CN109889669A - A kind of unlocked by mobile telephone method and system based on secure cryptographic algorithm - Google Patents
A kind of unlocked by mobile telephone method and system based on secure cryptographic algorithm Download PDFInfo
- Publication number
- CN109889669A CN109889669A CN201910172337.3A CN201910172337A CN109889669A CN 109889669 A CN109889669 A CN 109889669A CN 201910172337 A CN201910172337 A CN 201910172337A CN 109889669 A CN109889669 A CN 109889669A
- Authority
- CN
- China
- Prior art keywords
- door lock
- mobile phone
- phone terminal
- lock end
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The unlocked by mobile telephone method and system based on secure cryptographic algorithm that the present invention relates to a kind of, applied to intelligent door lock, the first safety chip is provided in the door lock end, the second safety chip is provided in the mobile phone, it is opened including mobile telephone registration and snaps past journey and mobile phone verifying unlocking process, the mobile telephone registration, which is opened, to be snapped past journey and include the following steps;Step 1, door lock end generate one group of public key and private key;Step 2, mobile phone terminal encrypts code key by public key to obtain the first ciphertext, and is sent to door lock end;The first ciphertext is decrypted at step 3, door lock end, is encrypted door lock information to obtain the second ciphertext and is sent to mobile phone terminal;Obtained information is stored in the second safety chip by step 4, mobile phone terminal after the second ciphertext is decrypted.Safety verification of the present invention is more reliable, and the verification information of mobile phone terminal is stored in mobile phone local, guarantees the safety in information verification process.
Description
Technical field
The present invention relates to clouds to lock encryption unlocking technique field, and in particular to a kind of unlocked by mobile telephone based on secure cryptographic algorithm
Method and system.
Background technique
With the development of intelligent door lock and universal, more and more unlocking modes are currently being used.Mobile phone has been used as people
Personal article on very close terms.Using unlocked by mobile telephone, people can be allowed to exempt carrying keys, and it is unknown to can be suitably used for finger print
It is aobvious, can not the user that unlocks of fingerprint, and be able to satisfy old man and have a bad memory and can not remember password to unlock.It is gently leaned on by mobile phone
Nearly door lock can fast implement unlocking, effectively increase unlocking speed.During existing NFC unlocking mode is unlocked, need to obtain
The door lock information taken stores beyond the clouds, obtains when opening the door from cloud, and causing the safety of data transmission procedure to be difficult to obtain can
The guarantee leaned on.
Summary of the invention
It is an object of the invention to aiming at the deficiencies in the prior art, provide a kind of hand based on secure cryptographic algorithm
Machine method for unlocking and system.
To achieve this purpose, the present invention adopts the following technical scheme:
A kind of unlocked by mobile telephone method based on secure cryptographic algorithm, is applied to intelligent door lock, and the is provided in the door lock end
One safety chip, is provided with the second safety chip in the mobile phone, including mobile telephone registration is opened and snaps past journey and mobile phone verifying was unlocked
Journey, the mobile telephone registration, which is opened, to be snapped past journey and includes the following steps:
Step 1, the first built-in safety chip generates the public key and private key of one group of rivest, shamir, adelman in door lock end,
The private key is stored in first safety chip and can not be read, and the public key passes to cloud by communication network and takes
Business device, and the public key passes to mobile phone terminal by cloud server, the mobile phone terminal and the cloud server save institute
State public key;
Step 2 generates the code key of symmetric encipherment algorithm by the second safety chip of the mobile phone terminal, and in the hand
Generator terminal carries out encryption to the code key by the public key and generates the first ciphertext, which passes through the cloud server again
It is sent to the door lock end;
Step 3, the door lock end are decrypted to obtain described secret using its described private key saved to first ciphertext
Key, the code key and door lock information are generated the second ciphertext again by first safety chip, and second ciphertext is passed through institute
It states cloud server and is sent to the mobile phone terminal;
Step 4, the mobile phone terminal decrypt second ciphertext to obtain the door lock information and are stored in second peace
In full chip, completes opening for the CPU card of the mobile phone terminal and snap past journey.
Further description, mobile phone verifying unlocking process the following steps are included:
Step 5 will open the mobile phone terminal of card close to door lock end, and the door lock end detects the mobile phone terminal
Radiofrequency signal, and send Select AID and instruct to the mobile phone terminal, after the response for receiving the mobile phone terminal, the door lock end
One group of random number is sent to the mobile phone terminal;
Step 6, second safety chip are encrypted to obtain using the public key to random number and the door lock information
Third ciphertext, and the third ciphertext is back to the door lock end by radiofrequency signal;
The third ciphertext is decrypted by the private key for step 7, the door lock end, and the door that decryption is obtained
Lock information is compared with the door lock information at door lock end, if door lock information unanimously if the door lock end open door lock.
Further description, the rivest, shamir, adelman are RSA Algorithm.
Further description, the symmetric encipherment algorithm are aes algorithm.
Further description, the mobile phone terminal for establishing binding relationship with the door lock end in the step 2 have permission to cloud
Server is held to send the first ciphertext, and the mobile phone terminal of the user of administrator's identity can check whole CPU card letters opened
Breath.
Further description, the door lock information in the step 3 include the random ID ID and door lock that door lock end generates
The physical address at end.
Further description, user can delete the CPU card for having opened card from the mobile phone terminal;Administrator can be from institute
It states mobile phone terminal and sends instruction, the door lock end is controlled by the cloud server and deletes correspondence in first safety chip
Information.
A kind of unlocked by mobile telephone system based on secure cryptographic algorithm, including door lock end, mobile phone terminal and cloud server;It is described
Door lock end, mobile phone terminal and cloud server are connected by communication network;
The door lock end includes door lock MCU and the first safety chip;The door lock MCU is used for and mobile phone terminal and cloud service
Device carries out sending and receiving for data, and the door lock MCU is also used to compare the door lock information of mobile phone transmission;The first safe core
Piece is for being decrypted or encrypting to interactive information;
The mobile phone terminal includes the second safety chip and cell phone application;The cell phone application is used to pass through cloud server and institute
It states door lock end and carries out information exchange;Second safety chip is used to store door lock information and for interactive information progress
Decryption or encryption;
The cloud server is used to transmit information when mobile phone terminal and door lock end carry out data interaction.
Further description, the cloud server further include Sign-On authentication module, for the mobile phone terminal and described
Door lock end carries out Sign-On authentication when establishing binding relationship for the first time.
Further description, the mobile phone terminal further include CPU card display module, are had been switched on for showing in mobile phone terminal
CPU card, while the mobile phone terminal for being also used for the user of administrator's identity checks all CPU cards for having opened;The mobile phone terminal is also
Including CPU card removing module, for deleting the CPU card opened in mobile phone terminal or deleting the door by cloud server
The door lock information of the CPU card stored in lock end.
Beneficial effects of the present invention: when opening card, the asymmetric encryption of the first safety chip generation in door lock end is utilized
The private key for the symmetric encipherment algorithm that the second safety chip generates in the public key and private key and mobile phone terminal of algorithm is door lock end and hand
Information exchange between generator terminal provides safety assurance.Rivest, shamir, adelman and symmetric encipherment algorithm are applied, it is generally speaking, non-
Symmetric encipherment algorithm safety is higher, and the code key length of symmetric encipherment algorithm is relatively short, transmission speed is fast, thus applies
It is safer that rivest, shamir, adelman carries out encryption transmission to the code key of symmetric encipherment algorithm, and transmits the secret of symmetric encipherment algorithm
Key fast speed, thus speed is also assured while securely transmitting ensure that.During mobile phone is verified and unlocked, use is non-
Lock information carries out encrypting and decrypting, more secure and reliable to symmetric encipherment algorithm on the door.It is mentioned using the physical address and door lock end at door lock end
The identity ID of mobile phone terminal is supplied as specific verification information, safety verification is more reliable.The verification information of mobile phone terminal is stored in
Mobile phone is local, will not guarantee again by cloud server interaction door lock information when mobile phone terminal and door lock end carry out information exchange
Safety in information verification process.
Detailed description of the invention
Present invention will be further explained below with reference to the attached drawings and examples.
Fig. 1 is that one embodiment of the present of invention opens the flow chart for snapping past journey;
Fig. 2 is the flow chart of the enabling verification process of one embodiment of the present of invention.
Specific embodiment
To further illustrate the technical scheme of the present invention below with reference to the accompanying drawings and specific embodiments.
As Figure 1-Figure 2, a kind of unlocked by mobile telephone method based on secure cryptographic algorithm is applied to intelligent door lock, the door
Be provided with the first safety chip in lock end, be provided with the second safety chip in the mobile phone, including mobile telephone registration open snap past journey and
Mobile phone verifies unlocking process, and the mobile telephone registration, which is opened, to be snapped past journey and include the following steps:
Step 1, the first built-in safety chip generates the public key and private key of one group of rivest, shamir, adelman in door lock end,
The private key is stored in first safety chip and can not be read, and the public key passes to cloud by communication network and takes
Business device, and the public key passes to mobile phone terminal by cloud server, the mobile phone terminal and the cloud server save institute
State public key;
Step 2 generates the code key of symmetric encipherment algorithm by the second safety chip of the mobile phone terminal, and in the hand
Generator terminal carries out encryption to the code key by the public key and generates the first ciphertext, which passes through the cloud server again
It is sent to the door lock end;
Step 3, the door lock end are decrypted to obtain described secret using its described private key saved to first ciphertext
Key, the code key and door lock information are generated the second ciphertext again by first safety chip, and second ciphertext is passed through institute
It states cloud server and is sent to the mobile phone terminal;
Step 4, the mobile phone terminal decrypt second ciphertext to obtain the door lock information and are stored in second peace
In full chip, completes opening for the CPU card of the mobile phone terminal and snap past journey.
Mobile phone verifying unlocking process the following steps are included:
Step 5 will open the mobile phone terminal of card close to door lock end, and the door lock end detects the mobile phone terminal
Radiofrequency signal, and send Select AID and instruct to the mobile phone terminal, after the response for receiving the mobile phone terminal, the door lock end
One group of random number is sent to the mobile phone terminal;
Step 6, second safety chip are encrypted to obtain using the public key to random number and the door lock information
Third ciphertext, and the third ciphertext is back to the door lock end by radiofrequency signal;
The third ciphertext is decrypted by the private key for step 7, the door lock end, and the door that decryption is obtained
Lock information is compared with the door lock information at door lock end, if door lock information unanimously if the door lock end open door lock.
Step 1 is out the process of card to step 4.When opening card, first safety chip at door lock end can generate asymmetric
As soon as group public key and private key of Encryption Algorithm, when opening card, the information exchange at mobile phone and door lock end is made with this group of public key and private key
For information cryptographic means.When carrying out out card, it is necessary first to which user is from mobile phone terminal Sign-On authentication APP, namely has door lock to log in pipe
The talent of reason access right, which has, to carry out sending the qualification for opening card request instruction from mobile phone terminal, this is to guarantee mobile phone terminal and door lock end peace
The first line of defence of full communication.Then when carrying out the information exchange between mobile phone terminal and door lock end, in mobile phone terminal and door lock end
Place is encrypted and decrypted respectively, and to ensure the safety of data transmission, this is guarantee mobile phone terminal and the secure communication of door lock end the
Two defence lines.Door lock end is sent door lock information by encrypted second ciphertext of symmetric encipherment algorithm code key by cloud server
To mobile phone terminal, mobile phone terminal obtains door lock information after being decrypted, and door lock information is recorded in the second safety chip, after progress
When continuous opening door operation and mobile phone terminal using in the second safety chip information and door lock end directly carry out information exchange, and
Will not be by cloud server, this is the three lines of defence for guaranteeing mobile phone terminal and the secure communication of door lock end.Using mobile phone terminal into
When the operation that row opens the door, door lock end needs to carry out the cryptogram validation twice verification process of mobile phone command verification and mobile phone, and door
Encryption is decrypted in the public, private key that the communication that lock end and mobile phone terminal carry out is all made of rivest, shamir, adelman, this is to guarantee hand
The four lines of defense of generator terminal and the secure communication of door lock end.
Further description, the rivest, shamir, adelman are RSA Algorithm, and the symmetric encipherment algorithm is AES
Algorithm.
This programme applies rivest, shamir, adelman and symmetric encipherment algorithm, generally speaking, rivest, shamir, adelman safety
Property it is higher, and the code key length of symmetric encipherment algorithm is relatively short, transmission speed is fast, thus applies rivest, shamir, adelman pair
It is safer that the code key of symmetric encipherment algorithm carries out encryption transmission, and transmits the code key fast speed of symmetric encipherment algorithm, thus
Speed is also assured while securely transmitting ensure that.Using AES DSE arithmetic to transmission data encryption, use simultaneously
RSA asymmetry cipher system transmits the key of AES, so that it may which comprehensive the advantages of playing AES and RSA avoids their disadvantages simultaneously
To realize a kind of new Data Encryption Scheme.
Further description, the mobile phone terminal for establishing binding relationship with the door lock end in the step 2 have permission to cloud
Server is held to send the first ciphertext, and the mobile phone terminal of the user of administrator's identity can check whole CPU card letters opened
Breath.
By taking new door lock as an example, mobile phone terminal needs to establish the binding relationship with door lock end by cloud server, even if this
Necessary condition from mobile phone terminal operation door lock end, can also receive excessive abnormal request to avoid door lock end.Due to each
A CPU opens the participation for snapping past Cheng Douyou cloud server, thus also can the relevant information of split card recorded, as record opens card
Time, open the information such as the quantity of card in total, and the user of administrator's identity can check whole opened from mobile phone terminal
CPU card information facilitates administrator and carries out more complete clear control to CPU card.
Further description, the door lock information in the step 3 include the random ID ID and door lock that door lock end generates
The physical address at end.
Because there is its unique physical address at each door lock end when leaving the factory, carried out in mobile phone terminal and door lock end
During communication, the physical address at door lock end can play verifying mark action well.Door lock end is supplied to mobile phone terminal
Identity ID is mobile phone terminal and one of the voucher that door lock end is communicated, and also facilitates the user with administrator right to CPU card
Carry out unified management.In addition, the identity ID that door lock generates can only assign unique mobile phone, if user replaces mobile phone, need
Using new mobile phone, opening for CPU card snaps past journey again, with this come the safety for the information for ensuring to store in mobile phone terminal.
Further description, user can delete the CPU card for having opened card from the mobile phone terminal;Administrator can be from institute
It states mobile phone terminal and sends instruction, the door lock end is controlled by the cloud server and deletes correspondence in first safety chip
Information.
For the user for temporarily using CPU card, such as the relative to stay temporarily or cleaning worker etc., it needs to delete in time
The access right of the CPU card of these users.User directly deletes the CPU card for having opened card from mobile phone terminal, or from pipe
The mobile phone terminal of reason person sends the information that door lock end is deleted in instruction, because mobile phone terminal and the communication process at door lock end needs are corresponding secret
Key just can be carried out, so the right to use of CPU card can be cancelled by deleting corresponding information from door lock end or mobile phone terminal any end
Limit.
A kind of unlocked by mobile telephone system based on secure cryptographic algorithm, including door lock end, mobile phone terminal and cloud server;It is described
Door lock end, mobile phone terminal and cloud server are connected by communication network;
The door lock end includes door lock MCU and the first safety chip;The door lock MCU is used for and mobile phone terminal and cloud service
Device carries out sending and receiving for data, and the door lock MCU is also used to compare the door lock information of mobile phone terminal transmission;First safety
Chip is for being decrypted or encrypting to interactive information;
The mobile phone terminal includes the second safety chip and cell phone application;The cell phone application is used to pass through cloud server and institute
It states door lock end and carries out information exchange;Second safety chip is used to store door lock information and for interactive information progress
Decryption or encryption;
The cloud server is used to transmit information when mobile phone terminal and door lock end carry out data interaction.
Further description, the cloud server further include Sign-On authentication module, for the mobile phone terminal and described
Door lock end carries out Sign-On authentication when establishing binding relationship for the first time.
Further description, the mobile phone terminal further include CPU card display module, are had been switched on for showing in mobile phone terminal
CPU card, while the mobile phone terminal for being also used for the user of administrator's identity checks all CPU cards for having opened.
Further description, the mobile phone terminal further include CPU card removing module, open-minded in mobile phone terminal for deleting
CPU card or the door lock information of the CPU card stored in the door lock end is deleted by cloud server.
The above is only a preferred embodiment of the present invention, for those of ordinary skill in the art, according to the present invention
Thought, there will be changes in the specific implementation manner and application range, and the content of the present specification should not be construed as to the present invention
Limitation.
Claims (10)
1. a kind of unlocked by mobile telephone method based on secure cryptographic algorithm is applied to intelligent door lock, is provided with first in the door lock end
Safety chip is provided with the second safety chip in the mobile phone, which is characterized in that opens including mobile telephone registration and snaps past journey and mobile phone is tested
Unlocking process is demonstrate,proved, the mobile telephone registration, which is opened, to be snapped past journey and include the following steps:
Step 1, the first built-in safety chip generates the public key and private key of one group of rivest, shamir, adelman in door lock end, described
Private key is stored in first safety chip and can not be read, and the public key passes to cloud service by communication network
Device, and the public key passes to mobile phone terminal by cloud server, described in the mobile phone terminal and the cloud server save
Public key;
Step 2 generates the code key of symmetric encipherment algorithm by the second safety chip of the mobile phone terminal, and in the mobile phone terminal
Encryption is carried out to the code key by the public key and generates the first ciphertext, which passes through the cloud server again and send
To the door lock end;
Step 3, the door lock end are decrypted to obtain the code key using its described private key saved to first ciphertext,
The code key and door lock information are generated the second ciphertext again by first safety chip, and second ciphertext is passed through the cloud
End server is sent to the mobile phone terminal;
Step 4, the mobile phone terminal decrypt second ciphertext to obtain the door lock information and are stored in the described second safe core
In piece, completes opening for the CPU card of the mobile phone terminal and snap past journey.
2. a kind of unlocked by mobile telephone method based on secure cryptographic algorithm according to claim 1, it is characterised in that: the hand
Machine verify unlocking process the following steps are included:
Step 5 will open the mobile phone terminal of card close to door lock end, and the door lock end detects the radio frequency of the mobile phone terminal
Signal, and send Select AID and instruct to the mobile phone terminal, after the response for receiving the mobile phone terminal, the door lock end is sent
One group of random number is to the mobile phone terminal;
Step 6, second safety chip are encrypted to obtain third using the public key to random number and the door lock information
Ciphertext, and the third ciphertext is back to the door lock end by radiofrequency signal;
Step 7, the third ciphertext is decrypted by the private key at the door lock end, and the door lock that decryption is obtained is believed
Breath is compared with the door lock information at door lock end, if door lock information unanimously if door lock end opening door lock.
3. a kind of unlocked by mobile telephone method based on secure cryptographic algorithm according to claim 1 or 2, it is characterised in that: institute
The rivest, shamir, adelman stated is RSA Algorithm.
4. a kind of unlocked by mobile telephone method based on secure cryptographic algorithm according to claim 3, it is characterised in that: described
Symmetric encipherment algorithm is aes algorithm.
5. a kind of unlocked by mobile telephone method based on secure cryptographic algorithm according to claim 4, it is characterised in that: the step
The mobile phone terminal for establishing binding relationship with the door lock end in rapid two, which has permission to cloud server, sends first ciphertext, and manages
The mobile phone terminal of the user of reason person's identity can check whole CPU card information opened.
6. a kind of unlocked by mobile telephone method based on secure cryptographic algorithm according to claim 1, it is characterised in that: the step
Door lock information in rapid three includes the physical address at the random ID ID that door lock end generates and door lock end.
7. a kind of unlocked by mobile telephone method based on secure cryptographic algorithm according to claim 1, it is characterised in that: Yong Huke
The CPU card for having opened card is deleted from the mobile phone terminal;Administrator can send from the mobile phone terminal and instruct, and pass through the cloud
Server controls the door lock end and deletes corresponding informance in first safety chip.
8. a kind of unlocked by mobile telephone system based on secure cryptographic algorithm, it is characterised in that: taken including door lock end, mobile phone terminal and cloud
Business device;The door lock end, mobile phone terminal are connected with cloud server by communication network;
The door lock end includes door lock MCU and the first safety chip;The door lock MCU be used for mobile phone terminal and cloud server into
Row data send and receive, and the door lock MCU is also used to compare the door lock information of mobile phone terminal transmission;First safety chip
For interactive information to be decrypted or is encrypted;
The mobile phone terminal includes the second safety chip and cell phone application;The cell phone application is used to pass through cloud server and the door
Lock end carries out information exchange;Second safety chip is for storing door lock information and for interactive information to be decrypted
Or encryption;
The cloud server is used to transmit information when mobile phone terminal and door lock end carry out data interaction.
9. a kind of unlocked by mobile telephone system based on secure cryptographic algorithm according to claim 5, it is characterised in that: the cloud
Holding server further includes Sign-On authentication module, establishes binding relationship when progress for the first time for the mobile phone terminal and the door lock end
Sign-On authentication.
10. a kind of unlocked by mobile telephone system based on secure cryptographic algorithm according to claim 5, it is characterised in that: described
Mobile phone terminal further includes CPU card display module, for showing the CPU card having been switched in mobile phone terminal, while being also used for administrator's body
The mobile phone terminal of the user of part checks the CPU cards all opened;The mobile phone terminal further includes CPU card removing module, for deleting
The CPU card opened in mobile phone terminal is believed by the door lock that cloud server deletes the CPU card stored in the door lock end
Breath.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910172337.3A CN109889669A (en) | 2019-03-07 | 2019-03-07 | A kind of unlocked by mobile telephone method and system based on secure cryptographic algorithm |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910172337.3A CN109889669A (en) | 2019-03-07 | 2019-03-07 | A kind of unlocked by mobile telephone method and system based on secure cryptographic algorithm |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109889669A true CN109889669A (en) | 2019-06-14 |
Family
ID=66931157
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910172337.3A Pending CN109889669A (en) | 2019-03-07 | 2019-03-07 | A kind of unlocked by mobile telephone method and system based on secure cryptographic algorithm |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109889669A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111815814A (en) * | 2020-06-22 | 2020-10-23 | 北京智辉空间科技有限责任公司 | Electronic lock security system and binding authentication method thereof |
CN112102524A (en) * | 2019-06-18 | 2020-12-18 | 杭州萤石软件有限公司 | Unlocking method and unlocking system |
CN113282944A (en) * | 2021-06-29 | 2021-08-20 | 珠海优特物联科技有限公司 | Intelligent lock unlocking method and device, electronic equipment and storage medium |
CN113763599A (en) * | 2020-06-04 | 2021-12-07 | 曾惠瑜 | System and method for executing encryption, decryption and unlocking management |
CN113808303A (en) * | 2021-08-24 | 2021-12-17 | 珠海市安科电子有限公司 | Composite encryption method, door lock system and storage medium |
CN114285644A (en) * | 2021-12-24 | 2022-04-05 | 南京慧牧科技有限公司 | Electronic lead sealing control method, system and device for block chain application technology |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103793960A (en) * | 2012-10-31 | 2014-05-14 | 株式会社易保 | Method for mobile key service |
CN104966336A (en) * | 2015-05-29 | 2015-10-07 | 深圳光启智能光子技术有限公司 | Intelligent lock, intelligent lock authorization management method, and intelligent lock authorization management apparatus |
CN105049653A (en) * | 2015-05-29 | 2015-11-11 | 深圳光启智能光子技术有限公司 | Method and system for controlling unlocking authority of locks based on network |
CN105261104A (en) * | 2015-11-24 | 2016-01-20 | 重庆理工大学 | Bluetooth door lock system based on intelligent terminal, and control method of Bluetooth door lock system |
US20160036814A1 (en) * | 2014-07-30 | 2016-02-04 | Master Lock Company Llc | Wireless firmware updates |
CN106487783A (en) * | 2016-09-28 | 2017-03-08 | 深圳市速美特电子科技有限公司 | The encryption method connecting for vehicle communication and device |
-
2019
- 2019-03-07 CN CN201910172337.3A patent/CN109889669A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103793960A (en) * | 2012-10-31 | 2014-05-14 | 株式会社易保 | Method for mobile key service |
US20160036814A1 (en) * | 2014-07-30 | 2016-02-04 | Master Lock Company Llc | Wireless firmware updates |
CN104966336A (en) * | 2015-05-29 | 2015-10-07 | 深圳光启智能光子技术有限公司 | Intelligent lock, intelligent lock authorization management method, and intelligent lock authorization management apparatus |
CN105049653A (en) * | 2015-05-29 | 2015-11-11 | 深圳光启智能光子技术有限公司 | Method and system for controlling unlocking authority of locks based on network |
CN105261104A (en) * | 2015-11-24 | 2016-01-20 | 重庆理工大学 | Bluetooth door lock system based on intelligent terminal, and control method of Bluetooth door lock system |
CN106487783A (en) * | 2016-09-28 | 2017-03-08 | 深圳市速美特电子科技有限公司 | The encryption method connecting for vehicle communication and device |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112102524A (en) * | 2019-06-18 | 2020-12-18 | 杭州萤石软件有限公司 | Unlocking method and unlocking system |
CN113763599A (en) * | 2020-06-04 | 2021-12-07 | 曾惠瑜 | System and method for executing encryption, decryption and unlocking management |
CN111815814A (en) * | 2020-06-22 | 2020-10-23 | 北京智辉空间科技有限责任公司 | Electronic lock security system and binding authentication method thereof |
CN111815814B (en) * | 2020-06-22 | 2022-06-10 | 合肥智辉空间科技有限责任公司 | Electronic lock security system and binding authentication method thereof |
CN113282944A (en) * | 2021-06-29 | 2021-08-20 | 珠海优特物联科技有限公司 | Intelligent lock unlocking method and device, electronic equipment and storage medium |
CN113808303A (en) * | 2021-08-24 | 2021-12-17 | 珠海市安科电子有限公司 | Composite encryption method, door lock system and storage medium |
CN114285644A (en) * | 2021-12-24 | 2022-04-05 | 南京慧牧科技有限公司 | Electronic lead sealing control method, system and device for block chain application technology |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108270571B (en) | Internet of Things identity authorization system and its method based on block chain | |
CN109889669A (en) | A kind of unlocked by mobile telephone method and system based on secure cryptographic algorithm | |
EP1866873B1 (en) | Method, system, personal security device and computer program product for cryptographically secured biometric authentication | |
CN100533459C (en) | Data safety reading method and safety storage apparatus thereof | |
CN101212293B (en) | Identity authentication method and system | |
CN109410406A (en) | A kind of authorization method, device and system | |
CN109448197A (en) | A kind of cloud intelligent lock system and key management method based on multi-enciphering mode | |
CN101945114B (en) | Identity authentication method based on fuzzy vault and digital certificate | |
CN106161032A (en) | A kind of identity authentication method and device | |
US10044684B2 (en) | Server for authenticating smart chip and method thereof | |
KR102477000B1 (en) | Trusted Key Server | |
CN103001773A (en) | Fingerprint authentication system and fingerprint authentication method based on near field communication (NFC) | |
CN108768653A (en) | Identity authorization system based on quantum key card | |
CN102572817A (en) | Method and intelligent memory card for realizing mobile communication confidentiality | |
CN101621794A (en) | Method for realizing safe authentication of wireless application service system | |
CN109474419A (en) | A kind of living body portrait photo encryption and decryption method and encrypting and deciphering system | |
CN104662941A (en) | Supporting the use of a secret key | |
KR100939725B1 (en) | Certification method for a mobile phone | |
CN106789024A (en) | A kind of remote de-locking method, device and system | |
US20120124378A1 (en) | Method for personal identity authentication utilizing a personal cryptographic device | |
CN108768941B (en) | Method and device for remotely unlocking safety equipment | |
KR0152230B1 (en) | Apparatus and method for checking & acknowledging identity of subscriber in network | |
CN109151823A (en) | The method and system of eSIM card authentication | |
CN111917543A (en) | User access cloud platform security access authentication system and application method thereof | |
CN110738764A (en) | Security control system and method based on intelligent lock |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190614 |
|
RJ01 | Rejection of invention patent application after publication |