CN112349003A - Door lock password transmission method, lock body, server and readable storage medium - Google Patents
Door lock password transmission method, lock body, server and readable storage medium Download PDFInfo
- Publication number
- CN112349003A CN112349003A CN202011289414.2A CN202011289414A CN112349003A CN 112349003 A CN112349003 A CN 112349003A CN 202011289414 A CN202011289414 A CN 202011289414A CN 112349003 A CN112349003 A CN 112349003A
- Authority
- CN
- China
- Prior art keywords
- secret key
- state
- password
- server
- door lock
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 58
- 230000005540 biological transmission Effects 0.000 title claims abstract description 31
- 238000004590 computer program Methods 0.000 claims description 24
- 238000004891 communication Methods 0.000 claims description 11
- 238000010586 diagram Methods 0.000 description 12
- 238000012795 verification Methods 0.000 description 7
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 230000006870 function Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 230000003993 interaction Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention discloses a door lock password transmission method, a lock body, a server and a readable storage medium, wherein the method comprises the following steps: when the server receives an unlocking request sent by the mobile terminal, acquiring a key receiving state of a lock body corresponding to the unlocking request; when the secret key receiving state is a first state, generating and sending an unlocking password to the mobile terminal by adopting the first secret key; when the secret key receiving state is a second state, generating and sending an unlocking password to the mobile terminal by adopting the second secret key; the lock body obtains a secret key receiving state of the lock body when receiving the password, verifies the received password by adopting the first secret key when the secret key receiving state is the first state, and verifies the received password by adopting the second secret key when the secret key receiving state is the second state. The invention improves the transmission flexibility of the door lock password.
Description
Technical Field
The invention relates to the field of smart home, in particular to a door lock password transmission method, a lock body, a server and a computer readable storage medium.
Background
For the transmission of the door lock password, in the prior art, when the lock body fails to receive the secret key transmitted by the server, the lock body cannot acquire the verification password, which may cause the unlocking service failure, and thus, the transmission flexibility of the door lock password in the prior art is low.
Disclosure of Invention
The embodiment of the invention provides a door lock password transmission method, a lock body, a server and a readable storage medium, and aims to solve the technical problem that the door lock password transmission flexibility cannot ideally meet the requirement of a user on opening a door in a short time according to a temporary password.
The invention provides a door lock password transmission method, which is applied to a server, wherein the server is in communication connection with a lock body, and the method comprises the following steps:
when an unlocking request sent by a mobile terminal is received, acquiring a key receiving state of a lock body corresponding to the unlocking request;
when the secret key receiving state is a first state, generating and sending an unlocking password to the mobile terminal by adopting the first secret key;
when the secret key receiving state is a second state, generating and sending an unlocking password to the mobile terminal by adopting the second secret key;
the lock body obtains a secret key receiving state of the lock body when receiving the password, verifies the received password by adopting the first secret key when the secret key receiving state is the first state, and verifies the received password by adopting the second secret key when the secret key receiving state is the second state.
In an embodiment, when receiving an unlocking request sent by a mobile terminal, before obtaining a key receiving state of a lock body corresponding to the unlocking request, the method further includes:
generating a second secret key after receiving an unlocking request sent by the mobile terminal;
sending the first secret key generated last time and the second secret key generated currently to the door lock;
when a message that the secret key returned by the door lock is successfully received is received, updating the secret key receiving state of the door lock to a second state;
and when the message that the key returned by the door lock is successfully received is not received, updating the key receiving state of the door lock to be the first state.
In an embodiment, after the key receiving status of the door lock is updated to the first status when the message that the key receiving returned by the door lock is successful is not received, the method further includes:
and generating a first secret key and sending the first secret key and a second secret key generated last time to the lock body.
The invention also provides a door lock password transmission method, which is applied to the lock body, the lock body is in communication connection with the server, and the method comprises the following steps:
when receiving the password information, acquiring a key receiving state of the lock body;
when the secret key receiving state is a first state, verifying the received password by adopting the first secret key;
and when the key receiving state is a second state, the received password is verified by adopting the second secret key.
In an embodiment, when the password information is received, before the step of obtaining the key receiving status of the lock body, the method further includes:
receiving a first secret key and a second secret key sent by a server;
determining whether the first secret key and the second secret key sent by the server are successfully received;
when the first secret key and the second secret key sent by the server are successfully received, updating the secret key receiving state of the door lock to be a first state;
and when the first secret key and the second secret key sent by the server are not successfully received, updating the key receiving state of the door lock to be in the second state.
In one embodiment, after the key receiving state of the door lock is updated to the first state, a message of successful key receiving is sent to the server; and after the key receiving state of the door lock is updated to the second state, sending a message of failure in receiving the key to the server.
In one embodiment, after updating the key receiving status of the door lock to the first status, the method further includes:
and storing the received first secret key and the second secret key.
In one embodiment, determining whether to successfully receive the first secret key and the second secret key sent by the server includes:
and determining whether the first secret key and the second secret key sent by the server are received in a preset period.
The present invention also provides a server, comprising: the system comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the computer program to realize the steps of the transmission method of the door lock password.
The invention also provides a lock body, which comprises: the system comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the computer program to realize the steps of the transmission method of the door lock password.
The invention also provides a readable storage medium, wherein a computer program is stored on the readable storage medium, and when being executed by a processor, the computer program realizes the steps of the transmission method of the door lock password.
According to the transmission method of the door lock password, the lock body, the server and the readable storage medium, when the server receives the unlocking request sent by the mobile terminal, the server obtains the key receiving state of the lock body corresponding to the unlocking request; when the secret key receiving state is a first state, generating and sending an unlocking password to the mobile terminal by adopting the first secret key; when the secret key receiving state is a second state, generating and sending an unlocking password to the mobile terminal by adopting the second secret key; the lock body obtains a secret key receiving state of the lock body when receiving the password, verifies the received password by adopting the first secret key when the secret key receiving state is the first state, and verifies the received password by adopting the second secret key when the secret key receiving state is the second state. The server can flexibly generate and output the unlocking password according to the receiving state of the door lock to the secret key, so that the user can unlock according to the password output by the server even if the unlocking secret key is not received, and the transmission flexibility of the door lock password is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a diagram of a hardware architecture of a server according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a hardware architecture of a lock body according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating a first embodiment of a method for transmitting a password of a door lock according to the present invention;
FIG. 4 is a flowchart illustrating a second embodiment of a method for transmitting a password of a door lock according to the present invention;
FIG. 5 is a flowchart illustrating a third embodiment of a method for transmitting a password of a door lock according to the present invention;
FIG. 6 is a flowchart illustrating a fourth embodiment of a method for transmitting a password of a door lock according to the present invention;
FIG. 7 is a flowchart illustrating a fifth embodiment of a method for transmitting a password of a door lock according to the present invention;
FIG. 8 is a flowchart illustrating a method for transmitting a password of a door lock according to a sixth embodiment of the present invention;
FIG. 9 is a flowchart illustrating a method for transmitting a password of a door lock according to a sixth embodiment of the present invention;
fig. 10 is a sequence diagram illustrating interaction among a mobile terminal, a server and a lock body according to an eighth embodiment of the method for transmitting a password of a door lock of the present invention.
Detailed Description
For a better understanding of the above technical solutions, exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
The main solution of the invention is: when the server receives an unlocking request sent by the mobile terminal, acquiring a key receiving state of a lock body corresponding to the unlocking request; when the secret key receiving state is a first state, generating and sending an unlocking password to the mobile terminal by adopting the first secret key; when the secret key receiving state is a second state, generating and sending an unlocking password to the mobile terminal by adopting the second secret key; the lock body obtains a secret key receiving state of the lock body when receiving the password, verifies the received password by adopting the first secret key when the secret key receiving state is the first state, and verifies the received password by adopting the second secret key when the secret key receiving state is the second state.
The server can flexibly generate and output the unlocking password according to the receiving state of the door lock to the secret key, so that the user can unlock according to the password output by the server even if the unlocking secret key is not received, and the transmission flexibility of the door lock password is improved.
As one implementation, the server may be as described in fig. 1.
The embodiment scheme of the invention relates to a server, which comprises: a processor 101, e.g. a CPU, a memory 102, a communication bus 103. Wherein a communication bus 103 is used for enabling the connection communication between these components.
The memory 102 may be a high-speed RAM memory or a non-volatile memory (e.g., a disk memory). As shown in fig. 1, the memory 103, which is a kind of computer storage medium, may include therein a detection program; and the processor 101 may be configured to call the detection program stored in the memory 102 and perform the following operations:
when an unlocking request sent by a mobile terminal is received, acquiring a key receiving state of a lock body corresponding to the unlocking request;
when the secret key receiving state is a first state, generating and sending an unlocking password to the mobile terminal by adopting the first secret key;
and when the key receiving state is a second state, generating and sending the unlocking password to the mobile terminal by adopting the second secret key.
In one embodiment, the processor 101 may be configured to call a detection program stored in the memory 102 and perform the following operations:
generating a second secret key after receiving an unlocking request sent by the mobile terminal;
sending the first secret key generated last time and the second secret key generated currently to the door lock;
when a message that the secret key returned by the door lock is successfully received is received, updating the secret key receiving state of the door lock to a second state;
and when the message that the key returned by the door lock is successfully received is not received, updating the key receiving state of the door lock to be the first state.
In one embodiment, the processor 101 may be configured to call a detection program stored in the memory 102 and perform the following operations:
and generating a first secret key and sending the first secret key and a second secret key generated last time to the lock body.
In the technical scheme provided by the embodiment, the server can flexibly generate and output the unlocking password according to the receiving state of the key of the door lock, so that the user can unlock according to the password output by the server even if the receiving state of the unlocking key is not received, and therefore, the transmission flexibility of the door lock password is improved.
As an implementation, the lock body may be as described in fig. 1.
The embodiment scheme of the invention relates to a lock body, which comprises: a processor 201, e.g., a CPU, a memory 202, a communication bus 203. Wherein a communication bus 103 is used for enabling the connection communication between these components.
The memory 202 may be a high-speed RAM memory or a non-volatile memory (e.g., a disk memory). As shown in fig. 1, the memory 203, which is a kind of computer storage medium, may include therein a detection program; and the processor 201 may be configured to call the detection program stored in the memory 202 and perform the following operations:
when receiving password information, acquiring a key receiving state of the lock body;
when the secret key receiving state is a first state, verifying the received password by adopting a first secret key;
and when the secret key receiving state is a second state, verifying the received password by adopting the second secret key.
In one embodiment, the processor 201 may be configured to call the detection program stored in the memory 202 and perform the following operations:
when receiving the password information, acquiring a key receiving state of the lock body;
when the secret key receiving state is a first state, verifying the received password by adopting the first secret key;
and when the key receiving state is a second state, the received password is verified by adopting the second secret key.
In one embodiment, the processor 201 may be configured to call the detection program stored in the memory 202 and perform the following operations:
receiving a first secret key and a second secret key sent by a server;
determining whether the first secret key and the second secret key sent by the server are successfully received;
when the first secret key and the second secret key sent by the server are successfully received, updating the secret key receiving state of the door lock to be a first state;
and when the first secret key and the second secret key sent by the server are not successfully received, updating the key receiving state of the door lock to be in the second state.
In one embodiment, the processor 201 may be configured to call the detection program stored in the memory 202 and perform the following operations:
and storing the received first secret key and the second secret key.
In one embodiment, the processor 201 may be configured to call the detection program stored in the memory 202 and perform the following operations:
and determining whether the first secret key and the second secret key sent by the server are received in a preset period.
In the technical scheme provided by the embodiment, the lock body can verify the password of the door lock according to the receiving state of the secret key, so that the unlocking of the user cannot be influenced even if the receiving state of the secret key is not received, and therefore, the transmission flexibility of the password of the door lock is improved.
In order to better understand the technical solution, the technical solution will be described in detail with reference to the drawings and the specific embodiments.
Referring to fig. 3, fig. 3 is a first embodiment of a door lock password transmission method according to the present invention, which includes the following steps:
in step S10, when the server receives the unlocking request sent by the mobile terminal, the server obtains a key receiving state of the lock body corresponding to the unlocking request.
In this embodiment, the terminal electronic device, which sends the unlocking request to the client, of the mobile terminal may include but is not limited to a mobile phone, a tablet, a computer, and other communication devices; the unlocking request is used for asking for a password to be unlocked from the server, specifically, the unlocking request carries a corresponding lock body, optionally, the lock body corresponding to the unlocking request can be determined by the unlocking request which is sent by the mobile terminal and carries the unique identifier of the lock body, for example: and the user initiates an unlocking request through the mobile terminal which is bound with the lock body in advance.
Optionally, the mobile terminal may be associated with the lock body, and when the mobile terminal triggers a predetermined event, the unlocking request may be automatically sent to replace the password of the door lock, for example: the preset event can be that the password of the last door lock is exceeded or a leakage event occurs, etc.
In step S20, when the key receiving status is the first status, the server generates and sends the unlocking password to the mobile terminal by using the first secret key.
In this embodiment, the first state is an unreceived state, and after the first state is determined, feedback information is generated and sent to the mobile terminal according to a corresponding first secret key.
In step S30, when the key receiving status is the second status, the server generates and sends the unlocking password to the mobile terminal by using the second secret key.
In this embodiment, the second state is a received state, and specifically, after the second state is determined, feedback information is generated to the mobile terminal according to a corresponding second secret key.
In this embodiment, further, when the lock body receives the password, the key receiving state of the lock body is obtained, when the key receiving state is the first state, the received password is verified by using the first secret key, and when the key receiving state is the second state, the received password is verified by using the second secret key.
In the technical solution provided in this embodiment, since the server can flexibly generate and output the unlocking password according to the receiving state of the key by the door lock, even if the receiving state of the unlocking key is not received, the user can unlock the door according to the password output by the server, and thus it can be seen that the flexibility of transmitting the door lock password is improved.
Referring to fig. 4, fig. 4 is a second embodiment of the method for transmitting a password of a door lock according to the present invention, and based on the first embodiment, the step S10 includes:
in step S40, the server generates a second key after receiving the unlocking request sent by the mobile terminal.
In step S50, the server sends the first secret key generated last time and the second secret key generated currently to the door lock.
In step S60, when receiving the message that the key returned by the door lock is successfully received, the server updates the key receiving status of the door lock to the second status.
In step S70, when the server does not receive the message that the key returned by the door lock is successfully received, the server updates the key receiving status of the door lock to the first status.
In this embodiment, each time an unlocking request sent by the mobile terminal is received, a second secret key is regenerated, the first secret key generated last time is obtained, and the first secret key is merged and sent to the lock body.
In the technical scheme of this embodiment, because after the secret key receipt state with the lock updates to first state, the lock will have used first secret key to verify, after the secret key receipt state with the lock updates to the second state, the lock will have used second secret key to verify, no matter the lock has received the lock password, will change the lock password, for example: the first secret key and the second secret key are sent to the lock body for the first time, the lock body verifies the second secret key as a door lock password after receiving the second secret key, and the lock body verifies the second secret key as the door lock password after receiving the second secret key. For the verification of current lock password, just not verify the lock password not received, the flexibility and the security that the lock password verified have been improved to this embodiment.
Referring to fig. 5, fig. 5 is a third embodiment of the method for transmitting a password of a door lock according to the present invention, and based on the first or second embodiment, after the step of S70, the method further includes:
in step S80, the server generates a first secret key and sends the first secret key and a second secret key generated last time to the lock body.
In this embodiment, when the server determines that the door lock receives the first secret key and the second secret key generated based on the previous secret key, the server regenerates the first secret key and obtains the second secret key of the previous time to perform a new round of key generation.
In the technical scheme of this embodiment, because after the secret key receiving state of the lock is updated to the second state, the lock can use the second secret key to verify, the server sends the secret key next time, the second secret key can be used as a parameter, and then the first secret key is generated again to obtain the latest round of issued data, at this moment, a closed loop is formed, and the lock password can be changed no matter whether the lock receives the lock password, for example: the first secret key and the second secret key are sent to the lock body for the first time, and the second secret key is used as a verification password after the lock body receives the first secret key and the second secret key; sending the regenerated first secret key and the second secret key sent last time to the lock body for the second time, and when the lock body does not receive the second secret key, using the second secret key sent last time to carry out password verification; and when the lock body receives the key, the regenerated first secret key is used for password verification. For current password authentication, not receive and verify with regard to the lock password, the flexibility and the security of lock password authentication have been improved to this embodiment.
Referring to fig. 6, fig. 6 is a fourth embodiment of the method for transmitting a password of a door lock according to the present invention, based on any one of the first to third embodiments, including:
step S100, when the lock body receives the password information, obtaining a secret key receiving state of the lock body;
step S200, when the key receiving state of the lock body is a first state, verifying the received password by adopting a first secret key;
in step S300, when the key receiving status is the second status, the lock body verifies the received password by using the second secret key.
In this embodiment, when the lock body receives the password information, it further determines its own state, for example, whether scientific research successfully uses the password information to obtain a key receiving state of the lock body, and when it is determined that the password information can be used, the lock body adopts the first secret key to verify the received password when the key receiving state is the first state; and when the key receiving state of the lock body is a second state, the received password is verified by adopting the second secret key.
In the technical scheme of this embodiment, the verification of lock password is carried out according to self state, can improve the flexibility of lock password verification.
Optionally, after the key receiving state of the door lock is updated to the second state, a message that the key receiving fails is sent to the server.
Optionally, after the key receiving state of the door lock is updated to the first state, a message that the key is successfully received is sent to the server.
In the technical scheme of this embodiment, the lock body can feed back the receipt state of self to the secret key to the server, can make the server carry out the generation of next round secret key according to the state that it set up, has formed the closed loop of lock password transmission, has improved the reusability of this embodiment.
Referring to fig. 7, fig. 7 is a fifth embodiment of the method for transmitting a password of a door lock according to the present invention, and based on any one of the first to fourth embodiments, before step S100, the method further includes:
step S400, the lock body receives a first secret key and a second secret key sent by a server;
step S500, the lock body determines whether the first secret key and the second secret key sent by the server are successfully received;
step S600, when the lock body successfully receives the first secret key and the second secret key sent by the server, updating the secret key receiving state of the door lock to a first state;
in step S700, when the lock body does not successfully receive the first secret key and the second secret key sent by the server, the lock body updates the key receiving state of the door lock to the second state.
In the technical scheme of this embodiment, the lock body can carry out state setting according to self to the receipt state of secret key, can make the server carry out the generation of next round of secret key according to its state of setting, has formed the closed loop of lock password transmission, has improved the reusability of this embodiment.
Referring to fig. 8, fig. 8 is a sixth embodiment of the method for transmitting a password of a door lock according to the present invention, and based on any one of the first to fifth embodiments, after step S600, the method further includes:
in step S800, the lock body stores the received first secret key and the second secret key.
In the technical scheme of this embodiment, the lock body can keep the secret key that the server sent in order to realize the technical scheme of this embodiment, has formed the closed loop of lock password transmission, has improved the reusability of this embodiment.
Referring to fig. 9, fig. 9 is a seventh embodiment of the method for transmitting a password of a door lock according to the present invention, and based on any one of the first to sixth embodiments, the step S100 further includes:
in step S101, the lock body determines whether the first secret key and the second secret key sent by the server are received within a preset period.
In the technical scheme of this embodiment, the lock body can determine whether it obtains the key that the server should send at the preset time according to the preset cycle to this comes to carry out equipment to the state that self received the key, and then can make the server carry out the generation of next round of key according to the state that it set up, has formed the closed loop of lock password transmission, has improved the reusability of this embodiment.
Referring to fig. 10, fig. 10 is a sequence diagram illustrating interaction among a mobile terminal, a server and a lock body according to an eighth embodiment of the present invention.
In an eighth embodiment, a mobile terminal sends an unlocking request to a server, the server determines a lock body according to the unlocking request, the server sends a secret key to the determined key, the lock body determines a secret key receiving state according to the receiving state of the secret key, the lock body sends a first state to the server, the server determines an unlocking password according to the first state, and the server sends the unlocking password to the mobile terminal; the lock body sends the second state to the server, the server determines the unlocking password according to the second state, and the server sends the unlocking password to the mobile terminal. The server can flexibly generate and output the unlocking password according to the receiving state of the door lock to the secret key, so that the user can unlock according to the password output by the server even if the unlocking secret key is not received, and the transmission flexibility of the door lock password is improved.
To achieve the above object, the present invention provides a server, comprising: the system comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the computer program to realize the steps of the transmission method of the door lock password.
To achieve the above object, the present invention provides a lock body including: the system comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the computer program to realize the steps of the transmission method of the door lock password.
To achieve the above object, the present invention provides a computer-readable storage medium having a computer program stored thereon, where the computer program is executed by a processor to implement the steps of the transmission method of the door lock password as above.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program display device. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program display device embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program display devices according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including an instruction lock which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It should be noted that in the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several locks, several of these locks can be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.
Claims (11)
1. A door lock password transmission method is applied to a server, wherein the server is in communication connection with a lock body, and the method comprises the following steps:
when an unlocking request sent by a mobile terminal is received, acquiring a key receiving state of a lock body corresponding to the unlocking request;
when the secret key receiving state is a first state, generating and sending an unlocking password to the mobile terminal by adopting a first secret key;
when the secret key receiving state is a second state, generating and sending an unlocking password to the mobile terminal by adopting a second secret key;
the lock body acquires a secret key receiving state of the lock body when receiving a password, verifies the received password by using the first secret key when the secret key receiving state is the first state, and verifies the received password by using the second secret key when the secret key receiving state is the second state.
2. The method according to claim 1, wherein before obtaining the key receiving state of the lock body corresponding to the unlocking request when receiving the unlocking request sent by the mobile terminal, the method further comprises:
after receiving an unlocking request sent by the mobile terminal, generating the second secret key;
sending the first secret key generated last time and the second secret key generated currently to the door lock;
when a message that the secret key returned by the door lock is successfully received is received, updating the secret key receiving state of the door lock to the second state;
and when the message that the key returned by the door lock is successfully received is not received, updating the key receiving state of the door lock to the first state.
3. The method of claim 2, wherein after updating the key receiving status of the door lock to the first status when the message that the key reception returned by the door lock is not successful is not received, the method further comprises:
and generating the first secret key and sending the first secret key and the second secret key generated last time to the lock body.
4. A door lock password transmission method is applied to a lock body, the lock body is in communication connection with a server, and the method comprises the following steps:
when receiving password information, acquiring a key receiving state of the lock body;
when the secret key receiving state is a first state, verifying the received password by adopting a first secret key;
and when the secret key receiving state is a second state, verifying the received password by adopting the second secret key.
5. The method of claim 4, wherein the step of obtaining the key receipt status of the lock body is preceded by the step of receiving the cryptographic information, the method further comprising:
receiving the first secret key and the second secret key sent by a server;
determining whether the first secret key and the second secret key sent by the server are successfully received;
when the first secret key and the second secret key sent by the server are successfully received, updating the key receiving state of the door lock to the first state;
and when the first secret key and the second secret key sent by the server are not successfully received, updating the key receiving state of the door lock to the second state.
6. The method according to claim 5, wherein after the key receiving status of the door lock is updated to the first status, a message that key receiving is successful is sent to the server;
and after the key receiving state of the door lock is updated to the second state, sending a message of failure in receiving the key to the server.
7. The method of claim 5, wherein after updating the key receiving status of the door lock to the first status, further comprising:
and storing the received first secret key and the second secret key.
8. The method according to any of claims 4-7, wherein said determining whether the first and second secret keys sent by the server are successfully received comprises:
and determining whether the first secret key and the second secret key sent by the server are received in a preset period.
9. A server, characterized in that the server comprises: a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the method for transmitting a door lock password according to any one of claims 1 to 3 when executing the computer program.
10. A lock body, characterized in that the lock body comprises: memory, processor and computer program stored on the memory and executable on the processor, the processor implementing the steps of the method for transmitting a door lock password according to any one of claims 4 to 8 when executing the computer program.
11. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored thereon a computer program which, when being executed by a processor, realizes the steps of the transmission method of a door lock password according to any one of claims 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011289414.2A CN112349003A (en) | 2020-11-17 | 2020-11-17 | Door lock password transmission method, lock body, server and readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011289414.2A CN112349003A (en) | 2020-11-17 | 2020-11-17 | Door lock password transmission method, lock body, server and readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112349003A true CN112349003A (en) | 2021-02-09 |
Family
ID=74364055
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011289414.2A Pending CN112349003A (en) | 2020-11-17 | 2020-11-17 | Door lock password transmission method, lock body, server and readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112349003A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114614985A (en) * | 2022-05-12 | 2022-06-10 | 施维智能计量系统服务(长沙)有限公司 | Communication key updating method, key server and readable storage medium |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103763107A (en) * | 2014-01-24 | 2014-04-30 | 刘文军 | Intelligent household appliance system secret key control method and intelligent household appliance system |
US20150207790A1 (en) * | 2012-09-12 | 2015-07-23 | Feitian Technologies Co., Ltd. | Method and system for generating and authorizing dynamic password |
CN204904392U (en) * | 2015-07-07 | 2015-12-23 | 程国庆 | Intelligent lock system is encrypted in high in clouds |
EP3174326A1 (en) * | 2015-11-26 | 2017-05-31 | ALSTOM Transport Technologies | Method for providing a wireless user station for access to a telecommunication network through a network wireless access point, associated network wireless access point and wireless user station |
WO2017128922A1 (en) * | 2016-01-29 | 2017-08-03 | 北京三快在线科技有限公司 | Network-based control method, apparatus, server and pms for use of door lock |
US20190158276A1 (en) * | 2017-11-17 | 2019-05-23 | Simmonds Precision Products, Inc. | Encryption key exchange with compensation for radio-frequency interference |
EP3503476A1 (en) * | 2017-12-21 | 2019-06-26 | Comelit Group S.p.a. | Method for controlling an electronic video door entry and/or home automation communication system and electronic system implementing the same |
CN110968844A (en) * | 2019-12-02 | 2020-04-07 | 卫盈联信息技术(深圳)有限公司 | Software authorization method in off-line state, server and readable storage medium |
CN110995427A (en) * | 2019-12-12 | 2020-04-10 | 广东电网有限责任公司电力调度控制中心 | Control system key management method and device based on asymmetric encryption |
WO2020168546A1 (en) * | 2019-02-22 | 2020-08-27 | 云图有限公司 | Secret key migration method and apparatus |
US20210058250A1 (en) * | 2017-12-27 | 2021-02-25 | Thales Dis France Sa | Method for updating a one-time secret key |
-
2020
- 2020-11-17 CN CN202011289414.2A patent/CN112349003A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150207790A1 (en) * | 2012-09-12 | 2015-07-23 | Feitian Technologies Co., Ltd. | Method and system for generating and authorizing dynamic password |
CN103763107A (en) * | 2014-01-24 | 2014-04-30 | 刘文军 | Intelligent household appliance system secret key control method and intelligent household appliance system |
CN204904392U (en) * | 2015-07-07 | 2015-12-23 | 程国庆 | Intelligent lock system is encrypted in high in clouds |
EP3174326A1 (en) * | 2015-11-26 | 2017-05-31 | ALSTOM Transport Technologies | Method for providing a wireless user station for access to a telecommunication network through a network wireless access point, associated network wireless access point and wireless user station |
WO2017128922A1 (en) * | 2016-01-29 | 2017-08-03 | 北京三快在线科技有限公司 | Network-based control method, apparatus, server and pms for use of door lock |
US20190158276A1 (en) * | 2017-11-17 | 2019-05-23 | Simmonds Precision Products, Inc. | Encryption key exchange with compensation for radio-frequency interference |
EP3503476A1 (en) * | 2017-12-21 | 2019-06-26 | Comelit Group S.p.a. | Method for controlling an electronic video door entry and/or home automation communication system and electronic system implementing the same |
US20210058250A1 (en) * | 2017-12-27 | 2021-02-25 | Thales Dis France Sa | Method for updating a one-time secret key |
WO2020168546A1 (en) * | 2019-02-22 | 2020-08-27 | 云图有限公司 | Secret key migration method and apparatus |
CN110968844A (en) * | 2019-12-02 | 2020-04-07 | 卫盈联信息技术(深圳)有限公司 | Software authorization method in off-line state, server and readable storage medium |
CN110995427A (en) * | 2019-12-12 | 2020-04-10 | 广东电网有限责任公司电力调度控制中心 | Control system key management method and device based on asymmetric encryption |
Non-Patent Citations (1)
Title |
---|
闫鸿滨;: "密钥管理技术研究综述", 南通职业大学学报, no. 01, pages 84 - 88 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114614985A (en) * | 2022-05-12 | 2022-06-10 | 施维智能计量系统服务(长沙)有限公司 | Communication key updating method, key server and readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111275857B (en) | Control method of intelligent lock and intelligent lock | |
JP4685876B2 (en) | System and method for providing multiple credential authentication protocols | |
EP2640005B1 (en) | Method for terminal configuration and management and terminal device | |
JP4856246B2 (en) | Method for performing management operation by communication terminal, terminal, and system thereof | |
US20050050363A1 (en) | Secure data management apparatus | |
JP2004007690A (en) | Method and apparatus for checking authentication of first communication component in communication network | |
CN109936552B (en) | Key authentication method, server and system | |
JP2019524016A (en) | Methods for managing the status of connected devices | |
CN106464667B (en) | Certificate management method, equipment and system | |
CN112714433B (en) | Machine-card binding method, computer storage medium and electronic device | |
CN111585970A (en) | Token verification method and device | |
CN111405016A (en) | User information acquisition method and related equipment | |
CN112349003A (en) | Door lock password transmission method, lock body, server and readable storage medium | |
CN103559430B (en) | application account management method and device based on Android system | |
CN111444496A (en) | Application control method, device, equipment and storage medium | |
CN111695098A (en) | Multi-distributed cluster access method and device | |
CN112766486A (en) | Searching method of neural network structure, terminal, server and readable storage medium | |
WO2020201051A1 (en) | Methods and apparatus for enabling end-to-end data protection | |
CN114125850B (en) | Terminal locking method, terminal unlocking method, mobile terminal and server | |
CN108419229B (en) | Access method and device | |
CN116346978B (en) | Terminal device and data processing method of terminal device | |
CN114124530B (en) | Automatic login method and device of cross-border matching system | |
CN111859406B (en) | Method, device and system for remote authentication | |
CN114189384B (en) | Service processing method, device, equipment and storage medium | |
CN113206817B (en) | Equipment connection confirmation method and block chain network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |