CN105939193A - Authorization and encryption method for controlling blacklist setting of intelligent lock - Google Patents
Authorization and encryption method for controlling blacklist setting of intelligent lock Download PDFInfo
- Publication number
- CN105939193A CN105939193A CN201610458569.1A CN201610458569A CN105939193A CN 105939193 A CN105939193 A CN 105939193A CN 201610458569 A CN201610458569 A CN 201610458569A CN 105939193 A CN105939193 A CN 105939193A
- Authority
- CN
- China
- Prior art keywords
- blacklist
- lock
- encryption
- mobile phone
- blue
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses an authorization and encryption method for controlling blacklist setting of an intelligent lock. In the method, the blacklist and an authorized user ID after being bound are encrypted through a RSA public key to form an encrypted cryptograph; a mobile phone current user ID and the encrypted cryptograph are combined to compose a communication data packet; the communication data packet is sent to a Bluetooth intelligent lock through a Bluetooth; the Bluetooth intelligent lock decrypts the communication data packet by using a corresponding RSA private key in the lock and compares the current user ID with the authorized user ID; if the current user ID is as same as the authorized user ID, the blacklist is written in the lock rather than a nonvolatile memory; otherwise, a blacklist write-in command is not executed. The authorization and encryption method for controlling the blacklist setting of the intelligent lock can efficiently prevent an unauthorized ID from setting the blacklist.
Description
Technical field
The present invention relates to electric intelligent door lock and control technical field, mandate and encryption method are set in particular to a kind of blacklist controlling smart lock.
Technical background
Blue-tooth intelligence door lock uses electronic key unlocking, i.e. send electron key to mobile phone A PP (Application, application program), it is sent to smart lock by mobile phone A PP unblank, but this electron key all has validity period, in a lot of occasions, need to forbid also at the key unlocking of validity period, this needs exist for blacklist function, need not the blue-tooth intelligence lock of even the Internet during for unlocking operation, and its blacklist can only be arranged in lock.Being configured to the user of blacklist, it is impossible to unblank, even if he has also at the key of effect duration, the operating right that all blacklists are arranged must strictly control, and the cipher mode of setting command must safety.The encrypted data communication algorithm of existing blue-tooth intelligence lock all uses the symmetric block ciphers algorithms such as AES (Advanced Encryption Standard), and this algorithm Encrypt and Decrypt end uses same key, if using fixed key, key easily leaks;If employing random key, the key as using with smart lock end due to mobile phone A PP end, key needs to transmit between which, is easily intercepted by third party device, and safety is the highest, when arranging this critical function of blacklist for needs, has potential safety hazard.
Summary of the invention
Present invention aim to provide a kind of blacklist controlling smart lock to arrange mandate and encryption method, the method uses RSA, and (name of algorithm is named after its inventor: Ron Rivest, AdiShamir and Leonard Adleman) asymmetric encryption and decryption method, PKI is used for encrypting, private key is used for deciphering, public, the diverse key of private key spoon, simultaneously by authorized user ID (Identity, identity number) encrypt with the blacklist binding that need to arrange, blacklist can be solved well mandate and the problem of blacklist communication encryption are set.
For realizing this purpose, the blacklist controlling smart lock designed by the present invention arranges mandate and encryption method, it is characterised in that it comprises the steps:
Step 1: mobile phone electronic key management application program obtains rsa encryption PKI A;
Step 2: mobile phone electronic key management application program uses described rsa encryption PKI A encryption authorization ID and needs the blacklist name arranged, and generates encrypted cipher text B;
Step 3: when mobile phone electronic key management application program is configured blacklist operation, takes mobile phone electronic key management application program active user ID and encrypted cipher text B and forms communication bag, is sent to blue-tooth intelligence lock;
Step 4: after blue-tooth intelligence interlocking receives the communication bag that mobile phone electronic key management application program is sent, RSA private key preset in using blue-tooth intelligence lock deciphers described encrypted cipher text B;
Step 5: blue-tooth intelligence lock internal program compares authorized user ID and active user ID, if unanimously, then performs to write blacklist operation;If it is inconsistent, do not perform to write blacklist operation.
It is characteristic of the invention that and use RSA public key encryption after authorized user ID and blacklist binding, the lock of RSA PKI only purchase lock is main just to be had, so only locking user that is main or that lock main mandate can arrange blacklist, other users can be avoided to abuse this function;Another feature of the present invention is mobile phone A PP when lock sends blacklist order, in addition to sending ciphertext B of previous step, also will send APP ID at that time, will compare the two ID, and can effectively prevent unauthorized ID to arrange blacklist when processing in lock.
Accompanying drawing explanation
Fig. 1 is bluetooth blacklist setting command bag form in the present invention;
Fig. 2 is that in the present invention, mobile phone electronic key management application program end blacklist arranges communication bag product process figure;
Fig. 3 is the interior blacklist process chart of blue-tooth intelligence lock in the present invention;
Detailed description of the invention
Below in conjunction with the drawings and specific embodiments, the present invention is described in further detail:
A kind of blacklist controlling smart lock arranges mandate and encryption method, including key generation, blacklist and authorized user's encryption, ciphertext transmission, authorizes verification and blacklist setting.This encryption, based on rivest, shamir, adelman RSA, uses public key encryption blacklist and authorized user ID, uses corresponding private key deciphering, can use Brute Force effectively to prevent disabled user or use eavesdropping communication data mode to crack, concretely comprise the following steps:
Step 1: mobile phone electronic key management application program obtains rsa encryption PKI A;
Step 2: mobile phone electronic key management application program uses described rsa encryption PKI A encryption authorization ID and needs the blacklist name arranged, and generates encrypted cipher text B;
Step 3: when mobile phone electronic key management application program is configured blacklist operation, takes mobile phone electronic key management application program active user ID and encrypted cipher text B and forms communication bag, is sent to blue-tooth intelligence lock;
Step 4: after blue-tooth intelligence interlocking receives the communication bag that mobile phone electronic key management application program is sent, RSA private key preset in using blue-tooth intelligence lock deciphers described encrypted cipher text B;
Step 5: blue-tooth intelligence lock internal program compares authorized user ID and active user ID, if unanimously, then performs to write blacklist operation;If it is inconsistent, do not perform to write blacklist operation.
In the step 4 of technique scheme, presetting deciphering RSA private key in blue-tooth intelligence lock, mobile phone electronic key management application program can obtain the corresponding RSA PKI of encryption from the file that Lock Factory or Lock Factory provide.
The idiographic flow generating encrypted cipher text B in the step 2 of technique scheme is to use RSA public key encryption after authorized user ID binds together with blacklist again, generates encrypting ciphertext B.
In the step 3 of technique scheme, encrypted cipher text B forms communication bag together with active user ID, is sent to blue-tooth intelligence by the form of Bluetooth communication and locks.
In the step 5 of technique scheme, if authorized user ID is consistent with active user ID, then performing write blacklist operation and write by blacklist in the nonvolatile storage in blue-tooth intelligence lock, in lock after battery runs down, blacklist data also will not be lost.
In the step 1 of technique scheme, mobile phone electronic key management application program obtains rsa encryption PKI A from the file that Lock Factory or Lock Factory provide.
As shown in Figure 2, the file acquisition rsa encryption PKI that mobile phone electronic key management application program provides from Lock Factory or Lock Factory, authorized user ID is used RSA public key encryption with blacklist binding, ciphertext after being encrypted, ciphertext is formed blacklist setting command communication bag with mobile phone A PP active user ID, gives blue-tooth intelligence by bluetooth by communication bag and lock.
As shown in Figure 3, blue-tooth intelligence interlocking receives APP and sends the blacklist setting command communication bag of coming, take the RSA private key being preset in lock inner nonvolatile memory, with this private key decrypting ciphertext, obtain authorized user ID and blacklist, APP active user ID is the most identical with authorized user ID in comparison, if identical, perform to arrange blacklist operational order, does not performs to arrange blacklist operational order.
The content that this specification is not described in detail belongs to prior art known to professional and technical personnel in the field.
Claims (6)
1. the blacklist controlling smart lock arranges mandate and encryption method, it is characterised in that
It comprises the steps:
Step 1: mobile phone electronic key management application program obtains rsa encryption PKI A;
Step 2: mobile phone electronic key management application program uses described rsa encryption PKI A
The blacklist name that encryption authorization ID and needs are arranged, generates encrypted cipher text B;
Step 3: when mobile phone electronic key management application program is configured blacklist operation, take
Mobile phone electronic key management application program active user ID and encrypted cipher text B forms communication bag,
It is sent to blue-tooth intelligence lock;
Step 4: it is logical that blue-tooth intelligence interlocking receives that mobile phone electronic key management application program sends
After news bag, RSA private key preset in using blue-tooth intelligence lock deciphers described encrypted cipher text B;
Step 5: blue-tooth intelligence lock internal program compares authorized user ID and active user ID, as
Fruit is consistent, then perform to write blacklist operation;If it is inconsistent, do not perform to write blacklist behaviour
Make.
The blacklist of control smart lock the most according to claim 1 arranges mandate and encryption
Method, it is characterised in that: in described step 4, in blue-tooth intelligence lock, preset deciphering RSA
Private key, mobile phone electronic key management application program can obtain from the file that Lock Factory or Lock Factory provide
Take the corresponding RSA PKI of encryption.
The blacklist of control smart lock the most according to claim 1 arranges mandate and encryption
Method, it is characterised in that: described step 2 generates the idiographic flow of encrypted cipher text B for awarding
Power ID uses RSA public key encryption after binding together with blacklist again, generates encrypting
Ciphertext B.
The blacklist of control smart lock the most according to claim 1 arranges mandate and encryption
Method, it is characterised in that: in described step 3, encrypted cipher text B is together with active user ID
Composition communication bag, is sent to blue-tooth intelligence by the form of Bluetooth communication and locks.
The blacklist of control smart lock the most according to claim 1 arranges mandate and encryption
Method, it is characterised in that: in described step 5, if authorized user ID and active user ID
Unanimously, then perform write blacklist operation and blacklist is write blue-tooth intelligence lock in non-volatile
In memorizer.
The blacklist of control smart lock the most according to claim 1 arranges mandate and encryption
Method, it is characterised in that: in described step 1, mobile phone electronic key management application program from
Rsa encryption PKI A is obtained in the file that Lock Factory or Lock Factory provide.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610458569.1A CN105939193A (en) | 2016-06-22 | 2016-06-22 | Authorization and encryption method for controlling blacklist setting of intelligent lock |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610458569.1A CN105939193A (en) | 2016-06-22 | 2016-06-22 | Authorization and encryption method for controlling blacklist setting of intelligent lock |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105939193A true CN105939193A (en) | 2016-09-14 |
Family
ID=56872551
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610458569.1A Pending CN105939193A (en) | 2016-06-22 | 2016-06-22 | Authorization and encryption method for controlling blacklist setting of intelligent lock |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105939193A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109472903A (en) * | 2018-11-20 | 2019-03-15 | 北京千丁互联科技有限公司 | A kind of control of bluetooth access control method and its device |
CN111583484A (en) * | 2020-04-02 | 2020-08-25 | 北京声智科技有限公司 | Device control method, device, electronic device and computer-readable storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090320538A1 (en) * | 2005-10-24 | 2009-12-31 | Kaba Ag | Method for controlling the locking of a lock, and lock |
CN102916810A (en) * | 2011-08-05 | 2013-02-06 | 中国移动通信集团公司 | Method, system and apparatus for authenticating sensor |
CN102936980A (en) * | 2012-10-31 | 2013-02-20 | 北京小米科技有限责任公司 | Method and device for controlling electronic lock |
CN104167029A (en) * | 2013-05-20 | 2014-11-26 | 陈罡 | Intelligent lock and operation method thereof |
CN104766409A (en) * | 2015-05-05 | 2015-07-08 | 武汉工程大学 | Long-distance electric storage box management system |
CN205140035U (en) * | 2015-10-22 | 2016-04-06 | 深圳优方网络技术有限公司 | Mobile terminal and intelligent communication system who locks |
-
2016
- 2016-06-22 CN CN201610458569.1A patent/CN105939193A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090320538A1 (en) * | 2005-10-24 | 2009-12-31 | Kaba Ag | Method for controlling the locking of a lock, and lock |
CN102916810A (en) * | 2011-08-05 | 2013-02-06 | 中国移动通信集团公司 | Method, system and apparatus for authenticating sensor |
CN102936980A (en) * | 2012-10-31 | 2013-02-20 | 北京小米科技有限责任公司 | Method and device for controlling electronic lock |
CN104167029A (en) * | 2013-05-20 | 2014-11-26 | 陈罡 | Intelligent lock and operation method thereof |
CN104766409A (en) * | 2015-05-05 | 2015-07-08 | 武汉工程大学 | Long-distance electric storage box management system |
CN205140035U (en) * | 2015-10-22 | 2016-04-06 | 深圳优方网络技术有限公司 | Mobile terminal and intelligent communication system who locks |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109472903A (en) * | 2018-11-20 | 2019-03-15 | 北京千丁互联科技有限公司 | A kind of control of bluetooth access control method and its device |
CN111583484A (en) * | 2020-04-02 | 2020-08-25 | 北京声智科技有限公司 | Device control method, device, electronic device and computer-readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103618607B (en) | A kind of Security Data Transmission and key exchange method | |
KR101725847B1 (en) | Master key encryption functions for transmitter-receiver pairing as a countermeasure to thwart key recovery attacks | |
US10477402B2 (en) | One-way key fob and vehicle pairing | |
CN105184929A (en) | Intelligent door lock control method and device | |
EP3476078B1 (en) | Systems and methods for authenticating communications using a single message exchange and symmetric key | |
CN109543434B (en) | Block chain information encryption method, decryption method, storage method and device | |
JP2005245010A5 (en) | ||
CN105406969A (en) | Apparatus And Method For Data Encryption | |
CN110047185A (en) | A kind of method for unlocking and system of intelligent door lock | |
CN101539977B (en) | Method for protecting computer software | |
CN104901803A (en) | Data interaction safety protection method based on CPK identity authentication technology | |
CN105791258A (en) | Data transmission method, terminal and open platform | |
CN101931623B (en) | Safety communication method suitable for remote control with limited capability at controlled end | |
CN105262586B (en) | The method for distributing key and device of automobile burglar equipment | |
CN103414564A (en) | Secrete key card, secrete key device and method for protecting private key | |
Patel et al. | On the security of remote key less entry for vehicles | |
CN112738133A (en) | RSA authentication method | |
CN110932951B (en) | Intelligent household control method and device | |
CN114186249A (en) | Computer file security encryption method, computer file security decryption method and readable storage medium | |
CN112003697A (en) | Encryption and decryption method and device for cryptographic module, electronic equipment and computer storage medium | |
CN105184930A (en) | Control method and device of intelligent primary and secondary locks | |
CN105939193A (en) | Authorization and encryption method for controlling blacklist setting of intelligent lock | |
CN105354500B (en) | File encrypting method and device | |
CN106953917A (en) | Method of data synchronization and system | |
CN101539978B (en) | Software protection method based on space |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160914 |