CN112349003A - Door lock password transmission method, lock body, server and readable storage medium - Google Patents

Door lock password transmission method, lock body, server and readable storage medium Download PDF

Info

Publication number
CN112349003A
CN112349003A CN202011289414.2A CN202011289414A CN112349003A CN 112349003 A CN112349003 A CN 112349003A CN 202011289414 A CN202011289414 A CN 202011289414A CN 112349003 A CN112349003 A CN 112349003A
Authority
CN
China
Prior art keywords
secret key
state
password
server
door lock
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011289414.2A
Other languages
Chinese (zh)
Inventor
曾德智
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen TCL New Technology Co Ltd
Original Assignee
Shenzhen TCL New Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen TCL New Technology Co Ltd filed Critical Shenzhen TCL New Technology Co Ltd
Priority to CN202011289414.2A priority Critical patent/CN112349003A/en
Publication of CN112349003A publication Critical patent/CN112349003A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a door lock password transmission method, a lock body, a server and a readable storage medium, wherein the method comprises the following steps: when the server receives an unlocking request sent by the mobile terminal, acquiring a key receiving state of a lock body corresponding to the unlocking request; when the secret key receiving state is a first state, generating and sending an unlocking password to the mobile terminal by adopting the first secret key; when the secret key receiving state is a second state, generating and sending an unlocking password to the mobile terminal by adopting the second secret key; the lock body obtains a secret key receiving state of the lock body when receiving the password, verifies the received password by adopting the first secret key when the secret key receiving state is the first state, and verifies the received password by adopting the second secret key when the secret key receiving state is the second state. The invention improves the transmission flexibility of the door lock password.

Description

Door lock password transmission method, lock body, server and readable storage medium
Technical Field
The invention relates to the field of smart home, in particular to a door lock password transmission method, a lock body, a server and a computer readable storage medium.
Background
For the transmission of the door lock password, in the prior art, when the lock body fails to receive the secret key transmitted by the server, the lock body cannot acquire the verification password, which may cause the unlocking service failure, and thus, the transmission flexibility of the door lock password in the prior art is low.
Disclosure of Invention
The embodiment of the invention provides a door lock password transmission method, a lock body, a server and a readable storage medium, and aims to solve the technical problem that the door lock password transmission flexibility cannot ideally meet the requirement of a user on opening a door in a short time according to a temporary password.
The invention provides a door lock password transmission method, which is applied to a server, wherein the server is in communication connection with a lock body, and the method comprises the following steps:
when an unlocking request sent by a mobile terminal is received, acquiring a key receiving state of a lock body corresponding to the unlocking request;
when the secret key receiving state is a first state, generating and sending an unlocking password to the mobile terminal by adopting the first secret key;
when the secret key receiving state is a second state, generating and sending an unlocking password to the mobile terminal by adopting the second secret key;
the lock body obtains a secret key receiving state of the lock body when receiving the password, verifies the received password by adopting the first secret key when the secret key receiving state is the first state, and verifies the received password by adopting the second secret key when the secret key receiving state is the second state.
In an embodiment, when receiving an unlocking request sent by a mobile terminal, before obtaining a key receiving state of a lock body corresponding to the unlocking request, the method further includes:
generating a second secret key after receiving an unlocking request sent by the mobile terminal;
sending the first secret key generated last time and the second secret key generated currently to the door lock;
when a message that the secret key returned by the door lock is successfully received is received, updating the secret key receiving state of the door lock to a second state;
and when the message that the key returned by the door lock is successfully received is not received, updating the key receiving state of the door lock to be the first state.
In an embodiment, after the key receiving status of the door lock is updated to the first status when the message that the key receiving returned by the door lock is successful is not received, the method further includes:
and generating a first secret key and sending the first secret key and a second secret key generated last time to the lock body.
The invention also provides a door lock password transmission method, which is applied to the lock body, the lock body is in communication connection with the server, and the method comprises the following steps:
when receiving the password information, acquiring a key receiving state of the lock body;
when the secret key receiving state is a first state, verifying the received password by adopting the first secret key;
and when the key receiving state is a second state, the received password is verified by adopting the second secret key.
In an embodiment, when the password information is received, before the step of obtaining the key receiving status of the lock body, the method further includes:
receiving a first secret key and a second secret key sent by a server;
determining whether the first secret key and the second secret key sent by the server are successfully received;
when the first secret key and the second secret key sent by the server are successfully received, updating the secret key receiving state of the door lock to be a first state;
and when the first secret key and the second secret key sent by the server are not successfully received, updating the key receiving state of the door lock to be in the second state.
In one embodiment, after the key receiving state of the door lock is updated to the first state, a message of successful key receiving is sent to the server; and after the key receiving state of the door lock is updated to the second state, sending a message of failure in receiving the key to the server.
In one embodiment, after updating the key receiving status of the door lock to the first status, the method further includes:
and storing the received first secret key and the second secret key.
In one embodiment, determining whether to successfully receive the first secret key and the second secret key sent by the server includes:
and determining whether the first secret key and the second secret key sent by the server are received in a preset period.
The present invention also provides a server, comprising: the system comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the computer program to realize the steps of the transmission method of the door lock password.
The invention also provides a lock body, which comprises: the system comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the computer program to realize the steps of the transmission method of the door lock password.
The invention also provides a readable storage medium, wherein a computer program is stored on the readable storage medium, and when being executed by a processor, the computer program realizes the steps of the transmission method of the door lock password.
According to the transmission method of the door lock password, the lock body, the server and the readable storage medium, when the server receives the unlocking request sent by the mobile terminal, the server obtains the key receiving state of the lock body corresponding to the unlocking request; when the secret key receiving state is a first state, generating and sending an unlocking password to the mobile terminal by adopting the first secret key; when the secret key receiving state is a second state, generating and sending an unlocking password to the mobile terminal by adopting the second secret key; the lock body obtains a secret key receiving state of the lock body when receiving the password, verifies the received password by adopting the first secret key when the secret key receiving state is the first state, and verifies the received password by adopting the second secret key when the secret key receiving state is the second state. The server can flexibly generate and output the unlocking password according to the receiving state of the door lock to the secret key, so that the user can unlock according to the password output by the server even if the unlocking secret key is not received, and the transmission flexibility of the door lock password is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a diagram of a hardware architecture of a server according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a hardware architecture of a lock body according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating a first embodiment of a method for transmitting a password of a door lock according to the present invention;
FIG. 4 is a flowchart illustrating a second embodiment of a method for transmitting a password of a door lock according to the present invention;
FIG. 5 is a flowchart illustrating a third embodiment of a method for transmitting a password of a door lock according to the present invention;
FIG. 6 is a flowchart illustrating a fourth embodiment of a method for transmitting a password of a door lock according to the present invention;
FIG. 7 is a flowchart illustrating a fifth embodiment of a method for transmitting a password of a door lock according to the present invention;
FIG. 8 is a flowchart illustrating a method for transmitting a password of a door lock according to a sixth embodiment of the present invention;
FIG. 9 is a flowchart illustrating a method for transmitting a password of a door lock according to a sixth embodiment of the present invention;
fig. 10 is a sequence diagram illustrating interaction among a mobile terminal, a server and a lock body according to an eighth embodiment of the method for transmitting a password of a door lock of the present invention.
Detailed Description
For a better understanding of the above technical solutions, exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
The main solution of the invention is: when the server receives an unlocking request sent by the mobile terminal, acquiring a key receiving state of a lock body corresponding to the unlocking request; when the secret key receiving state is a first state, generating and sending an unlocking password to the mobile terminal by adopting the first secret key; when the secret key receiving state is a second state, generating and sending an unlocking password to the mobile terminal by adopting the second secret key; the lock body obtains a secret key receiving state of the lock body when receiving the password, verifies the received password by adopting the first secret key when the secret key receiving state is the first state, and verifies the received password by adopting the second secret key when the secret key receiving state is the second state.
The server can flexibly generate and output the unlocking password according to the receiving state of the door lock to the secret key, so that the user can unlock according to the password output by the server even if the unlocking secret key is not received, and the transmission flexibility of the door lock password is improved.
As one implementation, the server may be as described in fig. 1.
The embodiment scheme of the invention relates to a server, which comprises: a processor 101, e.g. a CPU, a memory 102, a communication bus 103. Wherein a communication bus 103 is used for enabling the connection communication between these components.
The memory 102 may be a high-speed RAM memory or a non-volatile memory (e.g., a disk memory). As shown in fig. 1, the memory 103, which is a kind of computer storage medium, may include therein a detection program; and the processor 101 may be configured to call the detection program stored in the memory 102 and perform the following operations:
when an unlocking request sent by a mobile terminal is received, acquiring a key receiving state of a lock body corresponding to the unlocking request;
when the secret key receiving state is a first state, generating and sending an unlocking password to the mobile terminal by adopting the first secret key;
and when the key receiving state is a second state, generating and sending the unlocking password to the mobile terminal by adopting the second secret key.
In one embodiment, the processor 101 may be configured to call a detection program stored in the memory 102 and perform the following operations:
generating a second secret key after receiving an unlocking request sent by the mobile terminal;
sending the first secret key generated last time and the second secret key generated currently to the door lock;
when a message that the secret key returned by the door lock is successfully received is received, updating the secret key receiving state of the door lock to a second state;
and when the message that the key returned by the door lock is successfully received is not received, updating the key receiving state of the door lock to be the first state.
In one embodiment, the processor 101 may be configured to call a detection program stored in the memory 102 and perform the following operations:
and generating a first secret key and sending the first secret key and a second secret key generated last time to the lock body.
In the technical scheme provided by the embodiment, the server can flexibly generate and output the unlocking password according to the receiving state of the key of the door lock, so that the user can unlock according to the password output by the server even if the receiving state of the unlocking key is not received, and therefore, the transmission flexibility of the door lock password is improved.
As an implementation, the lock body may be as described in fig. 1.
The embodiment scheme of the invention relates to a lock body, which comprises: a processor 201, e.g., a CPU, a memory 202, a communication bus 203. Wherein a communication bus 103 is used for enabling the connection communication between these components.
The memory 202 may be a high-speed RAM memory or a non-volatile memory (e.g., a disk memory). As shown in fig. 1, the memory 203, which is a kind of computer storage medium, may include therein a detection program; and the processor 201 may be configured to call the detection program stored in the memory 202 and perform the following operations:
when receiving password information, acquiring a key receiving state of the lock body;
when the secret key receiving state is a first state, verifying the received password by adopting a first secret key;
and when the secret key receiving state is a second state, verifying the received password by adopting the second secret key.
In one embodiment, the processor 201 may be configured to call the detection program stored in the memory 202 and perform the following operations:
when receiving the password information, acquiring a key receiving state of the lock body;
when the secret key receiving state is a first state, verifying the received password by adopting the first secret key;
and when the key receiving state is a second state, the received password is verified by adopting the second secret key.
In one embodiment, the processor 201 may be configured to call the detection program stored in the memory 202 and perform the following operations:
receiving a first secret key and a second secret key sent by a server;
determining whether the first secret key and the second secret key sent by the server are successfully received;
when the first secret key and the second secret key sent by the server are successfully received, updating the secret key receiving state of the door lock to be a first state;
and when the first secret key and the second secret key sent by the server are not successfully received, updating the key receiving state of the door lock to be in the second state.
In one embodiment, the processor 201 may be configured to call the detection program stored in the memory 202 and perform the following operations:
and storing the received first secret key and the second secret key.
In one embodiment, the processor 201 may be configured to call the detection program stored in the memory 202 and perform the following operations:
and determining whether the first secret key and the second secret key sent by the server are received in a preset period.
In the technical scheme provided by the embodiment, the lock body can verify the password of the door lock according to the receiving state of the secret key, so that the unlocking of the user cannot be influenced even if the receiving state of the secret key is not received, and therefore, the transmission flexibility of the password of the door lock is improved.
In order to better understand the technical solution, the technical solution will be described in detail with reference to the drawings and the specific embodiments.
Referring to fig. 3, fig. 3 is a first embodiment of a door lock password transmission method according to the present invention, which includes the following steps:
in step S10, when the server receives the unlocking request sent by the mobile terminal, the server obtains a key receiving state of the lock body corresponding to the unlocking request.
In this embodiment, the terminal electronic device, which sends the unlocking request to the client, of the mobile terminal may include but is not limited to a mobile phone, a tablet, a computer, and other communication devices; the unlocking request is used for asking for a password to be unlocked from the server, specifically, the unlocking request carries a corresponding lock body, optionally, the lock body corresponding to the unlocking request can be determined by the unlocking request which is sent by the mobile terminal and carries the unique identifier of the lock body, for example: and the user initiates an unlocking request through the mobile terminal which is bound with the lock body in advance.
Optionally, the mobile terminal may be associated with the lock body, and when the mobile terminal triggers a predetermined event, the unlocking request may be automatically sent to replace the password of the door lock, for example: the preset event can be that the password of the last door lock is exceeded or a leakage event occurs, etc.
In step S20, when the key receiving status is the first status, the server generates and sends the unlocking password to the mobile terminal by using the first secret key.
In this embodiment, the first state is an unreceived state, and after the first state is determined, feedback information is generated and sent to the mobile terminal according to a corresponding first secret key.
In step S30, when the key receiving status is the second status, the server generates and sends the unlocking password to the mobile terminal by using the second secret key.
In this embodiment, the second state is a received state, and specifically, after the second state is determined, feedback information is generated to the mobile terminal according to a corresponding second secret key.
In this embodiment, further, when the lock body receives the password, the key receiving state of the lock body is obtained, when the key receiving state is the first state, the received password is verified by using the first secret key, and when the key receiving state is the second state, the received password is verified by using the second secret key.
In the technical solution provided in this embodiment, since the server can flexibly generate and output the unlocking password according to the receiving state of the key by the door lock, even if the receiving state of the unlocking key is not received, the user can unlock the door according to the password output by the server, and thus it can be seen that the flexibility of transmitting the door lock password is improved.
Referring to fig. 4, fig. 4 is a second embodiment of the method for transmitting a password of a door lock according to the present invention, and based on the first embodiment, the step S10 includes:
in step S40, the server generates a second key after receiving the unlocking request sent by the mobile terminal.
In step S50, the server sends the first secret key generated last time and the second secret key generated currently to the door lock.
In step S60, when receiving the message that the key returned by the door lock is successfully received, the server updates the key receiving status of the door lock to the second status.
In step S70, when the server does not receive the message that the key returned by the door lock is successfully received, the server updates the key receiving status of the door lock to the first status.
In this embodiment, each time an unlocking request sent by the mobile terminal is received, a second secret key is regenerated, the first secret key generated last time is obtained, and the first secret key is merged and sent to the lock body.
In the technical scheme of this embodiment, because after the secret key receipt state with the lock updates to first state, the lock will have used first secret key to verify, after the secret key receipt state with the lock updates to the second state, the lock will have used second secret key to verify, no matter the lock has received the lock password, will change the lock password, for example: the first secret key and the second secret key are sent to the lock body for the first time, the lock body verifies the second secret key as a door lock password after receiving the second secret key, and the lock body verifies the second secret key as the door lock password after receiving the second secret key. For the verification of current lock password, just not verify the lock password not received, the flexibility and the security that the lock password verified have been improved to this embodiment.
Referring to fig. 5, fig. 5 is a third embodiment of the method for transmitting a password of a door lock according to the present invention, and based on the first or second embodiment, after the step of S70, the method further includes:
in step S80, the server generates a first secret key and sends the first secret key and a second secret key generated last time to the lock body.
In this embodiment, when the server determines that the door lock receives the first secret key and the second secret key generated based on the previous secret key, the server regenerates the first secret key and obtains the second secret key of the previous time to perform a new round of key generation.
In the technical scheme of this embodiment, because after the secret key receiving state of the lock is updated to the second state, the lock can use the second secret key to verify, the server sends the secret key next time, the second secret key can be used as a parameter, and then the first secret key is generated again to obtain the latest round of issued data, at this moment, a closed loop is formed, and the lock password can be changed no matter whether the lock receives the lock password, for example: the first secret key and the second secret key are sent to the lock body for the first time, and the second secret key is used as a verification password after the lock body receives the first secret key and the second secret key; sending the regenerated first secret key and the second secret key sent last time to the lock body for the second time, and when the lock body does not receive the second secret key, using the second secret key sent last time to carry out password verification; and when the lock body receives the key, the regenerated first secret key is used for password verification. For current password authentication, not receive and verify with regard to the lock password, the flexibility and the security of lock password authentication have been improved to this embodiment.
Referring to fig. 6, fig. 6 is a fourth embodiment of the method for transmitting a password of a door lock according to the present invention, based on any one of the first to third embodiments, including:
step S100, when the lock body receives the password information, obtaining a secret key receiving state of the lock body;
step S200, when the key receiving state of the lock body is a first state, verifying the received password by adopting a first secret key;
in step S300, when the key receiving status is the second status, the lock body verifies the received password by using the second secret key.
In this embodiment, when the lock body receives the password information, it further determines its own state, for example, whether scientific research successfully uses the password information to obtain a key receiving state of the lock body, and when it is determined that the password information can be used, the lock body adopts the first secret key to verify the received password when the key receiving state is the first state; and when the key receiving state of the lock body is a second state, the received password is verified by adopting the second secret key.
In the technical scheme of this embodiment, the verification of lock password is carried out according to self state, can improve the flexibility of lock password verification.
Optionally, after the key receiving state of the door lock is updated to the second state, a message that the key receiving fails is sent to the server.
Optionally, after the key receiving state of the door lock is updated to the first state, a message that the key is successfully received is sent to the server.
In the technical scheme of this embodiment, the lock body can feed back the receipt state of self to the secret key to the server, can make the server carry out the generation of next round secret key according to the state that it set up, has formed the closed loop of lock password transmission, has improved the reusability of this embodiment.
Referring to fig. 7, fig. 7 is a fifth embodiment of the method for transmitting a password of a door lock according to the present invention, and based on any one of the first to fourth embodiments, before step S100, the method further includes:
step S400, the lock body receives a first secret key and a second secret key sent by a server;
step S500, the lock body determines whether the first secret key and the second secret key sent by the server are successfully received;
step S600, when the lock body successfully receives the first secret key and the second secret key sent by the server, updating the secret key receiving state of the door lock to a first state;
in step S700, when the lock body does not successfully receive the first secret key and the second secret key sent by the server, the lock body updates the key receiving state of the door lock to the second state.
In the technical scheme of this embodiment, the lock body can carry out state setting according to self to the receipt state of secret key, can make the server carry out the generation of next round of secret key according to its state of setting, has formed the closed loop of lock password transmission, has improved the reusability of this embodiment.
Referring to fig. 8, fig. 8 is a sixth embodiment of the method for transmitting a password of a door lock according to the present invention, and based on any one of the first to fifth embodiments, after step S600, the method further includes:
in step S800, the lock body stores the received first secret key and the second secret key.
In the technical scheme of this embodiment, the lock body can keep the secret key that the server sent in order to realize the technical scheme of this embodiment, has formed the closed loop of lock password transmission, has improved the reusability of this embodiment.
Referring to fig. 9, fig. 9 is a seventh embodiment of the method for transmitting a password of a door lock according to the present invention, and based on any one of the first to sixth embodiments, the step S100 further includes:
in step S101, the lock body determines whether the first secret key and the second secret key sent by the server are received within a preset period.
In the technical scheme of this embodiment, the lock body can determine whether it obtains the key that the server should send at the preset time according to the preset cycle to this comes to carry out equipment to the state that self received the key, and then can make the server carry out the generation of next round of key according to the state that it set up, has formed the closed loop of lock password transmission, has improved the reusability of this embodiment.
Referring to fig. 10, fig. 10 is a sequence diagram illustrating interaction among a mobile terminal, a server and a lock body according to an eighth embodiment of the present invention.
In an eighth embodiment, a mobile terminal sends an unlocking request to a server, the server determines a lock body according to the unlocking request, the server sends a secret key to the determined key, the lock body determines a secret key receiving state according to the receiving state of the secret key, the lock body sends a first state to the server, the server determines an unlocking password according to the first state, and the server sends the unlocking password to the mobile terminal; the lock body sends the second state to the server, the server determines the unlocking password according to the second state, and the server sends the unlocking password to the mobile terminal. The server can flexibly generate and output the unlocking password according to the receiving state of the door lock to the secret key, so that the user can unlock according to the password output by the server even if the unlocking secret key is not received, and the transmission flexibility of the door lock password is improved.
To achieve the above object, the present invention provides a server, comprising: the system comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the computer program to realize the steps of the transmission method of the door lock password.
To achieve the above object, the present invention provides a lock body including: the system comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the computer program to realize the steps of the transmission method of the door lock password.
To achieve the above object, the present invention provides a computer-readable storage medium having a computer program stored thereon, where the computer program is executed by a processor to implement the steps of the transmission method of the door lock password as above.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program display device. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program display device embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program display devices according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including an instruction lock which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It should be noted that in the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several locks, several of these locks can be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (11)

1. A door lock password transmission method is applied to a server, wherein the server is in communication connection with a lock body, and the method comprises the following steps:
when an unlocking request sent by a mobile terminal is received, acquiring a key receiving state of a lock body corresponding to the unlocking request;
when the secret key receiving state is a first state, generating and sending an unlocking password to the mobile terminal by adopting a first secret key;
when the secret key receiving state is a second state, generating and sending an unlocking password to the mobile terminal by adopting a second secret key;
the lock body acquires a secret key receiving state of the lock body when receiving a password, verifies the received password by using the first secret key when the secret key receiving state is the first state, and verifies the received password by using the second secret key when the secret key receiving state is the second state.
2. The method according to claim 1, wherein before obtaining the key receiving state of the lock body corresponding to the unlocking request when receiving the unlocking request sent by the mobile terminal, the method further comprises:
after receiving an unlocking request sent by the mobile terminal, generating the second secret key;
sending the first secret key generated last time and the second secret key generated currently to the door lock;
when a message that the secret key returned by the door lock is successfully received is received, updating the secret key receiving state of the door lock to the second state;
and when the message that the key returned by the door lock is successfully received is not received, updating the key receiving state of the door lock to the first state.
3. The method of claim 2, wherein after updating the key receiving status of the door lock to the first status when the message that the key reception returned by the door lock is not successful is not received, the method further comprises:
and generating the first secret key and sending the first secret key and the second secret key generated last time to the lock body.
4. A door lock password transmission method is applied to a lock body, the lock body is in communication connection with a server, and the method comprises the following steps:
when receiving password information, acquiring a key receiving state of the lock body;
when the secret key receiving state is a first state, verifying the received password by adopting a first secret key;
and when the secret key receiving state is a second state, verifying the received password by adopting the second secret key.
5. The method of claim 4, wherein the step of obtaining the key receipt status of the lock body is preceded by the step of receiving the cryptographic information, the method further comprising:
receiving the first secret key and the second secret key sent by a server;
determining whether the first secret key and the second secret key sent by the server are successfully received;
when the first secret key and the second secret key sent by the server are successfully received, updating the key receiving state of the door lock to the first state;
and when the first secret key and the second secret key sent by the server are not successfully received, updating the key receiving state of the door lock to the second state.
6. The method according to claim 5, wherein after the key receiving status of the door lock is updated to the first status, a message that key receiving is successful is sent to the server;
and after the key receiving state of the door lock is updated to the second state, sending a message of failure in receiving the key to the server.
7. The method of claim 5, wherein after updating the key receiving status of the door lock to the first status, further comprising:
and storing the received first secret key and the second secret key.
8. The method according to any of claims 4-7, wherein said determining whether the first and second secret keys sent by the server are successfully received comprises:
and determining whether the first secret key and the second secret key sent by the server are received in a preset period.
9. A server, characterized in that the server comprises: a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the method for transmitting a door lock password according to any one of claims 1 to 3 when executing the computer program.
10. A lock body, characterized in that the lock body comprises: memory, processor and computer program stored on the memory and executable on the processor, the processor implementing the steps of the method for transmitting a door lock password according to any one of claims 4 to 8 when executing the computer program.
11. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored thereon a computer program which, when being executed by a processor, realizes the steps of the transmission method of a door lock password according to any one of claims 1 to 8.
CN202011289414.2A 2020-11-17 2020-11-17 Door lock password transmission method, lock body, server and readable storage medium Pending CN112349003A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011289414.2A CN112349003A (en) 2020-11-17 2020-11-17 Door lock password transmission method, lock body, server and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011289414.2A CN112349003A (en) 2020-11-17 2020-11-17 Door lock password transmission method, lock body, server and readable storage medium

Publications (1)

Publication Number Publication Date
CN112349003A true CN112349003A (en) 2021-02-09

Family

ID=74364055

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011289414.2A Pending CN112349003A (en) 2020-11-17 2020-11-17 Door lock password transmission method, lock body, server and readable storage medium

Country Status (1)

Country Link
CN (1) CN112349003A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114614985A (en) * 2022-05-12 2022-06-10 施维智能计量系统服务(长沙)有限公司 Communication key updating method, key server and readable storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103763107A (en) * 2014-01-24 2014-04-30 刘文军 Intelligent household appliance system secret key control method and intelligent household appliance system
US20150207790A1 (en) * 2012-09-12 2015-07-23 Feitian Technologies Co., Ltd. Method and system for generating and authorizing dynamic password
CN204904392U (en) * 2015-07-07 2015-12-23 程国庆 Intelligent lock system is encrypted in high in clouds
EP3174326A1 (en) * 2015-11-26 2017-05-31 ALSTOM Transport Technologies Method for providing a wireless user station for access to a telecommunication network through a network wireless access point, associated network wireless access point and wireless user station
WO2017128922A1 (en) * 2016-01-29 2017-08-03 北京三快在线科技有限公司 Network-based control method, apparatus, server and pms for use of door lock
US20190158276A1 (en) * 2017-11-17 2019-05-23 Simmonds Precision Products, Inc. Encryption key exchange with compensation for radio-frequency interference
EP3503476A1 (en) * 2017-12-21 2019-06-26 Comelit Group S.p.a. Method for controlling an electronic video door entry and/or home automation communication system and electronic system implementing the same
CN110968844A (en) * 2019-12-02 2020-04-07 卫盈联信息技术(深圳)有限公司 Software authorization method in off-line state, server and readable storage medium
CN110995427A (en) * 2019-12-12 2020-04-10 广东电网有限责任公司电力调度控制中心 Control system key management method and device based on asymmetric encryption
WO2020168546A1 (en) * 2019-02-22 2020-08-27 云图有限公司 Secret key migration method and apparatus
US20210058250A1 (en) * 2017-12-27 2021-02-25 Thales Dis France Sa Method for updating a one-time secret key

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150207790A1 (en) * 2012-09-12 2015-07-23 Feitian Technologies Co., Ltd. Method and system for generating and authorizing dynamic password
CN103763107A (en) * 2014-01-24 2014-04-30 刘文军 Intelligent household appliance system secret key control method and intelligent household appliance system
CN204904392U (en) * 2015-07-07 2015-12-23 程国庆 Intelligent lock system is encrypted in high in clouds
EP3174326A1 (en) * 2015-11-26 2017-05-31 ALSTOM Transport Technologies Method for providing a wireless user station for access to a telecommunication network through a network wireless access point, associated network wireless access point and wireless user station
WO2017128922A1 (en) * 2016-01-29 2017-08-03 北京三快在线科技有限公司 Network-based control method, apparatus, server and pms for use of door lock
US20190158276A1 (en) * 2017-11-17 2019-05-23 Simmonds Precision Products, Inc. Encryption key exchange with compensation for radio-frequency interference
EP3503476A1 (en) * 2017-12-21 2019-06-26 Comelit Group S.p.a. Method for controlling an electronic video door entry and/or home automation communication system and electronic system implementing the same
US20210058250A1 (en) * 2017-12-27 2021-02-25 Thales Dis France Sa Method for updating a one-time secret key
WO2020168546A1 (en) * 2019-02-22 2020-08-27 云图有限公司 Secret key migration method and apparatus
CN110968844A (en) * 2019-12-02 2020-04-07 卫盈联信息技术(深圳)有限公司 Software authorization method in off-line state, server and readable storage medium
CN110995427A (en) * 2019-12-12 2020-04-10 广东电网有限责任公司电力调度控制中心 Control system key management method and device based on asymmetric encryption

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
闫鸿滨;: "密钥管理技术研究综述", 南通职业大学学报, no. 01, pages 84 - 88 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114614985A (en) * 2022-05-12 2022-06-10 施维智能计量系统服务(长沙)有限公司 Communication key updating method, key server and readable storage medium

Similar Documents

Publication Publication Date Title
CN111275857B (en) Control method of intelligent lock and intelligent lock
JP4685876B2 (en) System and method for providing multiple credential authentication protocols
EP2640005B1 (en) Method for terminal configuration and management and terminal device
JP4856246B2 (en) Method for performing management operation by communication terminal, terminal, and system thereof
US20050050363A1 (en) Secure data management apparatus
JP2004007690A (en) Method and apparatus for checking authentication of first communication component in communication network
CN109936552B (en) Key authentication method, server and system
JP2019524016A (en) Methods for managing the status of connected devices
CN106464667B (en) Certificate management method, equipment and system
CN112714433B (en) Machine-card binding method, computer storage medium and electronic device
CN111585970A (en) Token verification method and device
CN111405016A (en) User information acquisition method and related equipment
CN112349003A (en) Door lock password transmission method, lock body, server and readable storage medium
CN103559430B (en) application account management method and device based on Android system
CN111444496A (en) Application control method, device, equipment and storage medium
CN111695098A (en) Multi-distributed cluster access method and device
CN112766486A (en) Searching method of neural network structure, terminal, server and readable storage medium
WO2020201051A1 (en) Methods and apparatus for enabling end-to-end data protection
CN114125850B (en) Terminal locking method, terminal unlocking method, mobile terminal and server
CN108419229B (en) Access method and device
CN116346978B (en) Terminal device and data processing method of terminal device
CN114124530B (en) Automatic login method and device of cross-border matching system
CN111859406B (en) Method, device and system for remote authentication
CN114189384B (en) Service processing method, device, equipment and storage medium
CN113206817B (en) Equipment connection confirmation method and block chain network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination