CN105939193A - Authorization and encryption method for controlling blacklist setting of intelligent lock - Google Patents

Authorization and encryption method for controlling blacklist setting of intelligent lock Download PDF

Info

Publication number
CN105939193A
CN105939193A CN201610458569.1A CN201610458569A CN105939193A CN 105939193 A CN105939193 A CN 105939193A CN 201610458569 A CN201610458569 A CN 201610458569A CN 105939193 A CN105939193 A CN 105939193A
Authority
CN
China
Prior art keywords
blacklist
lock
encryption
mobile phone
blue
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610458569.1A
Other languages
Chinese (zh)
Inventor
彭斌
陈楹
童卫兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WUHAN TIANCHENXIANG CLOUD DATA Co Ltd
Original Assignee
WUHAN TIANCHENXIANG CLOUD DATA Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WUHAN TIANCHENXIANG CLOUD DATA Co Ltd filed Critical WUHAN TIANCHENXIANG CLOUD DATA Co Ltd
Priority to CN201610458569.1A priority Critical patent/CN105939193A/en
Publication of CN105939193A publication Critical patent/CN105939193A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an authorization and encryption method for controlling blacklist setting of an intelligent lock. In the method, the blacklist and an authorized user ID after being bound are encrypted through a RSA public key to form an encrypted cryptograph; a mobile phone current user ID and the encrypted cryptograph are combined to compose a communication data packet; the communication data packet is sent to a Bluetooth intelligent lock through a Bluetooth; the Bluetooth intelligent lock decrypts the communication data packet by using a corresponding RSA private key in the lock and compares the current user ID with the authorized user ID; if the current user ID is as same as the authorized user ID, the blacklist is written in the lock rather than a nonvolatile memory; otherwise, a blacklist write-in command is not executed. The authorization and encryption method for controlling the blacklist setting of the intelligent lock can efficiently prevent an unauthorized ID from setting the blacklist.

Description

The blacklist controlling smart lock arranges mandate and encryption method
Technical field
The present invention relates to electric intelligent door lock and control technical field, mandate and encryption method are set in particular to a kind of blacklist controlling smart lock.
Technical background
Blue-tooth intelligence door lock uses electronic key unlocking, i.e. send electron key to mobile phone A PP (Application, application program), it is sent to smart lock by mobile phone A PP unblank, but this electron key all has validity period, in a lot of occasions, need to forbid also at the key unlocking of validity period, this needs exist for blacklist function, need not the blue-tooth intelligence lock of even the Internet during for unlocking operation, and its blacklist can only be arranged in lock.Being configured to the user of blacklist, it is impossible to unblank, even if he has also at the key of effect duration, the operating right that all blacklists are arranged must strictly control, and the cipher mode of setting command must safety.The encrypted data communication algorithm of existing blue-tooth intelligence lock all uses the symmetric block ciphers algorithms such as AES (Advanced Encryption Standard), and this algorithm Encrypt and Decrypt end uses same key, if using fixed key, key easily leaks;If employing random key, the key as using with smart lock end due to mobile phone A PP end, key needs to transmit between which, is easily intercepted by third party device, and safety is the highest, when arranging this critical function of blacklist for needs, has potential safety hazard.
Summary of the invention
Present invention aim to provide a kind of blacklist controlling smart lock to arrange mandate and encryption method, the method uses RSA, and (name of algorithm is named after its inventor: Ron Rivest, AdiShamir and Leonard Adleman) asymmetric encryption and decryption method, PKI is used for encrypting, private key is used for deciphering, public, the diverse key of private key spoon, simultaneously by authorized user ID (Identity, identity number) encrypt with the blacklist binding that need to arrange, blacklist can be solved well mandate and the problem of blacklist communication encryption are set.
For realizing this purpose, the blacklist controlling smart lock designed by the present invention arranges mandate and encryption method, it is characterised in that it comprises the steps:
Step 1: mobile phone electronic key management application program obtains rsa encryption PKI A;
Step 2: mobile phone electronic key management application program uses described rsa encryption PKI A encryption authorization ID and needs the blacklist name arranged, and generates encrypted cipher text B;
Step 3: when mobile phone electronic key management application program is configured blacklist operation, takes mobile phone electronic key management application program active user ID and encrypted cipher text B and forms communication bag, is sent to blue-tooth intelligence lock;
Step 4: after blue-tooth intelligence interlocking receives the communication bag that mobile phone electronic key management application program is sent, RSA private key preset in using blue-tooth intelligence lock deciphers described encrypted cipher text B;
Step 5: blue-tooth intelligence lock internal program compares authorized user ID and active user ID, if unanimously, then performs to write blacklist operation;If it is inconsistent, do not perform to write blacklist operation.
It is characteristic of the invention that and use RSA public key encryption after authorized user ID and blacklist binding, the lock of RSA PKI only purchase lock is main just to be had, so only locking user that is main or that lock main mandate can arrange blacklist, other users can be avoided to abuse this function;Another feature of the present invention is mobile phone A PP when lock sends blacklist order, in addition to sending ciphertext B of previous step, also will send APP ID at that time, will compare the two ID, and can effectively prevent unauthorized ID to arrange blacklist when processing in lock.
Accompanying drawing explanation
Fig. 1 is bluetooth blacklist setting command bag form in the present invention;
Fig. 2 is that in the present invention, mobile phone electronic key management application program end blacklist arranges communication bag product process figure;
Fig. 3 is the interior blacklist process chart of blue-tooth intelligence lock in the present invention;
Detailed description of the invention
Below in conjunction with the drawings and specific embodiments, the present invention is described in further detail:
A kind of blacklist controlling smart lock arranges mandate and encryption method, including key generation, blacklist and authorized user's encryption, ciphertext transmission, authorizes verification and blacklist setting.This encryption, based on rivest, shamir, adelman RSA, uses public key encryption blacklist and authorized user ID, uses corresponding private key deciphering, can use Brute Force effectively to prevent disabled user or use eavesdropping communication data mode to crack, concretely comprise the following steps:
Step 1: mobile phone electronic key management application program obtains rsa encryption PKI A;
Step 2: mobile phone electronic key management application program uses described rsa encryption PKI A encryption authorization ID and needs the blacklist name arranged, and generates encrypted cipher text B;
Step 3: when mobile phone electronic key management application program is configured blacklist operation, takes mobile phone electronic key management application program active user ID and encrypted cipher text B and forms communication bag, is sent to blue-tooth intelligence lock;
Step 4: after blue-tooth intelligence interlocking receives the communication bag that mobile phone electronic key management application program is sent, RSA private key preset in using blue-tooth intelligence lock deciphers described encrypted cipher text B;
Step 5: blue-tooth intelligence lock internal program compares authorized user ID and active user ID, if unanimously, then performs to write blacklist operation;If it is inconsistent, do not perform to write blacklist operation.
In the step 4 of technique scheme, presetting deciphering RSA private key in blue-tooth intelligence lock, mobile phone electronic key management application program can obtain the corresponding RSA PKI of encryption from the file that Lock Factory or Lock Factory provide.
The idiographic flow generating encrypted cipher text B in the step 2 of technique scheme is to use RSA public key encryption after authorized user ID binds together with blacklist again, generates encrypting ciphertext B.
In the step 3 of technique scheme, encrypted cipher text B forms communication bag together with active user ID, is sent to blue-tooth intelligence by the form of Bluetooth communication and locks.
In the step 5 of technique scheme, if authorized user ID is consistent with active user ID, then performing write blacklist operation and write by blacklist in the nonvolatile storage in blue-tooth intelligence lock, in lock after battery runs down, blacklist data also will not be lost.
In the step 1 of technique scheme, mobile phone electronic key management application program obtains rsa encryption PKI A from the file that Lock Factory or Lock Factory provide.
As shown in Figure 2, the file acquisition rsa encryption PKI that mobile phone electronic key management application program provides from Lock Factory or Lock Factory, authorized user ID is used RSA public key encryption with blacklist binding, ciphertext after being encrypted, ciphertext is formed blacklist setting command communication bag with mobile phone A PP active user ID, gives blue-tooth intelligence by bluetooth by communication bag and lock.
As shown in Figure 3, blue-tooth intelligence interlocking receives APP and sends the blacklist setting command communication bag of coming, take the RSA private key being preset in lock inner nonvolatile memory, with this private key decrypting ciphertext, obtain authorized user ID and blacklist, APP active user ID is the most identical with authorized user ID in comparison, if identical, perform to arrange blacklist operational order, does not performs to arrange blacklist operational order.
The content that this specification is not described in detail belongs to prior art known to professional and technical personnel in the field.

Claims (6)

1. the blacklist controlling smart lock arranges mandate and encryption method, it is characterised in that It comprises the steps:
Step 1: mobile phone electronic key management application program obtains rsa encryption PKI A;
Step 2: mobile phone electronic key management application program uses described rsa encryption PKI A The blacklist name that encryption authorization ID and needs are arranged, generates encrypted cipher text B;
Step 3: when mobile phone electronic key management application program is configured blacklist operation, take Mobile phone electronic key management application program active user ID and encrypted cipher text B forms communication bag, It is sent to blue-tooth intelligence lock;
Step 4: it is logical that blue-tooth intelligence interlocking receives that mobile phone electronic key management application program sends After news bag, RSA private key preset in using blue-tooth intelligence lock deciphers described encrypted cipher text B;
Step 5: blue-tooth intelligence lock internal program compares authorized user ID and active user ID, as Fruit is consistent, then perform to write blacklist operation;If it is inconsistent, do not perform to write blacklist behaviour Make.
The blacklist of control smart lock the most according to claim 1 arranges mandate and encryption Method, it is characterised in that: in described step 4, in blue-tooth intelligence lock, preset deciphering RSA Private key, mobile phone electronic key management application program can obtain from the file that Lock Factory or Lock Factory provide Take the corresponding RSA PKI of encryption.
The blacklist of control smart lock the most according to claim 1 arranges mandate and encryption Method, it is characterised in that: described step 2 generates the idiographic flow of encrypted cipher text B for awarding Power ID uses RSA public key encryption after binding together with blacklist again, generates encrypting Ciphertext B.
The blacklist of control smart lock the most according to claim 1 arranges mandate and encryption Method, it is characterised in that: in described step 3, encrypted cipher text B is together with active user ID Composition communication bag, is sent to blue-tooth intelligence by the form of Bluetooth communication and locks.
The blacklist of control smart lock the most according to claim 1 arranges mandate and encryption Method, it is characterised in that: in described step 5, if authorized user ID and active user ID Unanimously, then perform write blacklist operation and blacklist is write blue-tooth intelligence lock in non-volatile In memorizer.
The blacklist of control smart lock the most according to claim 1 arranges mandate and encryption Method, it is characterised in that: in described step 1, mobile phone electronic key management application program from Rsa encryption PKI A is obtained in the file that Lock Factory or Lock Factory provide.
CN201610458569.1A 2016-06-22 2016-06-22 Authorization and encryption method for controlling blacklist setting of intelligent lock Pending CN105939193A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610458569.1A CN105939193A (en) 2016-06-22 2016-06-22 Authorization and encryption method for controlling blacklist setting of intelligent lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610458569.1A CN105939193A (en) 2016-06-22 2016-06-22 Authorization and encryption method for controlling blacklist setting of intelligent lock

Publications (1)

Publication Number Publication Date
CN105939193A true CN105939193A (en) 2016-09-14

Family

ID=56872551

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610458569.1A Pending CN105939193A (en) 2016-06-22 2016-06-22 Authorization and encryption method for controlling blacklist setting of intelligent lock

Country Status (1)

Country Link
CN (1) CN105939193A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109472903A (en) * 2018-11-20 2019-03-15 北京千丁互联科技有限公司 A kind of control of bluetooth access control method and its device
CN111583484A (en) * 2020-04-02 2020-08-25 北京声智科技有限公司 Device control method, device, electronic device and computer-readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090320538A1 (en) * 2005-10-24 2009-12-31 Kaba Ag Method for controlling the locking of a lock, and lock
CN102916810A (en) * 2011-08-05 2013-02-06 中国移动通信集团公司 Method, system and apparatus for authenticating sensor
CN102936980A (en) * 2012-10-31 2013-02-20 北京小米科技有限责任公司 Method and device for controlling electronic lock
CN104167029A (en) * 2013-05-20 2014-11-26 陈罡 Intelligent lock and operation method thereof
CN104766409A (en) * 2015-05-05 2015-07-08 武汉工程大学 Long-distance electric storage box management system
CN205140035U (en) * 2015-10-22 2016-04-06 深圳优方网络技术有限公司 Mobile terminal and intelligent communication system who locks

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090320538A1 (en) * 2005-10-24 2009-12-31 Kaba Ag Method for controlling the locking of a lock, and lock
CN102916810A (en) * 2011-08-05 2013-02-06 中国移动通信集团公司 Method, system and apparatus for authenticating sensor
CN102936980A (en) * 2012-10-31 2013-02-20 北京小米科技有限责任公司 Method and device for controlling electronic lock
CN104167029A (en) * 2013-05-20 2014-11-26 陈罡 Intelligent lock and operation method thereof
CN104766409A (en) * 2015-05-05 2015-07-08 武汉工程大学 Long-distance electric storage box management system
CN205140035U (en) * 2015-10-22 2016-04-06 深圳优方网络技术有限公司 Mobile terminal and intelligent communication system who locks

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109472903A (en) * 2018-11-20 2019-03-15 北京千丁互联科技有限公司 A kind of control of bluetooth access control method and its device
CN111583484A (en) * 2020-04-02 2020-08-25 北京声智科技有限公司 Device control method, device, electronic device and computer-readable storage medium

Similar Documents

Publication Publication Date Title
CN103618607B (en) A kind of Security Data Transmission and key exchange method
KR101725847B1 (en) Master key encryption functions for transmitter-receiver pairing as a countermeasure to thwart key recovery attacks
US10477402B2 (en) One-way key fob and vehicle pairing
CN105184929A (en) Intelligent door lock control method and device
EP3476078B1 (en) Systems and methods for authenticating communications using a single message exchange and symmetric key
CN109543434B (en) Block chain information encryption method, decryption method, storage method and device
JP2005245010A5 (en)
CN105406969A (en) Apparatus And Method For Data Encryption
CN110047185A (en) A kind of method for unlocking and system of intelligent door lock
CN101539977B (en) Method for protecting computer software
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
CN105791258A (en) Data transmission method, terminal and open platform
CN101931623B (en) Safety communication method suitable for remote control with limited capability at controlled end
CN105262586B (en) The method for distributing key and device of automobile burglar equipment
CN103414564A (en) Secrete key card, secrete key device and method for protecting private key
Patel et al. On the security of remote key less entry for vehicles
CN112738133A (en) RSA authentication method
CN110932951B (en) Intelligent household control method and device
CN114186249A (en) Computer file security encryption method, computer file security decryption method and readable storage medium
CN112003697A (en) Encryption and decryption method and device for cryptographic module, electronic equipment and computer storage medium
CN105184930A (en) Control method and device of intelligent primary and secondary locks
CN105939193A (en) Authorization and encryption method for controlling blacklist setting of intelligent lock
CN105354500B (en) File encrypting method and device
CN106953917A (en) Method of data synchronization and system
CN101539978B (en) Software protection method based on space

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160914