CN106549939B - Data processing method and device for intelligent access control system - Google Patents

Data processing method and device for intelligent access control system Download PDF

Info

Publication number
CN106549939B
CN106549939B CN201610890853.6A CN201610890853A CN106549939B CN 106549939 B CN106549939 B CN 106549939B CN 201610890853 A CN201610890853 A CN 201610890853A CN 106549939 B CN106549939 B CN 106549939B
Authority
CN
China
Prior art keywords
key
encrypted
access control
intelligent
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610890853.6A
Other languages
Chinese (zh)
Other versions
CN106549939A (en
Inventor
韦晟敢
周鹏
邓荣君
林龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zuolin Yongjia Technology Co ltd
Original Assignee
Shenzhen Zuolin Yongjia Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zuolin Yongjia Technology Co ltd filed Critical Shenzhen Zuolin Yongjia Technology Co ltd
Priority to CN201610890853.6A priority Critical patent/CN106549939B/en
Publication of CN106549939A publication Critical patent/CN106549939A/en
Application granted granted Critical
Publication of CN106549939B publication Critical patent/CN106549939B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/23Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder by means of a password
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a data processing method and a data processing device for an intelligent access control system. The intelligent access control system is used for carrying out double decryption to obtain original data sent to the intelligent access control by the server side after receiving the double encrypted data sent by the intelligent terminal, so that data communication is realized.

Description

Data processing method and device for intelligent access control system
Technical Field
The invention relates to the technical field of communication, in particular to a data processing method and device of an intelligent access control system.
Background
With the development of intelligent technology, a large number of intelligent electronic products emerge. For example, users have increasingly demanded security performance, and various types of smart access systems have been introduced to ensure security.
At present, in an intelligent access control system, a remote server can communicate with an intelligent access control to realize remote control of the intelligent access control, https (hypertext transfer security protocol) communication mode (with a communication security mechanism) can be selected between the remote server and the intelligent access control to ensure communication security, however, sometimes the intelligent access control needs to communicate with the remote server through a mobile terminal as an intermediary, and the security of the mobile terminal cannot be ensured, so that the communication security between the remote server and the intelligent access control cannot be ensured.
Disclosure of Invention
Therefore, it is necessary to provide a data processing method and apparatus for an intelligent access control system, which can improve communication security, for solving the problem of insecurity of communication.
A data processing method of an intelligent access control system comprises the following steps:
receiving encrypted original data obtained by encrypting the original data by the server according to the first secret key;
reading the second key;
encrypting the encrypted original data according to the second key to obtain double encrypted data;
and transmitting the double encrypted data to an intelligent access control.
The invention also provides a data processing device of the intelligent access control system, which is characterized by comprising the following components:
the data receiving module is used for receiving the encrypted original data obtained by encrypting the original data by the server according to the first secret key;
the first reading module is used for reading the second key;
the data encryption module is used for encrypting the encrypted original data according to the second key to obtain double encrypted data;
and the data transmission module is used for transmitting the double encrypted data to the intelligent access control.
According to the data processing method and device of the intelligent access control system, when the server side sends original data to the intelligent access control through the intelligent terminal as an intermediary, the intelligent terminal encrypts the original data sent by the server side according to the second secret key to obtain double-encrypted data and sends the double-encrypted data to the intelligent access control, namely, the original data needing to be sent to the intelligent access control by the server side is firstly encrypted at the server side and sent to the intelligent terminal to ensure the communication safety between the server side and the intelligent terminal, then the double-encrypted data is sent to the intelligent access control through the intelligent terminal for encryption, so that the communication safety between the intelligent terminal and the intelligent access control is further ensured, and the data communication safety is ensured through the double-encryption.
The invention also provides a data processing method of the intelligent access control system, which comprises the following steps:
the data processing method of the intelligent access control system is characterized by comprising the following steps of:
receiving double encrypted data sent by an intelligent terminal;
reading a first key and a second key;
and decrypting the double encrypted data according to the first key and the second key to obtain original data.
The invention also provides a data processing device of the intelligent access control system, which is characterized by comprising the following components:
the data receiving module is used for receiving the double encrypted data sent by the intelligent terminal;
the second reading module is used for reading the first key and the second key;
and the data decryption module is used for decrypting the double encrypted data according to the first key and the second key to obtain original data.
According to the data processing method and device of the intelligent access control system, after the intelligent access control receives the double-encrypted data sent by the intelligent terminal, double decryption is carried out on the double-encrypted data to obtain the original data sent to the intelligent access control by the server, and data communication is achieved. The double-encrypted data is the data obtained by encrypting the original data by the server side and then encrypting the original data by the intelligent terminal, namely the double-encrypted data is the data obtained by encrypting the original data twice, and then carrying out double decryption on the double-encrypted data to obtain the original data.
Drawings
FIG. 1 is an interaction diagram of an intelligent door sensor system according to an embodiment;
fig. 2 is a flowchart of a data processing method of the intelligent access control system according to an embodiment;
fig. 3 is a sub-flowchart of a data processing method of an intelligent access control system according to another embodiment;
fig. 4 is a sub-flowchart of a step of reading a second key in the data processing method of the intelligent access control system according to another embodiment;
fig. 5 is a flowchart of a data processing method of the intelligent access control system according to an embodiment;
FIG. 6 is a sub-flowchart of a data processing method of an intelligent access control system according to another embodiment;
FIG. 7 is a block diagram of a data processing apparatus of an intelligent access control system according to an embodiment;
FIG. 8 is a block diagram of a data processing apparatus of an intelligent access control system according to another embodiment;
FIG. 9 is a sub-block diagram of a data processing device of an intelligent access control system according to another embodiment;
fig. 10 is a block diagram of a data processing device of an intelligent access control system according to an embodiment.
Detailed Description
Referring to fig. 1, an intelligent access control system according to an embodiment is provided, which includes an intelligent access control, an intelligent terminal, and a server, where when the intelligent access control performs data communication with the server through the intelligent terminal, data encryption is required to be performed in order to ensure communication security. On one hand, after the connection between the intelligent terminal and the intelligent access control is established, the intelligent terminal can generate a first key pair, namely a first public key and a first private key, the intelligent terminal sends the first public key to the intelligent access control, the intelligent access control can generate the first key for establishing a data security transmission channel, the first key is encrypted according to the first public key and then sent to the intelligent terminal, and the intelligent terminal decrypts the encrypted first key according to the first private key to obtain the first key. On the other hand, when the intelligent access control is activated, a second key pair, namely a second public key and a second private key, is generated, the intelligent access control sends the second public key to the intelligent terminal, the intelligent terminal forwards the second public key to the server side, the second key is generated at the server side, the server side encrypts the second key according to the received second public key and sends the second key to the intelligent terminal, the intelligent terminal receives the encrypted second key and sends the second key to the intelligent access control, and the intelligent access control decrypts the encrypted second key according to the second private key and then can obtain the second key, namely the intelligent access control obtains the second key sent by the server side. Through the process, the intelligent access control can safely obtain the first secret key and the second secret key, the intelligent terminal can safely obtain the first secret key, and the server side can obtain the second secret key.
When an intelligent system needs to transmit data or information, for example, when the intelligent access control needs to transmit information to a server, firstly, double encryption is performed on the information to be transmitted according to a first secret key and a second secret key to obtain double encryption information, the double encryption information is transmitted to an intelligent terminal, the intelligent terminal performs single-layer decryption on the double encryption information according to the first secret key to obtain single-layer encryption information, the single-layer decryption information is decrypted by the server according to the second secret key to obtain the information to be transmitted, the information to be transmitted is transmitted by the intelligent access control, and the information transmission safety between the intelligent access control and the server can be realized through double encryption corresponding to a solid line part in fig. 1. For another example, when the server needs to send data to the smart door control, the server encrypts the original data according to the second key and sends the encrypted original data to the smart terminal, the smart terminal encrypts the encrypted original data again according to the first key to obtain double-encrypted data and sends the double-encrypted data to the smart door control, and the smart door control receives the double-encrypted data and then double-decrypts the double-encrypted data according to the first key and the second key to obtain the original data sent by the server, so that communication between the server and the smart door control is realized, corresponding to a dotted line part in fig. 1, because the server and the smart terminal are both encrypted, that is, double-encrypted, data transmission safety can be ensured. The process of sending the information to the server by the intelligent door sensor is not sequential to the process of sending the data to the intelligent door sensor by the server, and the processes can be performed simultaneously, that is, the sequence of the solid line part and the dotted line part in fig. 1 can be changed, and the processes can also be performed simultaneously. Specifically, when the intelligent access control communicates data or information with the server, the symmetric key is used for encryption and decryption, that is, the same key is used for encryption and decryption. When public key transmission is carried out between the intelligent access control and the server side and between the intelligent access control and the intelligent terminal, asymmetric encryption is adopted, namely, a public key is adopted during encryption, and a private key is adopted during decryption, namely, different keys are adopted for encryption and decryption respectively.
Referring to fig. 2, an embodiment of a data processing method for an intelligent access control system is provided, which is applied to an intelligent terminal and includes the following steps:
s210: and receiving the encrypted original data obtained by encrypting the original data by the server according to the first key.
When the server needs to send data to the intelligent access control, the server first needs to obtain original data, namely the data to be sent which needs to be sent to the intelligent access control, a first secret key for encryption is generated at the server, the original data to be sent is encrypted according to the first secret key to obtain the encrypted original data, the original data in an encryption area is sent to the intelligent terminal, and the intelligent terminal receives the encrypted original data. Specifically, the first key generated by the server may be decrypted successfully after a certain time, that is, when data is encrypted and transmitted through the first key, there is a risk that the same first key is used for encrypting for a certain time.
S220: the second key is read.
At the intelligent access control, a second key used for establishing a data security transmission channel can be generated, namely the second key can be randomly generated at the intelligent access control and used for encrypting data, in order to ensure that the data can be safely transmitted before the intelligent access control and the intelligent terminal, the intelligent terminal can decrypt the data transmitted by the intelligent access control and the intelligent terminal can encrypt the data sent by the server side, the intelligent access control needs to transmit the generated second key to the intelligent terminal, namely the intelligent terminal needs to acquire and store the second key of the intelligent access control in advance, and when the intelligent terminal needs to encrypt the data sent by the server side or decrypt the information sent by the intelligent access control according to the second key, the second key stored in the intelligent terminal needs to be read for encryption or decryption. That is, when the encrypted original data sent by the server needs to be encrypted again after being received, the stored second key is read, and then the encrypted original data is encrypted again according to the second key.
S230: and encrypting the encrypted original data according to the second key to obtain double encrypted data.
S240: and transmitting the double-encrypted data to the intelligent access control.
Because the intelligent terminal is used as an intermediary for communication between the server and the intelligent access control, whether data transmission is safe or not is related to whether the whole transmission process is safe or not, in order to ensure the safety of data transmission, after the intelligent terminal receives encrypted original data obtained by encrypting the original data by the server according to the second secret key, the encrypted original data needs to be encrypted again according to the read second secret key, namely, the original data is encrypted twice to obtain double-encrypted data. And encrypting the encrypted original data again through the intelligent terminal so as to further ensure the safety of the data transmitted to the intelligent entrance guard by the intelligent terminal. The intelligent access control can decrypt the double-encrypted data after receiving the double-encrypted data to obtain the original data sent by the server, so that safe passing between the server and the intelligent access control is realized.
According to the data processing method of the intelligent access control system, when the server side sends original data to the intelligent access control through the intelligent terminal as an intermediary, the intelligent terminal encrypts the original data sent by the server side according to the second secret key to obtain double-encrypted data and sends the double-encrypted data to the intelligent access control, namely, the original data needing to be sent to the intelligent access control by the server side is firstly encrypted by the server side and sent to the intelligent terminal to ensure the communication safety between the server side and the intelligent terminal, then the double-encrypted data is encrypted by the intelligent terminal and sent to the intelligent access control, so that the communication safety between the intelligent terminal and the intelligent access control is further ensured, and the communication safety is ensured through double-encryption.
Referring to fig. 3, in one embodiment, the data processing method of the intelligent access control system further includes the steps of:
s250: and receiving double encryption information sent by the intelligent entrance guard.
S260: and decrypting the double encrypted information according to the second key to obtain single-layer encrypted information.
S270: and sending the single-layer encryption information to the server.
Specifically, in the intelligent terminal, the step of receiving the double encryption information sent by the intelligent access control and the step of receiving the encrypted original data are not in sequence, that is, the two steps can be performed simultaneously, the double encryption information can be received first and then the encrypted original data can be received, the encrypted original data can be received first and then the double encryption information can be received, that is, the intelligent terminal can process the data received from the service end at any time and can process the information received from the intelligent access control at any time.
When the intelligent entrance guard needs to send information to the server, the intelligent entrance guard firstly double encrypts the information to be sent and sends the information to the intelligent terminal, the intelligent terminal receives the double encrypted information sent by the intelligent entrance guard and then decrypts the information once according to a second secret key, the double encrypted information is information encrypted twice through a first secret key and a second secret key, the second secret key is stored in the intelligent terminal, so that single-layer encrypted information can be obtained by decrypting the double encrypted information once according to the second secret key, the single-layer encrypted information, namely the information to be sent is encrypted according to the first secret key and then is sent to the server, and the first secret key is stored in the server, so that the information to be sent by the intelligent entrance guard can be obtained by decrypting the single-layer encrypted information according to the first secret key after the server receives the single-layer encrypted information, because the information to be sent is doubly encrypted in the intelligent access control, the intelligent access control can safely transmit the information to the server.
Referring to fig. 4, in one embodiment, before the step of reading the second key, the method further includes the steps of:
s401: and acquiring a first public key and a first private key corresponding to the first public key.
S402: and sending the first public key to the intelligent access control.
S403: and receiving an encrypted second key obtained by encrypting the second key by the intelligent access control according to the first public key.
S404: and decrypting the encrypted second key according to the first private key to obtain the second key and storing the second key.
At intelligent entrance guard, can generate a second key that is used for establishing data security transmission channel, in order to ensure that intelligent entrance guard and intelligent terminal can safe transmission data before and intelligent terminal can decipher the data that intelligent entrance guard transmitted, intelligent entrance guard need give intelligent terminal with the second key transmission who produces. In order to ensure the transmission security of the second key of the intelligent access control and the intelligent terminal, a first key pair, namely a first public key and a first private key corresponding to the first public key are generated in the intelligent terminal, thereby obtaining a first public key and a first private key corresponding to the first public key, the information encrypted by the second public key can be unlocked only by the second private key corresponding to the second public key, and sends the first public key to the intelligent entrance guard, the intelligent entrance guard encrypts the second key according to the first public key after receiving the first public key sent by the intelligent terminal to obtain an encrypted second key, and the intelligent terminal decrypts the encrypted second key according to the first private key corresponding to the first public key to obtain and store the second key sent by the intelligent access control, and the second key can be read when the second key is subsequently required to be encrypted or decrypted.
Referring to fig. 5, the present invention further provides an embodiment of a data processing method for an intelligent access control system, which is applied to an intelligent access control system, and includes the following steps:
s510: and receiving the double encrypted data sent by the intelligent terminal.
When the server sends original data to the intelligent access control, the original data are encrypted according to the first secret key and then sent to the intelligent terminal, the intelligent terminal encrypts the encrypted original data again to obtain double-encrypted data and then sends the double-encrypted data to the intelligent access control, and the intelligent access control receives the double-encrypted data.
S520: the first key and the second key are read.
S530: and decrypting the double encrypted data according to the first key and the second key to obtain the original data.
If the intelligent access control wants to obtain the original data sent by the server, the intelligent access control needs to perform double decryption on the received double encrypted data, so that the stored first key and the stored second key need to be read at first, and the double encrypted data is subjected to double decryption through the first key and the second key, so that the original data can be obtained.
Specifically, the step of decrypting the doubly encrypted data according to the first key and the second key to obtain the original data includes decrypting the doubly encrypted data according to the second key to obtain the encrypted original data; and decrypting the encrypted original data according to the first key to obtain the original data. That is to say, when the server sends the original data to the smart door sensor, the original data is firstly encrypted according to the first secret key and then sent to the smart terminal, and the smart terminal then re-encrypts the encrypted original data according to the second secret key to obtain the double-encrypted data, that is, the original data is firstly encrypted by the first secret key and then encrypted by the second secret key, so that when decrypting, the double-encrypted data is firstly decrypted according to the second secret key and then decrypted according to the first secret key.
According to the data processing method of the intelligent access control system, after the intelligent access control receives the double-encrypted data sent by the intelligent terminal, double decryption is carried out on the double-encrypted data to obtain the original data sent to the intelligent access control by the server, and data communication is achieved. The double-encrypted data is the data obtained by encrypting the original data by the server side and then encrypting the original data by the intelligent terminal, namely the double-encrypted data is the data obtained by encrypting the original data twice, and then carrying out double decryption on the double-encrypted data to obtain the original data.
Referring to fig. 6, in one embodiment, the data processing method of the intelligent access control system further includes the steps of:
s640: and acquiring information to be sent.
S650: and carrying out double encryption on the information to be sent according to the first key and the second key to obtain double encryption information.
When the intelligent access control needs to send information to the intelligent terminal, the intelligent access control firstly needs to acquire information to be sent, and in order to ensure the information communication safety, the information to be sent needs to be doubly encrypted according to the first secret key and the second secret key to acquire double information. That is, the double encryption information is obtained, and if the double decryption page is not performed on the double encryption information by the first key and the second key, the information sent to the intelligent terminal by the intelligent access control cannot be obtained, that is, the communication security is ensured by the double encryption mode. The step of receiving the double-encrypted data sent by the intelligent terminal and the step of acquiring the information to be sent can be switched in sequence and can also be carried out simultaneously, that is, the intelligent access control can firstly receive the double-encrypted data sent by the intelligent terminal and then acquire the information to be sent, and can also firstly acquire the information to be sent and then receive the double-encrypted data sent by the intelligent terminal and also can see to be carried out simultaneously.
Specifically, the information to be sent is doubly encrypted according to a first key and a second key, and the step of obtaining doubly encrypted information comprises the steps of encrypting the information to be sent according to the first key to obtain the encrypted information to be sent; and encrypting the encrypted information to be sent according to the second key to obtain double encrypted information. That is to say, because the intelligent terminal only comprises the second key, the first key is stored in the server, and the intelligent terminal intelligently decrypts the double encryption information according to the second key, when the original data is encrypted in the intelligent door magnet, the encryption is performed according to the first key and then the encryption is performed according to the second key, so that the intelligent terminal can decrypt once according to the second key after obtaining the double encryption information to obtain the single-layer encryption information.
S660: and sending the double encryption information to the intelligent terminal.
After the double-encryption information is obtained, the double-encryption information is sent to the intelligent terminal, the intelligent terminal can decrypt the double-encryption information once according to the second secret key to obtain single-layer encryption information and send the single-layer encryption information to the server, and the single-layer encryption information is also a single-encryption result of the information to be sent, so that the information to be sent has a protection effect. The server side can generate and store the first secret key, and the server side can obtain the information to be sent, which is sent to the server side by the intelligent access control, by decrypting the first secret key once according to the first secret key, so that the safe communication between the intelligent access control and the server side is realized.
Referring to fig. 7, in one embodiment, before the step of reading the first key and the second key, the method further includes the steps of:
s701: a second key is generated and stored.
In the intelligent access control system, a second key for data encryption is generated and stored, the second key is used for decryption or encryption when data sent by the intelligent terminal needs to be decrypted or information to be sent needs to be encrypted subsequently, so that the data or the information needs to be stored in the intelligent access control system, and the second key is read when the data or the information needs to be encrypted or decrypted subsequently.
S702: and generating a second public key and a second private key corresponding to the second public key.
In the process of using the access control for the first time, a registered user of an APP (application) with an access control function is required to activate the used intelligent access control through strict authority control. The intelligent access control can generate and store a second key pair, namely a second public key and a second private key corresponding to the second public key in the activation process, so that the second public key and the second private key corresponding to the second public key can be obtained, and the information encrypted by the second public key can be unlocked through the second private key corresponding to the second public key.
S703: and sending the second public key to the intelligent terminal.
S704: and receiving the encrypted first secret key which is obtained by encrypting the first secret key by the server side forwarded by the intelligent terminal according to the second public key.
The server side can generate a first secret key, and in order to enable the intelligent door to decrypt data encrypted by the server side through the first secret key, the server side needs to send the first secret key to the intelligent door. In order to ensure the transmission safety of the first secret key, the intelligent terminal is used as an intermediary to send a second public key to the server, the server encrypts the first secret key according to the second public key and transmits the encrypted first secret key to the intelligent entrance guard through the intelligent terminal, namely, the intelligent entrance guard can obtain the encrypted first secret key so as to ensure the transmission safety of the first secret key.
S705: and decrypting the encrypted first key according to the second private key to obtain a second key and storing the second key.
When the intelligent access control receives the encrypted first key, the intelligent access control decrypts the encrypted first key according to the second private key to obtain and store a second key, and when data sent by the server needs to be encrypted subsequently or information to be sent is sent to the server to be encrypted, the second key is read, and then encryption or decryption is carried out according to the second key.
Referring to fig. 8, the present invention further provides an intelligent access control system data processing apparatus, including:
the data receiving module 810 is configured to receive encrypted original data obtained by encrypting the original data by the server according to the first key;
a first reading module 820 for reading the second key;
the data encryption module 830 is configured to encrypt the encrypted original data according to the second key to obtain dual encrypted data;
and the data transmission module 840 is used for transmitting the double-encrypted data to the intelligent access control.
Above-mentioned intelligent access control system data processing apparatus, when the server side passes through intelligent terminal and sends the raw data to intelligent access control as the intermediary, intelligent terminal is after receiving the encrypted raw data that the server side sent, encrypt according to the second key again and send for intelligent access control after obtaining double encryption data, that is to say, the server side needs encrypt the raw data that sends to intelligent access control at the server side at first and send for intelligent terminal, in order to ensure the communication safety between server side and the intelligent terminal, the rethread intelligent terminal encrypts, then send double encryption data for intelligent access control, in order to further ensure the communication safety between intelligent terminal and the intelligent access control, guarantee data communication safety through double encryption.
Referring to fig. 9, in an embodiment, the data processing apparatus of the smart entry system further includes:
the information receiving module 950 is configured to receive double encryption information sent by the intelligent door control;
the information decryption module 960 is configured to decrypt the dual encrypted information according to the second key to obtain single-layer encrypted information;
the information sending module 970 is configured to send the single-layer encrypted information to the server.
In one embodiment, the data processing device of the intelligent access control system further comprises: the device comprises a first key pair acquisition module, a first public key sending module, a second key receiving module and a second key decryption and storage module.
The first key pair obtaining module is used for obtaining a first public key and a first private key corresponding to the first public key.
The first public key sending module is used for sending the first public key to the intelligent access control.
The second key receiving module is used for receiving an encrypted second key obtained by encrypting the second key by the intelligent access control according to the first public key.
The second key decryption and storage module is used for decrypting the encrypted second key according to the first private key to obtain and store the second key.
The data transmission device of the intelligent access control system is a device for executing the data transmission method of the intelligent access control system, and the specific detailed characteristics are in one-to-one correspondence, so the details are not described herein.
Referring to fig. 10, the present invention further provides an embodiment of a data processing apparatus of an intelligent access control system, including:
the data receiving module 101 is used for receiving the double encrypted data sent by the intelligent terminal;
a second reading module 102, configured to read the first key and the second key;
and the data decryption module 103 is configured to decrypt the dual encrypted data according to the first key and the second key to obtain the original data.
According to the data processing device of the intelligent access control system, after the intelligent access control receives the double-encryption data sent by the intelligent terminal, double decryption is carried out on the double-encryption data so as to obtain the original data sent by the server side to the intelligent access control, and data communication is achieved. The double-encrypted data is the data obtained by encrypting the original data by the server side and then encrypting the original data by the intelligent terminal, namely the double-encrypted data is the data obtained by encrypting the original data twice, and then carrying out double decryption on the double-encrypted data to obtain the original data.
In one embodiment, the data processing apparatus of the intelligent access control system further includes: the device comprises an information acquisition module, an information encryption module and an encrypted information sending module.
The information acquisition module is used for acquiring information to be sent;
the information encryption module is used for carrying out double encryption on the information to be sent according to the first secret key and the second secret key to obtain double encryption information;
and the encrypted information sending module is used for sending the double encrypted information to the intelligent terminal.
In one embodiment, the data processing apparatus of the intelligent access control system further includes: the device comprises a key generation and storage module, a second key pair acquisition module, a second public key sending module, a first key receiving module and a first key decryption module.
The key generation and storage module is used for generating and storing a second key;
the second key pair obtaining module is used for obtaining a second public key and a second private key corresponding to the second public key;
the second public key sending module is used for sending a second public key to the intelligent terminal;
the first key receiving module is used for receiving an encrypted first key obtained by encrypting the first key by the server side forwarded by the intelligent terminal according to the second public key;
the first key decryption module is used for decrypting the encrypted first key according to the second private key to obtain and store the first key.
The data processing device of the intelligent access control system is a device for executing the data processing method of the intelligent access control system, and the specific detailed features of the data processing device of the intelligent access control system are in one-to-one correspondence, so the detailed description is omitted here.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (8)

1. The data processing method of the intelligent access control system is characterized by comprising the following steps of:
receiving encrypted original data obtained by encrypting the original data by the server according to the first secret key; the first key is generated by the server;
reading the second key; the second secret key is generated by the intelligent access control system;
encrypting the encrypted original data according to the second key to obtain double encrypted data;
transmitting the double encrypted data to an intelligent access control;
before the step of reading the second key, the method further comprises the steps of:
generating a first public key and a first private key corresponding to the first public key;
sending the first public key to the intelligent access control;
receiving an encrypted second key obtained by encrypting the second key by the intelligent access control according to the first public key;
decrypting the encrypted second key according to the first private key to obtain the second key and storing the second key;
the server updates the first key according to a preset time interval;
further comprising:
receiving a second public key and sending the second public key to the server; the second public key is generated by the intelligent access control;
forwarding the encrypted first key obtained by encrypting the first key by the server according to the second public key to the intelligent access control;
the intelligent access control system decrypts the encrypted first key according to a second private key corresponding to the second public key to obtain and store the first key; the second private key is generated by the intelligent access control.
2. The data processing method of the intelligent access control system according to claim 1, further comprising the steps of:
receiving double encryption information sent by the intelligent access control;
decrypting the double encrypted information according to the second key to obtain single-layer encrypted information;
and sending the single-layer encryption information to the server.
3. The data processing method of the intelligent access control system is characterized by comprising the following steps of:
receiving double encrypted data sent by an intelligent terminal;
reading a first key and a second key; the first key is generated by a server; the second secret key is generated by the intelligent access control system;
decrypting the double encrypted data according to the first key and the second key to obtain original data;
before the step of reading the first key and the second key, the method further comprises the following steps:
generating and storing a second key;
generating a second public key and a second private key corresponding to the second public key;
sending the second public key to the intelligent terminal, wherein the second public key is sent to the server by the intelligent terminal;
receiving an encrypted first key obtained by encrypting the first key by the server side forwarded by the intelligent terminal according to the second public key;
decrypting the encrypted first key according to the second private key to obtain and store the first key;
the server updates the first key according to a preset time interval;
further comprising:
the intelligent terminal generates a first public key and a first private key corresponding to the first public key;
receiving the first public key;
encrypting the second key according to the first public key to obtain an encrypted second key;
sending the encrypted second key to the intelligent terminal;
and the intelligent terminal decrypts the encrypted second key according to the first private key to obtain and store the second key.
4. The data processing method of the intelligent access control system according to claim 3, further comprising the steps of:
acquiring information to be transmitted;
performing double encryption on the information to be sent according to the first key and the second key to obtain double-encrypted information;
and sending the double encryption information to the intelligent terminal.
5. The utility model provides an intelligent access control system data processing device which characterized in that includes:
the data receiving module is used for receiving the encrypted original data obtained by encrypting the original data by the server according to the first secret key; the first key is generated by the server; the server updates the first key according to a preset time interval;
the first reading module is used for reading the second key; the second secret key is generated by the intelligent access control system;
the data encryption module is used for encrypting the encrypted original data according to the second key to obtain double encrypted data;
the data transmission module is used for transmitting the double encrypted data to the intelligent access control;
further comprising:
the first key pair acquisition module is used for generating a first public key and a first private key corresponding to the first public key;
the first public key sending module is used for sending a first public key to the intelligent access control;
the second key receiving module is used for receiving the encrypted second key obtained by encrypting the second key by the intelligent access control according to the first public key;
the second key decryption and storage module is used for decrypting the encrypted second key according to the first private key to obtain and store the second key;
further comprising:
receiving a second public key and sending the second public key to the server; the second public key is generated by the intelligent access control;
forwarding the encrypted first key obtained by encrypting the first key by the server according to the second public key to the intelligent access control;
the intelligent access control system decrypts the encrypted first key according to a second private key corresponding to the second public key to obtain and store the first key; the second private key is generated by the intelligent access control.
6. The intelligent gate inhibition system data processing device according to claim 5, further comprising:
the information receiving module is used for receiving the double-encryption information sent by the intelligent access control;
the information decryption module is used for decrypting the double encrypted information according to the second key to obtain single-layer encrypted information;
and the information sending module is used for sending the single-layer encrypted information to the server.
7. The utility model provides an intelligent access control system data processing device which characterized in that includes:
the data receiving module is used for receiving the double encrypted data sent by the intelligent terminal;
the second reading module is used for reading the first key and the second key; the first key is generated by a server; the second secret key is generated by the intelligent access control system; the server updates the first key according to a preset time interval;
the data decryption module is used for decrypting the double-encrypted data according to the first secret key and the second secret key to obtain original data;
further comprising:
the key generation and storage module is used for generating and storing a second key;
the second key pair obtaining module is used for obtaining a second public key and a second private key corresponding to the second public key;
the second public key sending module is used for sending the second public key to the intelligent terminal, and the second public key is sent to the server by the intelligent terminal;
the first key receiving module is used for receiving an encrypted first key which is sent by the intelligent terminal and obtained by encrypting the first key by the server according to the second public key;
the first key decryption module is used for decrypting the encrypted first key according to the second private key to obtain and store the first key;
further comprising:
the intelligent terminal generates a first public key and a first private key corresponding to the first public key;
receiving the first public key;
encrypting the second key according to the first public key to obtain an encrypted second key;
sending the encrypted second key to the intelligent terminal;
and the intelligent terminal decrypts the encrypted second key according to the first private key to obtain and store the second key.
8. The intelligent gate inhibition system data processing device according to claim 7, further comprising:
the information acquisition module is used for acquiring information to be sent;
the information encryption module is used for carrying out double encryption on the information to be sent according to the first secret key and the second secret key to obtain double-encrypted information;
and the encrypted information sending module is used for sending the double encrypted information to the intelligent terminal.
CN201610890853.6A 2016-10-11 2016-10-11 Data processing method and device for intelligent access control system Active CN106549939B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610890853.6A CN106549939B (en) 2016-10-11 2016-10-11 Data processing method and device for intelligent access control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610890853.6A CN106549939B (en) 2016-10-11 2016-10-11 Data processing method and device for intelligent access control system

Publications (2)

Publication Number Publication Date
CN106549939A CN106549939A (en) 2017-03-29
CN106549939B true CN106549939B (en) 2020-06-16

Family

ID=58368707

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610890853.6A Active CN106549939B (en) 2016-10-11 2016-10-11 Data processing method and device for intelligent access control system

Country Status (1)

Country Link
CN (1) CN106549939B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109087430A (en) * 2018-09-21 2018-12-25 广东汇泰龙科技有限公司 A kind of key data management method and system based on door lock
CN109215202A (en) * 2018-09-21 2019-01-15 广东汇泰龙科技有限公司 A kind of highly-safe key data management method and system
CN109961545A (en) * 2019-03-07 2019-07-02 广东必达保安系统有限公司 Intelligent door lock and its wireless telecommunications plaintext data encryption and decryption approaches
CN112446982A (en) * 2019-08-10 2021-03-05 云丁网络技术(北京)有限公司 Method, device, computer readable medium and equipment for controlling intelligent lock
WO2021023164A1 (en) 2019-08-02 2021-02-11 云丁网络技术(北京)有限公司 Intelligent lock control method and system
CN111489478A (en) * 2020-04-24 2020-08-04 英华达(上海)科技有限公司 Access control method, system, device and storage medium
CN111615070B (en) * 2020-05-28 2022-06-21 上海依图网络科技有限公司 Service processing method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101246607A (en) * 2007-02-13 2008-08-20 陈年 Digital authentication control method for access control system and access control system using the same
CN101286244A (en) * 2008-04-29 2008-10-15 山东大学 Method for combining encryption to lower computer based on schoolyard card entrance guard system
CN103595534A (en) * 2013-11-08 2014-02-19 安徽云盾信息技术有限公司 Data encryption and decryption system supporting device revoking operation and implementing method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030037250A1 (en) * 2001-06-29 2003-02-20 Doodlebug Online, Inc. System and method for securely accessing data on content servers using dual encrypted paths from a central authorization host
CN103607402B (en) * 2013-11-26 2016-11-23 广州博冠信息科技有限公司 A kind of online game data encryption and decryption method and equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101246607A (en) * 2007-02-13 2008-08-20 陈年 Digital authentication control method for access control system and access control system using the same
CN101286244A (en) * 2008-04-29 2008-10-15 山东大学 Method for combining encryption to lower computer based on schoolyard card entrance guard system
CN103595534A (en) * 2013-11-08 2014-02-19 安徽云盾信息技术有限公司 Data encryption and decryption system supporting device revoking operation and implementing method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
一种基于AES的智能手机门禁系统方案;崔杰 等;《信息网络安全》;20131110(第11期);第54-57页 *
利用双重加密提高RFID 应用中的安全性;张琪;《电子制作》;20151201(第23期);第91-92页 *

Also Published As

Publication number Publication date
CN106549939A (en) 2017-03-29

Similar Documents

Publication Publication Date Title
CN106549939B (en) Data processing method and device for intelligent access control system
US10771966B2 (en) Encryption method, decryption method, and related apparatus
US9485096B2 (en) Encryption / decryption of data with non-persistent, non-shared passkey
CN107438230B (en) Safe wireless ranging
EP3011770A1 (en) Wireless configuration using passive near field communication
WO2015024426A1 (en) Identity authentication system, apparatus, and method, and identity authentication request apparatus
CN102664898A (en) Fingerprint identification-based encrypted transmission method, fingerprint identification-based encrypted transmission device and fingerprint identification-based encrypted transmission system
KR101675332B1 (en) Data commincaiton method for vehicle, Electronic Control Unit and system thereof
KR101608815B1 (en) Method and system for providing service encryption in closed type network
CN109309566B (en) Authentication method, device, system, equipment and storage medium
CN110234102B (en) Communication method and apparatus
KR101481403B1 (en) Data certification and acquisition method for vehicle
CN105208028A (en) Data transmission method and related device and equipment
CN102404337A (en) Data encryption method and device
CN103236934A (en) Method for cloud storage security control
CN107094138A (en) A kind of smart home safe communication system and communication means
CN101707767A (en) Data transmission method and devices
CN101931623B (en) Safety communication method suitable for remote control with limited capability at controlled end
CN105262586B (en) The method for distributing key and device of automobile burglar equipment
CN105407109A (en) Data secure transmission method between Bluetooth devices
CN110708291A (en) Data authorization access method, device, medium and electronic equipment in distributed network
CN111132148A (en) Method and device for configuring and accessing intelligent household electrical appliance network and storage medium
CN104426849A (en) Method and system for realizing data security protection
KR101290177B1 (en) Spectrum authorization and related communications methods and apparatus
KR20170032210A (en) Data commincaiton method for vehicle, Electronic Control Unit and system thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 518051 Two 9AB Financial Services Technological Innovation Base, No. 8 Kefa Road, Yuehai Street, Nanshan District, Shenzhen City, Guangdong Province

Applicant after: SHENZHEN ZUOLIN YONGJIA TECHNOLOGY Co.,Ltd.

Address before: Nanshan District Guangdong streets, Shenzhen city 518000 Guangdong Province Road No. 8 financial services technology innovation base 2 7F2

Applicant before: SHENZHEN YONGJIA TIANCHENG TECHNOLOGY DEVELOPMENT Co.,Ltd.

GR01 Patent grant
GR01 Patent grant