CN109889669A - A kind of unlocked by mobile telephone method and system based on secure cryptographic algorithm - Google Patents

A kind of unlocked by mobile telephone method and system based on secure cryptographic algorithm Download PDF

Info

Publication number
CN109889669A
CN109889669A CN201910172337.3A CN201910172337A CN109889669A CN 109889669 A CN109889669 A CN 109889669A CN 201910172337 A CN201910172337 A CN 201910172337A CN 109889669 A CN109889669 A CN 109889669A
Authority
CN
China
Prior art keywords
door lock
mobile phone
phone terminal
lock end
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910172337.3A
Other languages
Chinese (zh)
Inventor
王良课
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Hutlon Technology Co Ltd
Foshan Hutlon Intelligent Technology Co Ltd
Original Assignee
Guangdong Hutlon Technology Co Ltd
Foshan Hutlon Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Hutlon Technology Co Ltd, Foshan Hutlon Intelligent Technology Co Ltd filed Critical Guangdong Hutlon Technology Co Ltd
Priority to CN201910172337.3A priority Critical patent/CN109889669A/en
Publication of CN109889669A publication Critical patent/CN109889669A/en
Pending legal-status Critical Current

Links

Landscapes

  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The unlocked by mobile telephone method and system based on secure cryptographic algorithm that the present invention relates to a kind of, applied to intelligent door lock, the first safety chip is provided in the door lock end, the second safety chip is provided in the mobile phone, it is opened including mobile telephone registration and snaps past journey and mobile phone verifying unlocking process, the mobile telephone registration, which is opened, to be snapped past journey and include the following steps;Step 1, door lock end generate one group of public key and private key;Step 2, mobile phone terminal encrypts code key by public key to obtain the first ciphertext, and is sent to door lock end;The first ciphertext is decrypted at step 3, door lock end, is encrypted door lock information to obtain the second ciphertext and is sent to mobile phone terminal;Obtained information is stored in the second safety chip by step 4, mobile phone terminal after the second ciphertext is decrypted.Safety verification of the present invention is more reliable, and the verification information of mobile phone terminal is stored in mobile phone local, guarantees the safety in information verification process.

Description

A kind of unlocked by mobile telephone method and system based on secure cryptographic algorithm
Technical field
The present invention relates to clouds to lock encryption unlocking technique field, and in particular to a kind of unlocked by mobile telephone based on secure cryptographic algorithm Method and system.
Background technique
With the development of intelligent door lock and universal, more and more unlocking modes are currently being used.Mobile phone has been used as people Personal article on very close terms.Using unlocked by mobile telephone, people can be allowed to exempt carrying keys, and it is unknown to can be suitably used for finger print It is aobvious, can not the user that unlocks of fingerprint, and be able to satisfy old man and have a bad memory and can not remember password to unlock.It is gently leaned on by mobile phone Nearly door lock can fast implement unlocking, effectively increase unlocking speed.During existing NFC unlocking mode is unlocked, need to obtain The door lock information taken stores beyond the clouds, obtains when opening the door from cloud, and causing the safety of data transmission procedure to be difficult to obtain can The guarantee leaned on.
Summary of the invention
It is an object of the invention to aiming at the deficiencies in the prior art, provide a kind of hand based on secure cryptographic algorithm Machine method for unlocking and system.
To achieve this purpose, the present invention adopts the following technical scheme:
A kind of unlocked by mobile telephone method based on secure cryptographic algorithm, is applied to intelligent door lock, and the is provided in the door lock end One safety chip, is provided with the second safety chip in the mobile phone, including mobile telephone registration is opened and snaps past journey and mobile phone verifying was unlocked Journey, the mobile telephone registration, which is opened, to be snapped past journey and includes the following steps:
Step 1, the first built-in safety chip generates the public key and private key of one group of rivest, shamir, adelman in door lock end, The private key is stored in first safety chip and can not be read, and the public key passes to cloud by communication network and takes Business device, and the public key passes to mobile phone terminal by cloud server, the mobile phone terminal and the cloud server save institute State public key;
Step 2 generates the code key of symmetric encipherment algorithm by the second safety chip of the mobile phone terminal, and in the hand Generator terminal carries out encryption to the code key by the public key and generates the first ciphertext, which passes through the cloud server again It is sent to the door lock end;
Step 3, the door lock end are decrypted to obtain described secret using its described private key saved to first ciphertext Key, the code key and door lock information are generated the second ciphertext again by first safety chip, and second ciphertext is passed through institute It states cloud server and is sent to the mobile phone terminal;
Step 4, the mobile phone terminal decrypt second ciphertext to obtain the door lock information and are stored in second peace In full chip, completes opening for the CPU card of the mobile phone terminal and snap past journey.
Further description, mobile phone verifying unlocking process the following steps are included:
Step 5 will open the mobile phone terminal of card close to door lock end, and the door lock end detects the mobile phone terminal Radiofrequency signal, and send Select AID and instruct to the mobile phone terminal, after the response for receiving the mobile phone terminal, the door lock end One group of random number is sent to the mobile phone terminal;
Step 6, second safety chip are encrypted to obtain using the public key to random number and the door lock information Third ciphertext, and the third ciphertext is back to the door lock end by radiofrequency signal;
The third ciphertext is decrypted by the private key for step 7, the door lock end, and the door that decryption is obtained Lock information is compared with the door lock information at door lock end, if door lock information unanimously if the door lock end open door lock.
Further description, the rivest, shamir, adelman are RSA Algorithm.
Further description, the symmetric encipherment algorithm are aes algorithm.
Further description, the mobile phone terminal for establishing binding relationship with the door lock end in the step 2 have permission to cloud Server is held to send the first ciphertext, and the mobile phone terminal of the user of administrator's identity can check whole CPU card letters opened Breath.
Further description, the door lock information in the step 3 include the random ID ID and door lock that door lock end generates The physical address at end.
Further description, user can delete the CPU card for having opened card from the mobile phone terminal;Administrator can be from institute It states mobile phone terminal and sends instruction, the door lock end is controlled by the cloud server and deletes correspondence in first safety chip Information.
A kind of unlocked by mobile telephone system based on secure cryptographic algorithm, including door lock end, mobile phone terminal and cloud server;It is described Door lock end, mobile phone terminal and cloud server are connected by communication network;
The door lock end includes door lock MCU and the first safety chip;The door lock MCU is used for and mobile phone terminal and cloud service Device carries out sending and receiving for data, and the door lock MCU is also used to compare the door lock information of mobile phone transmission;The first safe core Piece is for being decrypted or encrypting to interactive information;
The mobile phone terminal includes the second safety chip and cell phone application;The cell phone application is used to pass through cloud server and institute It states door lock end and carries out information exchange;Second safety chip is used to store door lock information and for interactive information progress Decryption or encryption;
The cloud server is used to transmit information when mobile phone terminal and door lock end carry out data interaction.
Further description, the cloud server further include Sign-On authentication module, for the mobile phone terminal and described Door lock end carries out Sign-On authentication when establishing binding relationship for the first time.
Further description, the mobile phone terminal further include CPU card display module, are had been switched on for showing in mobile phone terminal CPU card, while the mobile phone terminal for being also used for the user of administrator's identity checks all CPU cards for having opened;The mobile phone terminal is also Including CPU card removing module, for deleting the CPU card opened in mobile phone terminal or deleting the door by cloud server The door lock information of the CPU card stored in lock end.
Beneficial effects of the present invention: when opening card, the asymmetric encryption of the first safety chip generation in door lock end is utilized The private key for the symmetric encipherment algorithm that the second safety chip generates in the public key and private key and mobile phone terminal of algorithm is door lock end and hand Information exchange between generator terminal provides safety assurance.Rivest, shamir, adelman and symmetric encipherment algorithm are applied, it is generally speaking, non- Symmetric encipherment algorithm safety is higher, and the code key length of symmetric encipherment algorithm is relatively short, transmission speed is fast, thus applies It is safer that rivest, shamir, adelman carries out encryption transmission to the code key of symmetric encipherment algorithm, and transmits the secret of symmetric encipherment algorithm Key fast speed, thus speed is also assured while securely transmitting ensure that.During mobile phone is verified and unlocked, use is non- Lock information carries out encrypting and decrypting, more secure and reliable to symmetric encipherment algorithm on the door.It is mentioned using the physical address and door lock end at door lock end The identity ID of mobile phone terminal is supplied as specific verification information, safety verification is more reliable.The verification information of mobile phone terminal is stored in Mobile phone is local, will not guarantee again by cloud server interaction door lock information when mobile phone terminal and door lock end carry out information exchange Safety in information verification process.
Detailed description of the invention
Present invention will be further explained below with reference to the attached drawings and examples.
Fig. 1 is that one embodiment of the present of invention opens the flow chart for snapping past journey;
Fig. 2 is the flow chart of the enabling verification process of one embodiment of the present of invention.
Specific embodiment
To further illustrate the technical scheme of the present invention below with reference to the accompanying drawings and specific embodiments.
As Figure 1-Figure 2, a kind of unlocked by mobile telephone method based on secure cryptographic algorithm is applied to intelligent door lock, the door Be provided with the first safety chip in lock end, be provided with the second safety chip in the mobile phone, including mobile telephone registration open snap past journey and Mobile phone verifies unlocking process, and the mobile telephone registration, which is opened, to be snapped past journey and include the following steps:
Step 1, the first built-in safety chip generates the public key and private key of one group of rivest, shamir, adelman in door lock end, The private key is stored in first safety chip and can not be read, and the public key passes to cloud by communication network and takes Business device, and the public key passes to mobile phone terminal by cloud server, the mobile phone terminal and the cloud server save institute State public key;
Step 2 generates the code key of symmetric encipherment algorithm by the second safety chip of the mobile phone terminal, and in the hand Generator terminal carries out encryption to the code key by the public key and generates the first ciphertext, which passes through the cloud server again It is sent to the door lock end;
Step 3, the door lock end are decrypted to obtain described secret using its described private key saved to first ciphertext Key, the code key and door lock information are generated the second ciphertext again by first safety chip, and second ciphertext is passed through institute It states cloud server and is sent to the mobile phone terminal;
Step 4, the mobile phone terminal decrypt second ciphertext to obtain the door lock information and are stored in second peace In full chip, completes opening for the CPU card of the mobile phone terminal and snap past journey.
Mobile phone verifying unlocking process the following steps are included:
Step 5 will open the mobile phone terminal of card close to door lock end, and the door lock end detects the mobile phone terminal Radiofrequency signal, and send Select AID and instruct to the mobile phone terminal, after the response for receiving the mobile phone terminal, the door lock end One group of random number is sent to the mobile phone terminal;
Step 6, second safety chip are encrypted to obtain using the public key to random number and the door lock information Third ciphertext, and the third ciphertext is back to the door lock end by radiofrequency signal;
The third ciphertext is decrypted by the private key for step 7, the door lock end, and the door that decryption is obtained Lock information is compared with the door lock information at door lock end, if door lock information unanimously if the door lock end open door lock.
Step 1 is out the process of card to step 4.When opening card, first safety chip at door lock end can generate asymmetric As soon as group public key and private key of Encryption Algorithm, when opening card, the information exchange at mobile phone and door lock end is made with this group of public key and private key For information cryptographic means.When carrying out out card, it is necessary first to which user is from mobile phone terminal Sign-On authentication APP, namely has door lock to log in pipe The talent of reason access right, which has, to carry out sending the qualification for opening card request instruction from mobile phone terminal, this is to guarantee mobile phone terminal and door lock end peace The first line of defence of full communication.Then when carrying out the information exchange between mobile phone terminal and door lock end, in mobile phone terminal and door lock end Place is encrypted and decrypted respectively, and to ensure the safety of data transmission, this is guarantee mobile phone terminal and the secure communication of door lock end the Two defence lines.Door lock end is sent door lock information by encrypted second ciphertext of symmetric encipherment algorithm code key by cloud server To mobile phone terminal, mobile phone terminal obtains door lock information after being decrypted, and door lock information is recorded in the second safety chip, after progress When continuous opening door operation and mobile phone terminal using in the second safety chip information and door lock end directly carry out information exchange, and Will not be by cloud server, this is the three lines of defence for guaranteeing mobile phone terminal and the secure communication of door lock end.Using mobile phone terminal into When the operation that row opens the door, door lock end needs to carry out the cryptogram validation twice verification process of mobile phone command verification and mobile phone, and door Encryption is decrypted in the public, private key that the communication that lock end and mobile phone terminal carry out is all made of rivest, shamir, adelman, this is to guarantee hand The four lines of defense of generator terminal and the secure communication of door lock end.
Further description, the rivest, shamir, adelman are RSA Algorithm, and the symmetric encipherment algorithm is AES Algorithm.
This programme applies rivest, shamir, adelman and symmetric encipherment algorithm, generally speaking, rivest, shamir, adelman safety Property it is higher, and the code key length of symmetric encipherment algorithm is relatively short, transmission speed is fast, thus applies rivest, shamir, adelman pair It is safer that the code key of symmetric encipherment algorithm carries out encryption transmission, and transmits the code key fast speed of symmetric encipherment algorithm, thus Speed is also assured while securely transmitting ensure that.Using AES DSE arithmetic to transmission data encryption, use simultaneously RSA asymmetry cipher system transmits the key of AES, so that it may which comprehensive the advantages of playing AES and RSA avoids their disadvantages simultaneously To realize a kind of new Data Encryption Scheme.
Further description, the mobile phone terminal for establishing binding relationship with the door lock end in the step 2 have permission to cloud Server is held to send the first ciphertext, and the mobile phone terminal of the user of administrator's identity can check whole CPU card letters opened Breath.
By taking new door lock as an example, mobile phone terminal needs to establish the binding relationship with door lock end by cloud server, even if this Necessary condition from mobile phone terminal operation door lock end, can also receive excessive abnormal request to avoid door lock end.Due to each A CPU opens the participation for snapping past Cheng Douyou cloud server, thus also can the relevant information of split card recorded, as record opens card Time, open the information such as the quantity of card in total, and the user of administrator's identity can check whole opened from mobile phone terminal CPU card information facilitates administrator and carries out more complete clear control to CPU card.
Further description, the door lock information in the step 3 include the random ID ID and door lock that door lock end generates The physical address at end.
Because there is its unique physical address at each door lock end when leaving the factory, carried out in mobile phone terminal and door lock end During communication, the physical address at door lock end can play verifying mark action well.Door lock end is supplied to mobile phone terminal Identity ID is mobile phone terminal and one of the voucher that door lock end is communicated, and also facilitates the user with administrator right to CPU card Carry out unified management.In addition, the identity ID that door lock generates can only assign unique mobile phone, if user replaces mobile phone, need Using new mobile phone, opening for CPU card snaps past journey again, with this come the safety for the information for ensuring to store in mobile phone terminal.
Further description, user can delete the CPU card for having opened card from the mobile phone terminal;Administrator can be from institute It states mobile phone terminal and sends instruction, the door lock end is controlled by the cloud server and deletes correspondence in first safety chip Information.
For the user for temporarily using CPU card, such as the relative to stay temporarily or cleaning worker etc., it needs to delete in time The access right of the CPU card of these users.User directly deletes the CPU card for having opened card from mobile phone terminal, or from pipe The mobile phone terminal of reason person sends the information that door lock end is deleted in instruction, because mobile phone terminal and the communication process at door lock end needs are corresponding secret Key just can be carried out, so the right to use of CPU card can be cancelled by deleting corresponding information from door lock end or mobile phone terminal any end Limit.
A kind of unlocked by mobile telephone system based on secure cryptographic algorithm, including door lock end, mobile phone terminal and cloud server;It is described Door lock end, mobile phone terminal and cloud server are connected by communication network;
The door lock end includes door lock MCU and the first safety chip;The door lock MCU is used for and mobile phone terminal and cloud service Device carries out sending and receiving for data, and the door lock MCU is also used to compare the door lock information of mobile phone terminal transmission;First safety Chip is for being decrypted or encrypting to interactive information;
The mobile phone terminal includes the second safety chip and cell phone application;The cell phone application is used to pass through cloud server and institute It states door lock end and carries out information exchange;Second safety chip is used to store door lock information and for interactive information progress Decryption or encryption;
The cloud server is used to transmit information when mobile phone terminal and door lock end carry out data interaction.
Further description, the cloud server further include Sign-On authentication module, for the mobile phone terminal and described Door lock end carries out Sign-On authentication when establishing binding relationship for the first time.
Further description, the mobile phone terminal further include CPU card display module, are had been switched on for showing in mobile phone terminal CPU card, while the mobile phone terminal for being also used for the user of administrator's identity checks all CPU cards for having opened.
Further description, the mobile phone terminal further include CPU card removing module, open-minded in mobile phone terminal for deleting CPU card or the door lock information of the CPU card stored in the door lock end is deleted by cloud server.
The above is only a preferred embodiment of the present invention, for those of ordinary skill in the art, according to the present invention Thought, there will be changes in the specific implementation manner and application range, and the content of the present specification should not be construed as to the present invention Limitation.

Claims (10)

1. a kind of unlocked by mobile telephone method based on secure cryptographic algorithm is applied to intelligent door lock, is provided with first in the door lock end Safety chip is provided with the second safety chip in the mobile phone, which is characterized in that opens including mobile telephone registration and snaps past journey and mobile phone is tested Unlocking process is demonstrate,proved, the mobile telephone registration, which is opened, to be snapped past journey and include the following steps:
Step 1, the first built-in safety chip generates the public key and private key of one group of rivest, shamir, adelman in door lock end, described Private key is stored in first safety chip and can not be read, and the public key passes to cloud service by communication network Device, and the public key passes to mobile phone terminal by cloud server, described in the mobile phone terminal and the cloud server save Public key;
Step 2 generates the code key of symmetric encipherment algorithm by the second safety chip of the mobile phone terminal, and in the mobile phone terminal Encryption is carried out to the code key by the public key and generates the first ciphertext, which passes through the cloud server again and send To the door lock end;
Step 3, the door lock end are decrypted to obtain the code key using its described private key saved to first ciphertext, The code key and door lock information are generated the second ciphertext again by first safety chip, and second ciphertext is passed through the cloud End server is sent to the mobile phone terminal;
Step 4, the mobile phone terminal decrypt second ciphertext to obtain the door lock information and are stored in the described second safe core In piece, completes opening for the CPU card of the mobile phone terminal and snap past journey.
2. a kind of unlocked by mobile telephone method based on secure cryptographic algorithm according to claim 1, it is characterised in that: the hand Machine verify unlocking process the following steps are included:
Step 5 will open the mobile phone terminal of card close to door lock end, and the door lock end detects the radio frequency of the mobile phone terminal Signal, and send Select AID and instruct to the mobile phone terminal, after the response for receiving the mobile phone terminal, the door lock end is sent One group of random number is to the mobile phone terminal;
Step 6, second safety chip are encrypted to obtain third using the public key to random number and the door lock information Ciphertext, and the third ciphertext is back to the door lock end by radiofrequency signal;
Step 7, the third ciphertext is decrypted by the private key at the door lock end, and the door lock that decryption is obtained is believed Breath is compared with the door lock information at door lock end, if door lock information unanimously if door lock end opening door lock.
3. a kind of unlocked by mobile telephone method based on secure cryptographic algorithm according to claim 1 or 2, it is characterised in that: institute The rivest, shamir, adelman stated is RSA Algorithm.
4. a kind of unlocked by mobile telephone method based on secure cryptographic algorithm according to claim 3, it is characterised in that: described Symmetric encipherment algorithm is aes algorithm.
5. a kind of unlocked by mobile telephone method based on secure cryptographic algorithm according to claim 4, it is characterised in that: the step The mobile phone terminal for establishing binding relationship with the door lock end in rapid two, which has permission to cloud server, sends first ciphertext, and manages The mobile phone terminal of the user of reason person's identity can check whole CPU card information opened.
6. a kind of unlocked by mobile telephone method based on secure cryptographic algorithm according to claim 1, it is characterised in that: the step Door lock information in rapid three includes the physical address at the random ID ID that door lock end generates and door lock end.
7. a kind of unlocked by mobile telephone method based on secure cryptographic algorithm according to claim 1, it is characterised in that: Yong Huke The CPU card for having opened card is deleted from the mobile phone terminal;Administrator can send from the mobile phone terminal and instruct, and pass through the cloud Server controls the door lock end and deletes corresponding informance in first safety chip.
8. a kind of unlocked by mobile telephone system based on secure cryptographic algorithm, it is characterised in that: taken including door lock end, mobile phone terminal and cloud Business device;The door lock end, mobile phone terminal are connected with cloud server by communication network;
The door lock end includes door lock MCU and the first safety chip;The door lock MCU be used for mobile phone terminal and cloud server into Row data send and receive, and the door lock MCU is also used to compare the door lock information of mobile phone terminal transmission;First safety chip For interactive information to be decrypted or is encrypted;
The mobile phone terminal includes the second safety chip and cell phone application;The cell phone application is used to pass through cloud server and the door Lock end carries out information exchange;Second safety chip is for storing door lock information and for interactive information to be decrypted Or encryption;
The cloud server is used to transmit information when mobile phone terminal and door lock end carry out data interaction.
9. a kind of unlocked by mobile telephone system based on secure cryptographic algorithm according to claim 5, it is characterised in that: the cloud Holding server further includes Sign-On authentication module, establishes binding relationship when progress for the first time for the mobile phone terminal and the door lock end Sign-On authentication.
10. a kind of unlocked by mobile telephone system based on secure cryptographic algorithm according to claim 5, it is characterised in that: described Mobile phone terminal further includes CPU card display module, for showing the CPU card having been switched in mobile phone terminal, while being also used for administrator's body The mobile phone terminal of the user of part checks the CPU cards all opened;The mobile phone terminal further includes CPU card removing module, for deleting The CPU card opened in mobile phone terminal is believed by the door lock that cloud server deletes the CPU card stored in the door lock end Breath.
CN201910172337.3A 2019-03-07 2019-03-07 A kind of unlocked by mobile telephone method and system based on secure cryptographic algorithm Pending CN109889669A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910172337.3A CN109889669A (en) 2019-03-07 2019-03-07 A kind of unlocked by mobile telephone method and system based on secure cryptographic algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910172337.3A CN109889669A (en) 2019-03-07 2019-03-07 A kind of unlocked by mobile telephone method and system based on secure cryptographic algorithm

Publications (1)

Publication Number Publication Date
CN109889669A true CN109889669A (en) 2019-06-14

Family

ID=66931157

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910172337.3A Pending CN109889669A (en) 2019-03-07 2019-03-07 A kind of unlocked by mobile telephone method and system based on secure cryptographic algorithm

Country Status (1)

Country Link
CN (1) CN109889669A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111815814A (en) * 2020-06-22 2020-10-23 北京智辉空间科技有限责任公司 Electronic lock security system and binding authentication method thereof
CN112102524A (en) * 2019-06-18 2020-12-18 杭州萤石软件有限公司 Unlocking method and unlocking system
CN113282944A (en) * 2021-06-29 2021-08-20 珠海优特物联科技有限公司 Intelligent lock unlocking method and device, electronic equipment and storage medium
CN113763599A (en) * 2020-06-04 2021-12-07 曾惠瑜 System and method for executing encryption, decryption and unlocking management
CN113808303A (en) * 2021-08-24 2021-12-17 珠海市安科电子有限公司 Composite encryption method, door lock system and storage medium
CN114285644A (en) * 2021-12-24 2022-04-05 南京慧牧科技有限公司 Electronic lead sealing control method, system and device for block chain application technology

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103793960A (en) * 2012-10-31 2014-05-14 株式会社易保 Method for mobile key service
CN104966336A (en) * 2015-05-29 2015-10-07 深圳光启智能光子技术有限公司 Intelligent lock, intelligent lock authorization management method, and intelligent lock authorization management apparatus
CN105049653A (en) * 2015-05-29 2015-11-11 深圳光启智能光子技术有限公司 Method and system for controlling unlocking authority of locks based on network
CN105261104A (en) * 2015-11-24 2016-01-20 重庆理工大学 Bluetooth door lock system based on intelligent terminal, and control method of Bluetooth door lock system
US20160036814A1 (en) * 2014-07-30 2016-02-04 Master Lock Company Llc Wireless firmware updates
CN106487783A (en) * 2016-09-28 2017-03-08 深圳市速美特电子科技有限公司 The encryption method connecting for vehicle communication and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103793960A (en) * 2012-10-31 2014-05-14 株式会社易保 Method for mobile key service
US20160036814A1 (en) * 2014-07-30 2016-02-04 Master Lock Company Llc Wireless firmware updates
CN104966336A (en) * 2015-05-29 2015-10-07 深圳光启智能光子技术有限公司 Intelligent lock, intelligent lock authorization management method, and intelligent lock authorization management apparatus
CN105049653A (en) * 2015-05-29 2015-11-11 深圳光启智能光子技术有限公司 Method and system for controlling unlocking authority of locks based on network
CN105261104A (en) * 2015-11-24 2016-01-20 重庆理工大学 Bluetooth door lock system based on intelligent terminal, and control method of Bluetooth door lock system
CN106487783A (en) * 2016-09-28 2017-03-08 深圳市速美特电子科技有限公司 The encryption method connecting for vehicle communication and device

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112102524A (en) * 2019-06-18 2020-12-18 杭州萤石软件有限公司 Unlocking method and unlocking system
CN113763599A (en) * 2020-06-04 2021-12-07 曾惠瑜 System and method for executing encryption, decryption and unlocking management
CN111815814A (en) * 2020-06-22 2020-10-23 北京智辉空间科技有限责任公司 Electronic lock security system and binding authentication method thereof
CN111815814B (en) * 2020-06-22 2022-06-10 合肥智辉空间科技有限责任公司 Electronic lock security system and binding authentication method thereof
CN113282944A (en) * 2021-06-29 2021-08-20 珠海优特物联科技有限公司 Intelligent lock unlocking method and device, electronic equipment and storage medium
CN113808303A (en) * 2021-08-24 2021-12-17 珠海市安科电子有限公司 Composite encryption method, door lock system and storage medium
CN114285644A (en) * 2021-12-24 2022-04-05 南京慧牧科技有限公司 Electronic lead sealing control method, system and device for block chain application technology

Similar Documents

Publication Publication Date Title
CN108270571B (en) Internet of Things identity authorization system and its method based on block chain
CN109889669A (en) A kind of unlocked by mobile telephone method and system based on secure cryptographic algorithm
EP1866873B1 (en) Method, system, personal security device and computer program product for cryptographically secured biometric authentication
CN100533459C (en) Data safety reading method and safety storage apparatus thereof
CN101212293B (en) Identity authentication method and system
CN109410406A (en) A kind of authorization method, device and system
CN109448197A (en) A kind of cloud intelligent lock system and key management method based on multi-enciphering mode
CN101945114B (en) Identity authentication method based on fuzzy vault and digital certificate
CN106161032A (en) A kind of identity authentication method and device
US10044684B2 (en) Server for authenticating smart chip and method thereof
KR102477000B1 (en) Trusted Key Server
CN103001773A (en) Fingerprint authentication system and fingerprint authentication method based on near field communication (NFC)
CN108768653A (en) Identity authorization system based on quantum key card
CN102572817A (en) Method and intelligent memory card for realizing mobile communication confidentiality
CN101621794A (en) Method for realizing safe authentication of wireless application service system
CN109474419A (en) A kind of living body portrait photo encryption and decryption method and encrypting and deciphering system
CN104662941A (en) Supporting the use of a secret key
KR100939725B1 (en) Certification method for a mobile phone
CN106789024A (en) A kind of remote de-locking method, device and system
US20120124378A1 (en) Method for personal identity authentication utilizing a personal cryptographic device
CN108768941B (en) Method and device for remotely unlocking safety equipment
KR0152230B1 (en) Apparatus and method for checking & acknowledging identity of subscriber in network
CN109151823A (en) The method and system of eSIM card authentication
CN111917543A (en) User access cloud platform security access authentication system and application method thereof
CN110738764A (en) Security control system and method based on intelligent lock

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190614

RJ01 Rejection of invention patent application after publication