科技开发有限公司 Access control equipment Off-line control method
CN208605051U (en) * 2018-07-03 2019-03-15 国网冀北电力有限公司检修分公司 A kind of equipment lock for box door system
CN109472909A (en) * 2019-01-11 2019-03-15 常州科新永安电子锁有限公司 Blue-tooth intelligence lock, system and application method
CN110232762A (en) * 2019-06-24 2019-09-13 沈阳泰格科技发展有限公司 M1 card cabinet door electronic lock copy prevention method
CN110298951A (en) * 2019-07-16 2019-10-01 深圳市凯迪仕智能科技有限公司 Encryption method and encryption system for M1 card

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101937586A (en) * 2010-09-10 2011-01-05 上海贝岭股份有限公司 Access control system of residential community
US20130091404A1 (en) * 2011-10-07 2013-04-11 Panasonic Corporation Memory controller and storage device
US20130127594A1 (en) * 2011-11-23 2013-05-23 Tokai Riken Co., Ltd. Key management box
CN104751545A (en) * 2015-02-16 2015-07-01 张泽 System, method and device for processing permissions of door lock
CN106555513A (en) * 2016-10-20 2017-04-05 顺丰科技有限公司 Intelligent storage cabinet, intelligent door lock and its control method
CN108064398A (en) * 2016-12-20 2018-05-22 深圳中兴力维技术有限公司 Electron key management method and device
CN106920306A (en) * 2017-03-01 2017-07-04 成都优客智家信息科技有限公司 Intelligent door card encryption system
CN107945324A (en) * 2017-11-14 2018-04-20 广东安居宝数码科技股份有限公司 Card writing method, card reading method and the device of access control system
CN108091024A (en) * 2018-01-11 2018-05-29 成都千帆科技开发有限公司 Access control equipment Off-line control method
CN208605051U (en) * 2018-07-03 2019-03-15 国网冀北电力有限公司检修分公司 A kind of equipment lock for box door system
CN109472909A (en) * 2019-01-11 2019-03-15 常州科新永安电子锁有限公司 Blue-tooth intelligence lock, system and application method
CN110232762A (en) * 2019-06-24 2019-09-13 沈阳泰格科技发展有限公司 M1 card cabinet door electronic lock copy prevention method
CN110298951A (en) * 2019-07-16 2019-10-01 深圳市凯迪仕智能科技有限公司 Encryption method and encryption system for M1 card

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111489464A (en) * 2020-03-25 2020-08-04 北京小米移动软件有限公司 Identity verification method and device, electronic equipment and computer readable storage medium
US11263846B2 (en) 2020-03-25 2022-03-01 Beijing Xiaomi Mobile Software Co., Ltd. Authentication method and user equipment
US11875622B2 (en) 2020-03-25 2024-01-16 Beijing Xiaomi Mobile Software Co., Ltd. Authentication method and user equipment
CN114005208A (en) * 2021-12-30 2022-02-01 深圳灏鹏科技有限公司 Access control method, device, equipment and storage medium
CN114005208B (en) * 2021-12-30 2022-03-18 深圳灏鹏科技有限公司 Access control method, device, equipment and storage medium
CN115240308A (en) * 2022-09-26 2022-10-25 深圳市极致科技股份有限公司 Access control machine authorization method, device and system, access control machine and computer storage medium
CN116645751A (en) * 2023-06-27 2023-08-25 深圳市亲邻科技有限公司 IC card information changing method and system
CN116645751B (en) * 2023-06-27 2023-11-24 深圳市亲邻科技有限公司 IC card information changing method and system

Also Published As

Publication number Publication date
CN110675543B (en) 2024-02-13

Similar Documents

Publication Publication Date Title
CN110675543A (en) Method for configuring access control card, door lock control method and door lock
US5153581A (en) Method for authentication by an external medium of a portable object such as a memory card coupled to this medium
CN100409617C (en) System and method of authenticating validity and dropoff
US8102240B2 (en) Controller providing shared device access for access control systems
JPS63575A (en) Improved keying system
CN110782567B (en) Unlocking method and setting method of intelligent lock
CN106534080B (en) Object access right management method, corresponding background system, device and user terminal
CN208207950U (en) A kind of access control system
CN101339683A (en) Bag cabinet control method and system based on data sharing center
CN101714216B (en) Semiconductor element, biometric authentication method, biometric authentication system and mobile terminal
CN111383371B (en) Unlocking method, door lock, server, system, storage medium and electronic device
CN106504135A (en) Self-service take the Hospitality management system and its electronic lock for also blocking
CN114241631A (en) Control method and registration method of intelligent door lock and related devices
JP2007241336A (en) Security system using ic card
CN109753837A (en) A kind of anti-copying and tamper resistant method of IC card
WO2018082095A1 (en) Method and system for ic card management, and door access controller
US10181229B2 (en) Method and system for implementing a universal key card
JP5292749B2 (en) Admission control system and method
CN211264341U (en) Anti-copy access control card
CN106920306A (en) Intelligent door card encryption system
JP4199156B2 (en) Management system and management method
CN112785757A (en) Intelligent lock authorization authentication method and intelligent lock
JPS62154083A (en) Ic card having data managing means
TWI624810B (en) Access control management system and remote authorization method thereof
JP2019117480A (en) Information processing device and authentication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant