CN116863565A - Intelligent door lock control method and device based on secret key - Google Patents

Intelligent door lock control method and device based on secret key Download PDF

Info

Publication number
CN116863565A
CN116863565A CN202310587991.7A CN202310587991A CN116863565A CN 116863565 A CN116863565 A CN 116863565A CN 202310587991 A CN202310587991 A CN 202310587991A CN 116863565 A CN116863565 A CN 116863565A
Authority
CN
China
Prior art keywords
sidestream
time
control terminal
resources
res
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310587991.7A
Other languages
Chinese (zh)
Inventor
王能
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanxi Fenghong Industrial Co ltd
Original Assignee
Shanxi Fenghong Industrial Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanxi Fenghong Industrial Co ltd filed Critical Shanxi Fenghong Industrial Co ltd
Priority to CN202310587991.7A priority Critical patent/CN116863565A/en
Publication of CN116863565A publication Critical patent/CN116863565A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0446Resources in time domain, e.g. slots or frames
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0453Resources in frequency domain, e.g. a carrier in FDMA
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/40Resource management for direct mode communication, e.g. D2D or sidelink
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00412Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides an intelligent door lock control method and device based on a secret key, which are used for ensuring the communication safety between a terminal and an intelligent door lock. In the method, when the intelligent door lock needs to be instructed to execute a first operation, such as one-key unlocking, one-key locking and the like, the control terminal can generate corresponding lateral control information of the plaintext, and the lateral control information of the plaintext is encrypted by using the lateral resource set, so that the encrypted lateral control information is encrypted. Therefore, the control terminal can send encrypted sidestream control information to the intelligent door lock so as to ensure the communication safety between the control terminal and the intelligent door lock.

Description

Intelligent door lock control method and device based on secret key
Technical Field
The application relates to the technical field of communication, in particular to an intelligent door lock control method and device based on a secret key.
Background
The third generation partnership project (3rd Generation Partnership Project,3GPP) defines that end-to-end communication can be directly through a sidelink, i.e., PC5 connection, which enables large-scale applications of the internet of things (Internet of Things, ioT). For example, a PC5 connection can be established between a terminal (such as a mobile phone) and an internet of things device (such as an intelligent door lock) to directly perform communication, so as to realize functions of one-key unlocking, one-key locking and the like.
However, in this scenario, how to secure the communication is a characteristic problem of the current study.
Disclosure of Invention
The embodiment of the application provides an intelligent door lock control method and device based on a secret key, which are used for ensuring the communication safety between a terminal and an intelligent door lock.
In order to achieve the above purpose, the application adopts the following technical scheme:
in a first aspect, a key-based intelligent door lock control method is provided, and is applied to a control terminal, and the method includes: responding to the operation of a first user, and generating lateral control information of a plaintext by a control terminal, wherein the lateral control information is used for indicating that the first user needs an intelligent door lock to execute the first operation; the control terminal encrypts the lateral control information of the plaintext by using a lateral resource set to obtain encrypted lateral control information, wherein the lateral resource set comprises lateral resources required by air interface transmission between the control terminal and the intelligent door lock; and the control terminal sends encrypted sidestream control information to the intelligent door lock through the sidestream resources in the sidestream resource set.
Based on the method of the first aspect, it can be known that when the intelligent door lock needs to be instructed to perform a first operation, such as one-key unlocking, one-key locking, and the like, the control terminal can generate corresponding lateral control information of the plaintext, and encrypt the lateral control information of the plaintext by using the lateral resource set, so that the encrypted lateral control information is encrypted. Therefore, the control terminal can send encrypted sidestream control information to the intelligent door lock so as to ensure the communication safety between the control terminal and the intelligent door lock.
In one possible design, the control terminal encrypts the sidestream control information of the plaintext using the sidestream resource set to obtain encrypted sidestream control information, including: the control terminal takes the time-frequency position of the sidestream resources in the sidestream resource set as an input parameter to generate a sidestream key; and the control terminal encrypts the lateral control information of the plaintext by using the lateral key to obtain the encrypted lateral control information. It can be understood that the time-frequency position of the sidestream resource has uniqueness, that is, the time-frequency positions of the sidestream resources used by any two communications may be different, so that the security uniqueness can be ensured by using the time-frequency position of the sidestream resource to generate the sidestream key for sidestream encryption, that is, the sidestream key used by any two communications may be different, so as to further ensure the communication security between the control terminal and the intelligent door lock.
Optionally, the control terminal uses a time-frequency position of a sidestream resource in the sidestream resource set as an input parameter, and generates a sidestream key, including: the control terminal takes the time-frequency position of reserved side line resources in the side line resource set as an input parameter to generate a side line master key, and takes the time-frequency position of unreserved side line resources in the side line resource set as an input parameter to generate a side auxiliary master key; the reserved side line resources are reserved side line resources for retransmitting the side line control information, the number of reserved side line resources is larger than that of unreserved side line resources, and the side line keys comprise side line master keys and side line auxiliary keys. It will be appreciated that since the number of reserved side row resources is greater than the number of unreserved side row resources, for example, 1-3 REs are reserved as reserved side row resources and 2-4 REs are unreserved side row resources in one communication cycle. That is, the security of the sidestream master key generated by using the reserved sidestream resources with more numbers is better, so that the security of the privacy information in the sidestream control information of the plaintext can be better ensured, and the theft is avoided. On the contrary, when the side line auxiliary key is generated by using the unreserved side line resources with smaller number, the generation mode is simpler, and the required processing resources are smaller.
Further, the reserved side line resource includes N resource elements RE, N is an integer greater than 1, and the control terminal uses a time-frequency position of the reserved side line resource in the side line resource set as an input parameter to generate a side line master key, including: the control terminal sequences the identifications of the N REs randomly through a first random algorithm to obtain identification sequences of the N REs; the control terminal sequences the time-frequency positions of the N REs according to the sequence of the N REs indicated by the identification sequences of the N REs to obtain a time-frequency position sequence of the N REs; the control terminal adds cyclic prefix to the time-frequency position sequences of the N RE to obtain a time-frequency position sequence added with the cyclic prefix; the control terminal hashes the time-frequency position sequence added with the cyclic prefix, and determines the obtained hash value as a sidestream master key. That is, the cyclic prefix is generally used for resisting multipath effect in air interface transmission, but the original structure is not easy to be seen because the structure of the symbol can be changed by adding the cyclic prefix, so that the method can be safer theoretically. Therefore, the characteristics can be multiplexed in the security encryption to further ensure the communication security between the control terminal and the intelligent door lock.
Further, the unreserved side line resource includes M REs, M is an integer greater than 1, and the control terminal uses a time-frequency position of the unreserved side line resource in the side line resource set as an input parameter, and generates a side auxiliary master key, including: the control terminal sequences the identifications of the M REs randomly through a second random algorithm to obtain identification sequences of the M REs; the control terminal sequences the time-frequency positions of the M REs according to the sequence of the M REs indicated by the identification sequences of the M REs to obtain a time-frequency position sequence of the M REs; the control terminal adds a cyclic prefix to the time-frequency position sequences of the M REs to obtain a time-frequency position sequence added with the cyclic prefix; the control terminal hashes the time-frequency position sequence added with the cyclic prefix, and determines the obtained hash value as a sidestream master key. That is, the cyclic prefix is generally used for resisting multipath effect in air interface transmission, but the original structure is not easy to be seen because the structure of the symbol can be changed by adding the cyclic prefix, so that the method can be safer theoretically. Therefore, the characteristics can be multiplexed in the security encryption to further ensure the communication security between the control terminal and the intelligent door lock.
Optionally, the lateral control information of the plaintext includes information of the plaintext for indicating the first user and information of the plaintext for indicating the first operation, and the control terminal encrypts the lateral control information of the plaintext by using a lateral key to obtain encrypted lateral control information, including: the control terminal encrypts the information of the plaintext, which is used for indicating the first user, by using the side master key to obtain the encrypted information which is used for indicating the first user, and encrypts the information of the plaintext, which is used for indicating the first operation, by using the side auxiliary key to obtain the encrypted information which is used for indicating the first operation.
Optionally, the control terminal uses a time-frequency position of a sidestream resource in the sidestream resource set as an input parameter, and generates a sidestream key, including: the control terminal takes the time-frequency position relationship between reserved side line resources and unreserved side line resources in the side line resource set as an input parameter to generate a side line key; the unreserved side line resource is a side line resource which needs to be used for transmitting side line control information for the first time, and the reserved side line resource is a side line resource reserved for retransmitting the side line control information. It can be appreciated that the time-frequency positional relationship between reserved side row resources and unreserved side row resources is more implicit information, or more implicit information, and the use of such information to generate a key can further ensure security and reduce the probability of being cracked.
Further, the reserved side line resource includes N resource elements REs, N is an integer greater than 1, the unreserved side line resource includes M REs, M is an integer greater than 1, and the control terminal uses a time-frequency position relationship between the reserved side line resource and the unreserved side line resource in the side line resource set as an input parameter, and generates a side line key, including: the control terminal determines the time-frequency distance between the time-frequency position of each RE in the N REs and the time-frequency positions of the M REs to obtain N times M time-frequency distances; the control terminal adds cyclic prefix for N.M time-frequency distances, and N.M time-frequency distances added with the cyclic prefix are obtained; the control terminal hashes N times M time-frequency distances added with the cyclic prefix, and determines the obtained hash value as a sidestream key. That is, the cyclic prefix is generally used for resisting multipath effect in air interface transmission, but the original structure is not easy to be seen because the structure of the symbol can be changed by adding the cyclic prefix, so that the method can be safer theoretically. Therefore, the characteristics can be multiplexed in the security encryption to further ensure the communication security between the control terminal and the intelligent door lock.
In a second aspect, a key-based intelligent door lock control method is provided, and is applied to an intelligent door lock, and the method includes: the intelligent door lock receives encrypted sidestream control information from the control terminal through sidestream resources in a sidestream resource set, wherein the sidestream resource set comprises sidestream resources required by air interface transmission between the control terminal and the intelligent door lock; the intelligent door lock decrypts the encrypted sidestream control information by using the sidestream resource set to obtain plaintext sidestream control information, wherein the plaintext sidestream control information is used for indicating that a first user needs the intelligent door lock to execute a first operation; and the intelligent door lock executes a first operation according to the lateral control information of the plaintext.
In a third aspect, a key-based intelligent door lock control apparatus is provided, the apparatus comprising means for performing the method of the first aspect described above.
For example, a processing module is configured to respond to an operation of a first user, and control a terminal to generate side control information of plaintext, where the side control information is used to indicate that the first user needs an intelligent door lock to perform the first operation; the processing module is further used for controlling the terminal to encrypt the lateral control information of the plaintext by using the lateral resource set to obtain encrypted lateral control information, wherein the lateral resource set comprises lateral resources required by air interface transmission between the control terminal and the intelligent door lock; and the receiving and transmitting module is used for controlling the terminal to send encrypted sidestream control information to the intelligent door lock through sidestream resources in the sidestream resource set.
In a possible design, the processing module is further configured to control the terminal to generate a sideline key by using a time-frequency position of a sideline resource in the sideline resource set as an input parameter; and the processing module is also used for controlling the terminal to encrypt the lateral control information of the plaintext by using the lateral key to obtain the encrypted lateral control information.
Optionally, the processing module is further configured to control the terminal to generate a sideline master key by using a time-frequency position of a reserved sideline resource in the sideline resource set as an input parameter, and the processing module is further configured to control the terminal to generate a sideline auxiliary master key by using a time-frequency position of an unreserved sideline resource in the sideline resource set as an input parameter; the reserved side line resources are reserved side line resources for retransmitting the side line control information, the number of reserved side line resources is larger than that of unreserved side line resources, and the side line keys comprise side line master keys and side line auxiliary keys.
Further, the reserved side row resource includes N resource elements RE, where N is an integer greater than 1. The processing module is also used for controlling the terminal to randomly sequence the identifications of the N REs through a first random algorithm to obtain identification sequences of the N REs; the processing module is also used for controlling the terminal to sequence the time-frequency positions of the N REs according to the sequence of the N REs indicated by the identification sequences of the N REs, so as to obtain the time-frequency position sequences of the N REs; the processing module is also used for controlling the terminal to add cyclic prefixes to the time-frequency position sequences of the N REs to obtain the time-frequency position sequences added with the cyclic prefixes; the processing module is further used for controlling the terminal to hash the time-frequency position sequence added with the cyclic prefix, and determining the obtained hash value as a sidestream master key.
Further, the unreserved side row resource includes M REs, where M is an integer greater than 1. The processing module is also used for controlling the terminal to randomly sequence the identifications of the M REs through a second random algorithm to obtain identification sequences of the M REs; the processing module is also used for controlling the terminal to sequence the time-frequency positions of the M REs according to the sequence of the M REs indicated by the identification sequences of the M REs, so as to obtain the time-frequency position sequences of the M REs; the processing module is also used for controlling the terminal to add a cyclic prefix to the time-frequency position sequences of the M REs to obtain the time-frequency position sequences added with the cyclic prefix; the processing module is further used for controlling the terminal to hash the time-frequency position sequence added with the cyclic prefix, and determining the obtained hash value as a sidestream master key.
Optionally, the lateral control information of the plaintext includes information of the plaintext indicating the first user and information of the plaintext indicating the first operation. The processing module is further used for controlling the terminal to encrypt the information of the plaintext, which is used for indicating the first user, by using the side line master key to obtain the encrypted information which is used for indicating the first user, and the processing module is further used for controlling the terminal to encrypt the information of the plaintext, which is used for indicating the first operation, by using the side line auxiliary key to obtain the encrypted information which is used for indicating the first operation.
Optionally, the processing module is further configured to control the terminal to generate a sidestream key by using a time-frequency position relationship between reserved sidestream resources and unreserved sidestream resources in the sidestream resource set as an input parameter; the unreserved side line resource is a side line resource which needs to be used for transmitting side line control information for the first time, and the reserved side line resource is a side line resource reserved for retransmitting the side line control information.
Further, the reserved side row resource includes N resource elements REs, N is an integer greater than 1, the unreserved side row resource includes M REs, and M is an integer greater than 1. The processing module is further used for controlling the terminal to determine the time-frequency distance between the time-frequency position of each RE in the N REs and the time-frequency positions of the M REs, and obtaining N times M time-frequency distances; the processing module is further used for controlling the terminal to add cyclic prefixes for the N.M time-frequency distances and obtaining the N.M time-frequency distances added with the cyclic prefixes; the processing module is further used for controlling the terminal to hash the N times and M times and frequency distances added with the cyclic prefix, and determining the obtained hash value as the sidestream key.
In a fourth aspect, a key-based intelligent door lock control apparatus is provided, the apparatus comprising means for performing the method of the second aspect.
The receiving and transmitting module is used for receiving encrypted sidestream control information from the control terminal through sidestream resources in the sidestream resource set, wherein the sidestream resource set comprises sidestream resources required by air interface transmission between the control terminal and the intelligent door lock; the processing module is used for decrypting the encrypted sidestream control information by using the sidestream resource set to obtain plaintext sidestream control information, wherein the plaintext sidestream control information is used for indicating that a first user needs the intelligent door lock to execute a first operation; and the processing module is used for executing a first operation according to the lateral control information of the plaintext by the intelligent door lock.
In a fifth aspect, there is provided an electronic device comprising: a processor and a memory; the memory is for storing a computer program which, when executed by the processor, causes the electronic device to perform the method of any one of the implementations of the first or second aspects.
In one possible design, the electronic device according to the fifth aspect may further include a transceiver. The transceiver may be a transceiver circuit or an interface circuit. The transceiver may be for the electronic device of the fifth aspect to communicate with other electronic devices.
In an embodiment of the present application, the electronic device according to the fifth aspect may be the control terminal according to any one of the first aspect or the second aspect, or a chip (system) or other parts or components that may be disposed in the control terminal, or an apparatus including the control terminal.
In addition, the technical effects of the electronic device described in the fifth aspect may refer to the technical effects of the method described in any implementation manner of the first aspect or the second aspect, which are not described herein.
In a sixth aspect, there is provided a computer readable storage medium comprising: computer programs or instructions; the computer program or instructions, when run on a computer, cause the computer to perform the method of any one of the possible implementations of the first or second aspects.
In a seventh aspect, a computer program product is provided, comprising a computer program or instructions which, when run on a computer, cause the computer to perform the method of any one of the possible implementations of the first or second aspects.
Drawings
Fig. 1 is a schematic architecture diagram of an internet of things system according to an embodiment of the present application;
fig. 2 is a schematic flow chart of a key-based intelligent door lock control method according to an embodiment of the present application;
Fig. 3 is a schematic structural diagram of an intelligent door lock control device based on a secret key according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical scheme of the application will be described below with reference to the accompanying drawings.
The technical solution of the embodiment of the present application may be applied to various systems, such as a wireless network (Wi-Fi) system, a vehicle-to-arbitrary object (vehicle to everything, V2X) communication system, an inter-device (D2D) communication system, a car networking communication system, a fourth generation (4th generation,4G) mobile communication system, such as a long term evolution (long term evolution, LTE) system, a worldwide interoperability for microwave access (worldwide interoperability for microwave access, wiMAX) communication system, a fifth generation (5th generation,5G) system, such as a new radio, NR) system, and a future communication system.
The present application will present various aspects, embodiments, or features about a system that may include a plurality of devices, components, modules, etc. It is to be understood and appreciated that the various systems may include additional devices, components, modules, etc. and/or may not include all of the devices, components, modules etc. discussed in connection with the figures. Furthermore, combinations of these schemes may also be used.
In addition, in the embodiments of the present application, words such as "exemplary," "for example," and the like are used to indicate an example, instance, or illustration. Any embodiment or design described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, the term use of an example is intended to present concepts in a concrete fashion.
In the embodiment of the present application, "information", "signal", "message", "channel", and "signaling" may be used in a mixed manner, and it should be noted that the meaning of the expression is matched when the distinction is not emphasized. "of", "corresponding" and "corresponding" are sometimes used in combination, and it should be noted that the meanings to be expressed are matched when the distinction is not emphasized. Furthermore, references to "/" of embodiments of the present application may be used to indicate an "or" relationship. In addition, the embodiment of the present application refers to sending to a, or sending to a, etc., and refers to sending behavior with a as a destination address, which may be directly or indirectly sending to a. Similarly, the embodiment of the present application refers to receiving from a or from a, etc., and refers to receiving behavior with a as a source address, which may be directly or indirectly received from a.
The network architecture and the service scenario described in the embodiments of the present application are for more clearly describing the technical solution of the embodiments of the present application, and do not constitute a limitation on the technical solution provided by the embodiments of the present application, and those skilled in the art can know that, with the evolution of the network architecture and the appearance of the new service scenario, the technical solution provided by the embodiments of the present application is applicable to similar technical problems.
In order to facilitate understanding of the embodiments of the present application, an internet of things system suitable for the embodiments of the present application will be described in detail by taking the internet of things system shown in fig. 1 as an example. Fig. 1 is a schematic diagram of an architecture of an internet of things system to which the method provided by the embodiment of the present application is applicable.
Referring to fig. 1, an embodiment of the present application provides an internet of things system, where the internet of things system may include: a plurality of terminals, such as a control terminal and a smart door lock.
The terminal may be a terminal having a wireless transceiving function or a chip system provided in the terminal. The terminal device may also be referred to as a User Equipment (UE), an internet of things device, such as a smart door lock, etc., an access terminal, a subscriber unit, a subscriber station, a mobile station, a remote terminal, a mobile device, a user terminal, a wireless communication device, a user agent, or a user device. The terminal device in the embodiment of the present application may be a mobile phone (mobile phone), a tablet computer (Pad), a computer with a wireless transceiving function, a Virtual Reality (VR) terminal device, an augmented reality (augmented reality, AR) terminal device, a wireless terminal in industrial control (industrial control), a wireless terminal in unmanned driving (self driving), a wireless terminal in remote medical (remote medical), a wireless terminal in smart grid (smart grid), a wireless terminal in transportation security (transportation safety), a wireless terminal in smart city (smart city), a wireless terminal in smart home (smart home), a vehicle-mounted terminal, an RSU with a terminal function, or the like. The terminal device of the present application may also be an in-vehicle module, an in-vehicle component, an in-vehicle chip, or an in-vehicle unit that is built in a vehicle as one or more components or units, and the vehicle may implement the method provided by the present application through the in-vehicle module, the in-vehicle component, the in-vehicle chip, or the in-vehicle unit. The communication between terminals may be a communication between terminals, which may also be referred to as side-by-side communication.
The following will describe in detail the method mainly taking interaction between the control terminal and the intelligent door lock as an example.
Fig. 2 is a flow chart of a key-based intelligent door lock control method according to an embodiment of the present application. The intelligent door lock control method based on the secret key is suitable for the Internet of things system, and mainly relates to interaction between a control terminal and an intelligent door lock.
As shown in fig. 2, the flow of the method is specifically as follows:
s201, responding to the operation of a first user, and generating the lateral control information of the plaintext by the control terminal.
Wherein the operation of the first user may be an input operation. The clear side control information may be used to indicate that the first user needs the smart door lock to perform the first operation, e.g., the clear side control information includes: the information indicating the first user in the clear and the information indicating the first operation in the clear, which together indicate that the first user needs the smart door lock to perform the first operation. The information indicating the first user in the clear is mainly information related to the user, such as an identification of the user, which is more private than the information indicating the first operation in the clear, so that it is necessary to avoid theft as much as possible.
S202, the control terminal encrypts the lateral control information of the plaintext by using the lateral resource set to obtain encrypted lateral control information.
The sidestream resource set may include sidestream resources required by air interface transmission between the control terminal and the intelligent door lock. That is, after the control terminal and the intelligent door lock establish the PC5 connection, the two parties can agree on which side-row resources can be used for communication between the two parties, that is, a side-row resource set. Alternatively, the set of side-row resources may be predefined resources by the protocol.
The control terminal can use the time-frequency position of the sidestream resources in the sidestream resource set as an input parameter to generate a sidestream key. In this way, the control terminal encrypts the lateral control information of the plaintext by using the lateral key to obtain the encrypted lateral control information. It can be understood that the time-frequency position of the sidestream resource has uniqueness, that is, the time-frequency positions of the sidestream resources used by any two communications may be different, so that the security uniqueness can be ensured by using the time-frequency position of the sidestream resource to generate the sidestream key for sidestream encryption, that is, the sidestream key used by any two communications may be different, so as to further ensure the communication security between the control terminal and the intelligent door lock.
In a possible manner, the control terminal may generate the sideline master key by using a time-frequency position of the reserved sideline resource in the sideline resource set as an input parameter. The reserved sidestream resources are sidestream resources reserved for retransmitting sidestream control information. The reserved side row resources may include N REs, N being an integer greater than 1. The control terminal may randomly sort the identifiers of the N REs by using a first random algorithm, so as to obtain identifier sequences of the N REs, such as { re#1, re#2, re#3, re#4}. The first random algorithm may be a pseudo random algorithm, i.e. the calculation is random from the external point of view, but each calculation is regular. That is, for the same random calculation, the control terminal obtains a random result by using the first random algorithm when encrypting, and the random result obtained by using the first random algorithm when decrypting is consistent with the random result obtained by using the intelligent door lock.
The control terminal may sort the time-frequency positions of the N REs according to the sequence of the N REs indicated by the identification sequences of the N REs, so as to obtain a time-frequency position sequence of the N REs. For example, the time-frequency position sequences of the N REs are { re#1 (st 1, fr 1), re#2 (st 2, fr 2), re#3 (st 3, fr 3), re#4 (st 4, fr 4) }, where st represents a time-domain position, fr represents a frequency-domain position, and the description thereof will be omitted.
And the control terminal adds a cyclic prefix to the time-frequency position sequences of the N REs to obtain the time-frequency position sequences added with the cyclic prefix. For example, the control terminal may copy and add a latter part of the time-frequency position sequences of the N REs to the front as a cyclic prefix. For example, if re#3 (st 3, fr 3), re#4 (st 4, fr 4) are used as cyclic prefixes, the time-frequency position sequence to which the cyclic prefixes are added is { (st 3, fr 3), re#4 (st 4, fr 4), re#1 (st 1, fr 1), re#2 (st 2, fr 2), re#3 (st 3, fr 3), re#4 (st 4, fr 4) }. For another example, the control terminal may copy and add a previous part of the sequence of time-frequency position sequences of the N REs as a cyclic prefix. For example, if re#1 (st 1, fr 1), re#2 (st 2, fr 2) are used as cyclic prefixes, the time-frequency position sequence to which the cyclic prefixes are added is { re#1 (st 1, fr 1), re#2 (st 2, fr 2), re#3 (st 3, fr 3), re#4 (st 4, fr 4) }. For another example, the control terminal may copy and add a middle part sequence among the time-frequency position sequences of the N REs to the front as a cyclic prefix. For example, if re#2 (st 2, fr 2), re#3 (st 3, fr 3) are used as cyclic prefixes, the time-frequency position sequence to which the cyclic prefix is added is { re#2 (st 2, fr 2), re#3 (st 3, fr 3), re#1 (st 1, fr 1), re#2 (st 2, fr 2), re#3 (st 3, fr 3), re#4 (st 4, fr 4) }. In addition, the sequence order of the cyclic prefix may be inverted with respect to the order in which it is located. For example, re#1 (st 1, fr 1), re#2 (st 2, fr 2) are used as cyclic prefixes, which are sequentially inverted to { re#2 (st 2, fr 2), re#1 (st 1, fr 1) }, and the time-frequency position sequence to which the cyclic prefixes are thus added is { re#2 (st 2, fr 2), re#1 (st 1, fr 1), re#2 (st 2, fr 2), re#3 (st 3, fr 3), re#4 (st 4, fr 4) }.
The control terminal may hash the time-frequency position sequence to which the cyclic prefix is added, and determine the obtained hash value as the side row master key. That is, the cyclic prefix is generally used for resisting multipath effect in air interface transmission, but the original structure is not easy to be seen because the structure of the symbol can be changed by adding the cyclic prefix, so that the method can be safer theoretically. Therefore, the characteristics can be multiplexed in the security encryption to further ensure the communication security between the control terminal and the intelligent door lock.
Similarly, the control terminal can also use the time-frequency position of the unreserved side line resource in the side line resource set as an input parameter to generate a side auxiliary master key. The unreserved side row resources are side row resources that need to be used for first transmission of side row control information, and the number of reserved side row resources is generally greater than the number of unreserved side row resources.
For example, the reserved side row resources may include M REs, M being an integer greater than 1. The control terminal can randomly sort the identifications of the M REs through a second random algorithm to obtain identification sequences of the M REs. The second random algorithm is similar to the first random algorithm and is a pseudo-random algorithm. The control terminal can sort the time-frequency positions of the M REs according to the sequence of the M REs indicated by the identification sequences of the M REs, so as to obtain the time-frequency position sequences of the M REs. The control terminal may add a cyclic prefix to the time-frequency position sequences of the M REs, to obtain a time-frequency position sequence to which the cyclic prefix is added. The control terminal may hash the time-frequency position sequence to which the cyclic prefix is added, and determine the obtained hash value as the side row master key. That is, the cyclic prefix is generally used for resisting multipath effect in air interface transmission, but the original structure is not easy to be seen because the structure of the symbol can be changed by adding the cyclic prefix, so that the method can be safer theoretically. Therefore, the characteristics can be multiplexed in the security encryption to further ensure the communication security between the control terminal and the intelligent door lock.
Thus, the obtained bypass key may include a bypass master key and a bypass auxiliary key.
It will be appreciated that since the number of reserved side row resources is greater than the number of unreserved side row resources, for example, 1-3 REs are reserved as reserved side row resources and 2-4 REs are unreserved side row resources in one communication cycle. That is, the security of the sidestream master key generated by using the reserved sidestream resources with more numbers is better, so that the security of the privacy information in the sidestream control information of the plaintext can be better ensured, and the theft is avoided. On the contrary, when the side line auxiliary key is generated by using the unreserved side line resources with smaller number, the generation mode is simpler, and the required processing resources are smaller.
In this way, the control terminal may encrypt the information for indicating the first user in the plaintext using the side line master key to obtain the encrypted information for indicating the first user, and the control terminal may encrypt the information for indicating the first operation in the plaintext using the side line auxiliary key to obtain the encrypted information for indicating the first operation.
It can be understood that the control terminal encrypts the lateral control information of the plaintext by using the lateral key, and obtains the encrypted lateral control information. It can be understood that the time-frequency position of the sidestream resource has uniqueness, that is, the time-frequency positions of the sidestream resources used by any two communications may be different, so that the security uniqueness can be ensured by using the time-frequency position of the sidestream resource to generate the sidestream key for sidestream encryption, that is, the sidestream key used by any two communications may be different, so as to further ensure the communication security between the control terminal and the intelligent door lock.
In another possible manner, the control terminal may generate the sideline key by using a time-frequency position relationship between reserved sideline resources and unreserved sideline resources in the sideline resource set as an input parameter. For example, the reserved side row resources may include N resource elements REs, N being an integer greater than 1, the unreserved side row resources including M REs, M being an integer greater than 1. The control terminal may determine a time-frequency distance between a time-frequency position of each RE of the N REs and a time-frequency position of the M REs, to obtain n×m time-frequency distances. And the control terminal adds the cyclic prefix for the N times M time-frequency distances, and obtains the N times M time-frequency distances added with the cyclic prefix. The control terminal hashes N times M time-frequency distances added with the cyclic prefix, and determines the obtained hash value as a sidestream key. That is, the cyclic prefix is generally used for resisting multipath effect in air interface transmission, but the original structure is not easy to be seen because the structure of the symbol can be changed by adding the cyclic prefix, so that the method can be safer theoretically. Therefore, the characteristics can be multiplexed in the security encryption to further ensure the communication security between the control terminal and the intelligent door lock. Thus, the control terminal can encrypt the lateral control information of the plaintext by using the lateral key to obtain the encrypted lateral control information.
It can be appreciated that the time-frequency positional relationship between reserved side row resources and unreserved side row resources is more implicit information, or more implicit information, and the use of such information to generate a key can further ensure security and reduce the probability of being cracked.
S203, the control terminal sends encrypted sidestream control information to the intelligent door lock through sidestream resources in the sidestream resource set. The intelligent door lock receives encrypted sidestream control information from the control terminal through sidestream resources in the sidestream resource set.
It will be appreciated that the sidestream control information used to send the encryption may be reserved sidestream resources as described above.
S204, the intelligent door lock decrypts the encrypted side line control information by using the side line resource set to obtain the side line control information of the plaintext.
The intelligent door lock can determine the sidestream key by using the same mechanism as the encryption, so that the encrypted sidestream control information is decrypted by using the sidestream key to obtain the plaintext sidestream control information.
S205, the intelligent door lock executes a first operation according to the lateral control information of the plaintext.
In summary, when the intelligent door lock needs to be instructed to perform a first operation, such as one-key unlocking, one-key locking, and the like, the control terminal can generate corresponding lateral control information of the plaintext, and encrypt the lateral control information of the plaintext by using the lateral resource set, so that the encrypted lateral control information is encrypted. Therefore, the control terminal can send encrypted sidestream control information to the intelligent door lock so as to ensure the communication safety between the control terminal and the intelligent door lock.
The method provided by the embodiment of the application is described in detail above with reference to fig. 2-3. The key-based intelligent door lock control apparatus for performing the method provided by the embodiment of the present application is described in detail below with reference to fig. 4.
Fig. 4 is a schematic structural diagram of a key-based intelligent door lock control device according to an embodiment of the present application. Illustratively, as shown in fig. 4, the key-based intelligent door lock control apparatus 300 includes: a transceiver module 301 and a processing module 302. For convenience of explanation, fig. 4 shows only main components of the key-based intelligent door lock control apparatus.
In some embodiments, the key-based intelligent door lock control apparatus 300 may be applied to the internet of things system shown in fig. 1, and perform the functions of the control terminal in the method shown in fig. 2.
The processing module 302 is configured to respond to an operation of a first user, and control the terminal to generate lateral control information of plaintext, where the lateral control information is used to indicate that the first user needs the intelligent door lock to perform the first operation; the processing module 302 is further configured to encrypt the sidestream control information of the plaintext by using a sidestream resource set by using the control terminal to obtain encrypted sidestream control information, where the sidestream resource set includes sidestream resources required by air interface transmission between the control terminal and the intelligent door lock; the transceiver module 301 is configured to control the terminal to send encrypted sidestream control information to the intelligent door lock through a sidestream resource in the sidestream resource set.
In a possible design, the processing module 302 is further configured to control the terminal to generate a sideline key by using a time-frequency position of a sideline resource in the sideline resource set as an input parameter; the processing module 302 is further configured to control the terminal to encrypt the lateral control information of the plaintext using the lateral key, so as to obtain encrypted lateral control information.
Optionally, the processing module 302 is further configured to control the terminal to generate a sideline master key by using a time-frequency position of a reserved sideline resource in the sideline resource set as an input parameter, and the processing module 302 is further configured to control the terminal to generate a sideline auxiliary master key by using a time-frequency position of an unreserved sideline resource in the sideline resource set as an input parameter; the reserved side line resources are reserved side line resources for retransmitting the side line control information, the number of reserved side line resources is larger than that of unreserved side line resources, and the side line keys comprise side line master keys and side line auxiliary keys.
Further, the reserved side row resource includes N resource elements RE, where N is an integer greater than 1. The processing module 302 is further configured to control the terminal to randomly sort the identifiers of the N REs through a first random algorithm, so as to obtain an identifier sequence of the N REs; the processing module 302 is further configured to control the terminal to order the time-frequency positions of the N REs according to the sequence of the N REs indicated by the identification sequences of the N REs, so as to obtain a time-frequency position sequence of the N REs; the processing module 302 is further configured to control the terminal to add a cyclic prefix to the time-frequency location sequences of the N REs, so as to obtain a time-frequency location sequence to which the cyclic prefix is added; the processing module 302 is further configured to control the terminal to hash the time-frequency location sequence to which the cyclic prefix is added, and determine the obtained hash value as the sideline master key.
Further, the unreserved side row resource includes M REs, where M is an integer greater than 1. The processing module 302 is further configured to control the terminal to randomly sort the identifiers of the M REs through a second random algorithm, so as to obtain identifier sequences of the M REs; the processing module 302 is further configured to control the terminal to order the time-frequency positions of the M REs according to the sequence of the M REs indicated by the identification sequences of the M REs, so as to obtain a time-frequency position sequence of the M REs; the processing module 302 is further configured to control the terminal to add a cyclic prefix to the time-frequency location sequences of the M REs, so as to obtain a time-frequency location sequence to which the cyclic prefix is added; the processing module 302 is further configured to control the terminal to hash the time-frequency location sequence to which the cyclic prefix is added, and determine the obtained hash value as the sideline master key.
Optionally, the lateral control information of the plaintext includes information of the plaintext indicating the first user and information of the plaintext indicating the first operation. The processing module 302 is further configured to control the terminal to encrypt the information for indicating the first user in the plaintext using the side line master key to obtain encrypted information for indicating the first user, and the processing module 302 is further configured to control the terminal to encrypt the information for indicating the first operation in the plaintext using the side line auxiliary key to obtain encrypted information for indicating the first operation.
Optionally, the processing module 302 is further configured to control the terminal to generate a sidestream key by using a time-frequency position relationship between reserved sidestream resources and unreserved sidestream resources in the sidestream resource set as an input parameter; the unreserved side line resource is a side line resource which needs to be used for transmitting side line control information for the first time, and the reserved side line resource is a side line resource reserved for retransmitting the side line control information.
Further, the reserved side row resource includes N resource elements REs, N is an integer greater than 1, the unreserved side row resource includes M REs, and M is an integer greater than 1. The processing module 302 is further configured to control the terminal to determine a time-frequency distance between a time-frequency position of each RE of the N REs and a time-frequency position of the M REs, so as to obtain n×m time-frequency distances; the processing module 302 is further configured to control the terminal to add cyclic prefixes to the n×m time-frequency distances, so as to obtain n×m time-frequency distances to which the cyclic prefixes are added; the processing module 302 is further configured to control the terminal to hash the n×m time-frequency distances to which the cyclic prefix is added, and determine the obtained hash value as the sidelink key.
In other embodiments, the key-based intelligent door lock control apparatus 300 may be applied to the internet of things system shown in fig. 1, and perform the functions of the intelligent door lock in the method shown in fig. 2.
The transceiver module 301 is configured to receive encrypted sidestream control information from the control terminal through a sidestream resource in a sidestream resource set, where the sidestream resource set includes sidestream resources required for air interface transmission between the control terminal and the intelligent door lock; the processing module 302 is configured to decrypt the encrypted sidestream control information by using the sidestream resource set to obtain plaintext sidestream control information, where the plaintext sidestream control information is used to instruct a first user to perform a first operation by using the intelligent door lock; the processing module 302 is configured to perform a first operation according to the lateral control information of the plaintext.
Alternatively, the transceiver module 301 may include a transmitting module (not shown in fig. 4) and a receiving module (not shown in fig. 4). The sending module is configured to implement a sending function of the key-based intelligent door lock control device 300, and the receiving module is configured to implement a receiving function of the key-based intelligent door lock control device 300.
Optionally, the key-based intelligent door lock control apparatus 300 may further include a memory module (not shown in fig. 4) in which a program or instructions are stored. The processing module 302, when executing the program or instructions, enables the key-based intelligent door lock control apparatus 300 to perform the functions of the terminal of the method shown in fig. 2 of the above-described methods.
It will be appreciated that the key-based intelligent door lock control apparatus 300 may be a terminal, a chip (system) or other parts or components that may be disposed in the terminal, or an apparatus including the terminal, which is not limited in this aspect of the present application.
In addition, the technical effects of the key-based intelligent door lock control apparatus 300 may refer to the technical effects of the method shown in fig. 2, and will not be described herein.
Fig. 4 is a schematic diagram of a second structure of the key-based intelligent door lock control device according to the embodiment of the present application. The key-based intelligent door lock control device may be a terminal, or may be a chip (system) or other parts or components that may be provided in the terminal. As shown in fig. 4, the key-based intelligent door lock control apparatus 400 may include a processor 401. Optionally, the key-based intelligent door lock control apparatus 400 may further include a memory 402 and/or a transceiver 403. Wherein the processor 401 is coupled to the memory 402 and the transceiver 403, e.g. may be connected by a communication bus.
The following describes the respective constituent elements of the key-based intelligent door lock control apparatus 400 in detail with reference to fig. 4:
the processor 401 is a control center of the key-based intelligent door lock control apparatus 400, and may be one processor or a collective name of a plurality of processing elements. For example, processor 401 is one or more central processing units (central processing unit, CPU) and may also be an integrated circuit (application specific integrated circuit, ASIC) or one or more integrated circuits configured to implement embodiments of the present application, such as: one or more microprocessors (digital signal processor, DSPs), or one or more field programmable gate arrays (field programmable gate array, FPGAs).
Alternatively, the processor 401 may perform various functions of the key-based intelligent door lock control apparatus 400, such as performing the method shown in fig. 2 described above, by running or executing a software program stored in the memory 402, and calling data stored in the memory 402.
In a particular implementation, processor 401 may include one or more CPUs, such as CPU0 and CPU1 shown in FIG. 4, as an embodiment.
In a specific implementation, as an embodiment, the key-based intelligent door lock control apparatus 400 may also include a plurality of processors, such as the processor 401 and the processor 404 shown in fig. 4. Each of these processors may be a single-core processor (single-CPU) or a multi-core processor (multi-CPU). A processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (e.g., computer program instructions).
The memory 402 is configured to store a software program for executing the solution of the present application, and the processor 401 controls the execution of the software program, and the specific implementation may refer to the above method embodiment, which is not described herein again.
Alternatively, memory 402 may be, but is not limited to, read-only memory (ROM) or other type of static storage device that may store static information and instructions, random access memory (random access memory, RAM) or other type of dynamic storage device that may store information and instructions, but may also be electrically erasable programmable read-only memory (electrically erasable programmable read-only memory, EEPROM), compact disc read-only memory (compact disc read-only memory) or other optical disk storage, optical disk storage (including compact disc, laser disc, optical disc, digital versatile disc, blu-ray disc, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. The memory 402 may be integrated with the processor 401 or may exist separately and be coupled to the processor 401 through an interface circuit (not shown in fig. 4) of the key-based intelligent door lock control apparatus 400, which is not particularly limited in the embodiment of the present application.
A transceiver 403 for communication with other key-based intelligent door lock control devices. For example, the key-based intelligent door lock control apparatus 400 is a terminal, and the transceiver 403 may be used to communicate with a network device or another terminal device. As another example, the key-based intelligent door lock control apparatus 400 is a network device, and the transceiver 403 may be used to communicate with a terminal or another network device.
Alternatively, the transceiver 403 may include a receiver and a transmitter (not separately shown in fig. 4). The receiver is used for realizing the receiving function, and the transmitter is used for realizing the transmitting function.
Alternatively, the transceiver 403 may be integrated with the processor 401 or may exist separately and be coupled to the processor 401 through an interface circuit (not shown in fig. 4) of the key-based intelligent door lock control apparatus 400, which is not particularly limited in the embodiment of the present application.
It will be appreciated that the configuration of the key-based intelligent door lock control apparatus 400 shown in fig. 4 is not limiting of the key-based intelligent door lock control apparatus, and that an actual key-based intelligent door lock control apparatus may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
In addition, the technical effects of the key-based intelligent door lock control apparatus 400 may refer to the technical effects of the method described in the above method embodiments, and will not be described herein.
It should be appreciated that the processor in embodiments of the application may be a central processing unit (central processing unit, CPU), which may also be other general purpose processors, digital signal processors (digital signal processor, DSP), application specific integrated circuits (application specific integrated circuit, ASIC), off-the-shelf programmable gate arrays (field programmable gate array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
It should also be appreciated that the memory in embodiments of the present application may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The nonvolatile memory may be a read-only memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an electrically Erasable EPROM (EEPROM), or a flash memory. The volatile memory may be random access memory (random access memory, RAM) which acts as an external cache. By way of example but not limitation, many forms of random access memory (random access memory, RAM) are available, such as Static RAM (SRAM), dynamic Random Access Memory (DRAM), synchronous Dynamic Random Access Memory (SDRAM), double data rate synchronous dynamic random access memory (DDR SDRAM), enhanced Synchronous Dynamic Random Access Memory (ESDRAM), synchronous Link DRAM (SLDRAM), and direct memory bus RAM (DR RAM).
The above embodiments may be implemented in whole or in part by software, hardware (e.g., circuitry), firmware, or any other combination. When implemented in software, the above-described embodiments may be implemented in whole or in part in the form of a computer program product. The computer program product comprises one or more computer instructions or computer programs. When the computer instructions or computer program are loaded or executed on a computer, the processes or functions described in accordance with embodiments of the present application are produced in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website site, computer, server, or data center to another website site, computer, server, or data center by wired (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains one or more sets of available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium. The semiconductor medium may be a solid state disk.
It should be understood that the term "and/or" is merely an association relationship describing the associated object, and means that three relationships may exist, for example, a and/or B may mean: there are three cases, a alone, a and B together, and B alone, wherein a, B may be singular or plural. In addition, the character "/" herein generally indicates that the associated object is an "or" relationship, but may also indicate an "and/or" relationship, and may be understood by referring to the context.
In the present application, "at least one" means one or more, and "a plurality" means two or more. "at least one of" or the like means any combination of these items, including any combination of single item(s) or plural items(s). For example, at least one (one) of a, b, or c may represent: a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or plural.
It should be understood that, in various embodiments of the present application, the sequence numbers of the foregoing processes do not mean the order of execution, and the order of execution of the processes should be determined by the functions and internal logic thereof, and should not constitute any limitation on the implementation process of the embodiments of the present application.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In the several embodiments provided by the present application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a read-only memory (ROM), a random access memory (random access memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely illustrative of the present application, and the present application is not limited thereto, and any person skilled in the art will readily recognize that variations or substitutions are within the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. An intelligent door lock control method based on a secret key, which is characterized by being applied to a control terminal, comprising the following steps:
responding to the operation of a first user, generating lateral control information of a plaintext by the control terminal, wherein the lateral control information is used for indicating that the first user needs the intelligent door lock to execute the first operation;
the control terminal encrypts the sidestream control information of the plaintext by using a sidestream resource set to obtain encrypted sidestream control information, wherein the sidestream resource set comprises sidestream resources required by air interface transmission between the control terminal and the intelligent door lock;
and the control terminal sends the encrypted sidestream control information to the intelligent door lock through the sidestream resources in the sidestream resource set.
2. The method according to claim 1, wherein the control terminal encrypts the plaintext sidestream control information using a sidestream resource set to obtain encrypted sidestream control information, comprising:
the control terminal takes the time-frequency position of the sidestream resources in the sidestream resource set as an input parameter to generate a sidestream key;
and the control terminal encrypts the lateral control information of the plaintext by using the lateral key to obtain the encrypted lateral control information.
3. The method of claim 2, wherein the control terminal uses a time-frequency location of a sidelink resource in the sidelink resource set as an input parameter, and generating the sidelink key comprises:
the control terminal takes the time-frequency position of reserved side line resources in the side line resource set as an input parameter to generate a side line master key, and takes the time-frequency position of unreserved side line resources in the side line resource set as an input parameter to generate a side auxiliary master key; the unreserved sidestream resources are sidestream resources which need to be used for transmitting the sidestream control information for the first time, the reserved sidestream resources are sidestream resources reserved for retransmitting the sidestream control information, the number of reserved sidestream resources is greater than that of unreserved sidestream resources, and the sidestream keys comprise sidestream master keys and sidestream auxiliary keys.
4. The method of claim 3, wherein the reserved sideline resources include N resource elements RE, N is an integer greater than 1, and the control terminal uses a time-frequency position of the reserved sideline resources in the sideline resource set as an input parameter, and generating the sideline master key includes:
the control terminal randomly sequences the identifications of the N REs through a first random algorithm to obtain identification sequences of the N REs;
the control terminal sequences the time-frequency positions of the N REs according to the sequence of the N REs indicated by the identification sequences of the N REs to obtain a time-frequency position sequence of the N REs;
the control terminal adds a cyclic prefix to the time-frequency position sequences of the N REs to obtain a time-frequency position sequence added with the cyclic prefix;
the control terminal hashes the time-frequency position sequence added with the cyclic prefix, and determines the obtained hash value as the sidestream master key.
5. The method of claim 3, wherein the unreserved side line resources include M REs, M is an integer greater than 1, and the control terminal uses a time-frequency location of the unreserved side line resources in the side line resource set as an input parameter, and generating the side auxiliary master key includes:
The control terminal randomly sequences the identifications of the M REs through a second random algorithm to obtain identification sequences of the M REs;
the control terminal sequences the time-frequency positions of the M REs according to the sequence of the M REs indicated by the identification sequences of the M REs to obtain a time-frequency position sequence of the M REs;
the control terminal adds a cyclic prefix to the time-frequency position sequences of the M REs to obtain a time-frequency position sequence added with the cyclic prefix;
the control terminal hashes the time-frequency position sequence added with the cyclic prefix, and determines the obtained hash value as the sidestream master key.
6. The method according to any one of claims 3-5, wherein the plain text sidestream control information includes plain text information for indicating the first user and plain text information for indicating the first operation, and wherein the control terminal encrypts the plain text sidestream control information using the sidestream key to obtain the encrypted sidestream control information, including:
the control terminal encrypts the information of the plaintext, which is used for indicating the first user, by using the sidestream master key to obtain encrypted information which is used for indicating the first user, and encrypts the information of the plaintext, which is used for indicating the first operation, by using the sidestream auxiliary key to obtain encrypted information which is used for indicating the first operation.
7. The method of claim 2, wherein the control terminal uses a time-frequency location of a sidelink resource in the sidelink resource set as an input parameter, and generating the sidelink key comprises:
the control terminal takes the time-frequency position relation between reserved side line resources and unreserved side line resources in the side line resource set as an input parameter to generate a side line key; the unreserved sidestream resources are sidestream resources which need to be used for transmitting the sidestream control information for the first time, and the reserved sidestream resources are sidestream resources reserved for retransmitting the sidestream control information.
8. The method of claim 7, wherein the reserved sideline resources include N resource elements REs, N is an integer greater than 1, the unreserved sideline resources include M REs, M is an integer greater than 1, and the control terminal generates the sideline key using a time-frequency positional relationship between the reserved sideline resources and the unreserved sideline resources in the sideline resource set as an input parameter, comprising:
the control terminal determines the time-frequency distance between the time-frequency position of each RE in the N REs and the time-frequency positions of the M REs to obtain N times M time-frequency distances;
The control terminal adds cyclic prefix to the N times M time-frequency distances to obtain N times M time-frequency distances added with the cyclic prefix;
and the control terminal hashes the N times and the M time-frequency distances added with the cyclic prefix, and determines the obtained hash value as the sidestream key.
9. A key-based intelligent door lock control method, which is applied to an intelligent door lock, the method comprising:
the intelligent door lock receives encrypted sidestream control information from a control terminal through sidestream resources in a sidestream resource set, wherein the sidestream resource set comprises sidestream resources required by air interface transmission between the control terminal and the intelligent door lock;
the intelligent door lock decrypts the encrypted sidestream control information by using a sidestream resource set to obtain plaintext sidestream control information, wherein the plaintext sidestream control information is used for indicating that the first user needs the intelligent door lock to execute a first operation;
and the intelligent door lock executes the first operation according to the lateral control information of the plaintext.
10. A key-based intelligent door lock control apparatus, characterized by comprising means for performing the method of any of the preceding claims 1-9.
CN202310587991.7A 2023-05-24 2023-05-24 Intelligent door lock control method and device based on secret key Pending CN116863565A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310587991.7A CN116863565A (en) 2023-05-24 2023-05-24 Intelligent door lock control method and device based on secret key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310587991.7A CN116863565A (en) 2023-05-24 2023-05-24 Intelligent door lock control method and device based on secret key

Publications (1)

Publication Number Publication Date
CN116863565A true CN116863565A (en) 2023-10-10

Family

ID=88229255

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310587991.7A Pending CN116863565A (en) 2023-05-24 2023-05-24 Intelligent door lock control method and device based on secret key

Country Status (1)

Country Link
CN (1) CN116863565A (en)

Similar Documents

Publication Publication Date Title
JP6492115B2 (en) Encryption key generation
CN112740733B (en) Secure access method and device
SE538304C2 (en) Improved installation of a terminal in a secure system
US10050964B2 (en) Method and system for securing data communicated in a network
KR20110004870A (en) A method for distributing encryption means
CN107534558B (en) Method for protecting the information security of data transmitted via a data bus and data bus system
CN112449323B (en) Communication method, device and system
Lee et al. An efficient multiple session key establishment scheme for VANET group integration
CN115868189A (en) Method, vehicle, terminal and system for establishing vehicle safety communication
CN113141333B (en) Communication method, device, server, system and storage medium of network access device
Fazzat et al. A comparative performance study of cryptographic algorithms for connected vehicles
KR101707602B1 (en) Method for authenticating secure message based on hash tree and apparatus therefor
CN106487761B (en) Message transmission method and network equipment
CN111541642B (en) Bluetooth encryption communication method and device based on dynamic secret key
CN116863565A (en) Intelligent door lock control method and device based on secret key
CN113132980A (en) Key management system method and device applied to Beidou navigation system
CN113455032A (en) Communication method and device
US11228589B2 (en) System and method for efficient and secure communications between devices
CN115885496B (en) Communication method and related device
CN114710359B (en) Industrial network dynamic key management method and industrial network encryption communication method
CN108901023B (en) Method and system for sharing WiFi among Internet of things devices
KR101758232B1 (en) method of encryption or decryption a data block, apparatus for encryption or decryption a data block, and storage medium for storing a program for encryption or decryption a data block
CN115278661A (en) Unicast transmission method, system, electronic equipment and storage medium based on air interface frame
CN113556736A (en) Access method, server, terminal to be accessed, electronic device and storage medium
CN111918229A (en) Method, device and storage medium for transmitting information by wireless sensor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination