CN106952378A - Method for unlocking and device, electronic lock - Google Patents

Method for unlocking and device, electronic lock Download PDF

Info

Publication number
CN106952378A
CN106952378A CN201710234522.1A CN201710234522A CN106952378A CN 106952378 A CN106952378 A CN 106952378A CN 201710234522 A CN201710234522 A CN 201710234522A CN 106952378 A CN106952378 A CN 106952378A
Authority
CN
China
Prior art keywords
password
electronic lock
key
electronic equipment
input value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710234522.1A
Other languages
Chinese (zh)
Inventor
徐士兰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201710234522.1A priority Critical patent/CN106952378A/en
Publication of CN106952378A publication Critical patent/CN106952378A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed

Abstract

The application provides a kind of method for unlocking and device, electronic lock, and methods described includes:The input value for the predetermined encryption algorithm that the current time factor that the key that electronic lock is stored and the electronic lock are determined is stored as the electronic lock is calculated, and obtains first password;Receive the unlocking instruction for including the second password, second password is that the input value calculating for the predetermined encryption algorithm that the current time factor that the key and the electronic equipment for obtaining electronic equipment are determined is obtained as the electronic equipment is obtained, key and the key agreement of electronic lock storage that the electronic equipment is obtained, the predetermined encryption algorithm that the electronic equipment is obtained are consistent with the predetermined encryption algorithm that the electronic lock is stored;If the first password is consistent with second password, the unlocking action of the electronic lock is performed.It can be seen that, during unlocking, electronic lock need not simultaneously network, and be realized under offline mode, while security is improved, can also reduce the cost of electronic lock.

Description

Method for unlocking and device, electronic lock
Technical field
The application is related to lock technology field, more particularly to a kind of method for unlocking and device, electronic lock.
Background technology
In the related art, people are after for electronic lock setting unlocking cipher, and the unlocking cipher is often fixed, until User is reset to electronic lock can just change.Wherein, on the one hand, user, which easily forgets fixed unlocking cipher, causes nothing Method is unlocked;On the other hand, changeless unlocking cipher is also easily illegally cracked by other people in longer period.
The content of the invention
In view of this, the application provides a kind of method for unlocking and device, electronic lock.
To achieve the above object, the application offer technical scheme is as follows:
According to the first aspect of the application, it is proposed that a kind of method for unlocking, including:
What the current time factor that the key that electronic lock is stored and the electronic lock are determined was stored as the electronic lock The input value of predetermined encryption algorithm is calculated, and obtains first password;
The unlocking instruction for including the second password is received, second password is the key and the electricity for obtaining electronic equipment The input value for the predetermined encryption algorithm that the current time factor that sub- equipment is determined is obtained as the electronic equipment calculates what is obtained, Key and the key agreement of electronic lock storage that the electronic equipment is obtained, the predetermined encryption that the electronic equipment is obtained are calculated Method is consistent with the predetermined encryption algorithm that the electronic lock is stored;
If the first password is consistent with second password, the unlocking action of the electronic lock is performed.
According to the second aspect of the application, it is proposed that a kind of unlocking apparatus, including:
Dynamic password obtaining unit, the current time factor determined for the key for storing electronic lock and the electronic lock The input value of the predetermined encryption algorithm stored as the electronic lock is calculated, and obtains first password;
Unlocking instruction receiving unit, for receiving the unlocking instruction for including the second password, second password is by electronics The predetermined encryption that the current time factor that the key and the electronic equipment that equipment is obtained are determined is obtained as the electronic equipment The input value of algorithm calculates what is obtained, key and the key agreement of electronic lock storage that the electronic equipment is obtained, described The predetermined encryption algorithm that electronic equipment is obtained is consistent with the predetermined encryption algorithm that the electronic lock is stored;
Control unit, for when the first password is consistent with second password, performing the unlocking of the electronic lock Action.
According to the third aspect of the application, it is proposed that a kind of electronic lock, including memory, processor and it is stored in memory Computer program that is upper and being run by processor, the processor realizes following steps when performing the computer program:
What the current time factor that the key that electronic lock is stored and the electronic lock are determined was stored as the electronic lock The input value of predetermined encryption algorithm is calculated, and obtains first password;
The unlocking instruction for including the second password is received, second password is the key and the electricity for obtaining electronic equipment The input value for the predetermined encryption algorithm that the current time factor that sub- equipment is determined is obtained as the electronic equipment calculates what is obtained, Key and the key agreement of electronic lock storage that the electronic equipment is obtained, the predetermined encryption that the electronic equipment is obtained are calculated Method is consistent with the predetermined encryption algorithm that the electronic lock is stored;
When the first password is consistent with second password, the unlocking action of the electronic lock is performed.
In the embodiment of the present application, because the first password (correct unlocking cipher) of electronic lock is that the factor is continuous over time Change, within a period of time effectively, compared to fixed password, its security is higher.In addition, it is necessary to electricity during unlocking Sub- equipment calculates the second password by identical key, time factor and identical algorithm, and hereafter user is second close using this Code carries out unlocking checking, when the first password is consistent with second password, performs the unlocking action of the electronic lock.Can See, during unlocking, electronic lock need not simultaneously network, realized under offline mode, while security is improved, can also be dropped The cost of low electronic lock;In addition, the dynamic password generated under offline mode is not easy to be stolen by others, further lifting is safe Property.
Brief description of the drawings
Fig. 1 is a kind of scene graph for realizing unlocking that the exemplary embodiment of the application one is provided;
Fig. 2 is the flow chart of the method for unlocking in the exemplary embodiment of the application one;
Fig. 3 is a kind of block diagram for unlocking apparatus that the exemplary embodiment of the application one is provided.
Embodiment
In the related art, electronic password lock (or electronic lock) can be largely classified into two classes:One class is fixed password Electronic password lock, another kind of is the electronic password lock of dynamic password.The electronic password lock of fixed password is generally by user or lockset Manufacturer sets password, and this fixed password is easily cracked or reveals and cause any property loss, and user holds in a period of time Easily forget this kind of fixed password and coded lock can not be opened.On dynamic puzzle-lock, two kinds are included at present:One kind is to need networking Electronic password lock, by networking can dynamically change password in real time;Another is that pre-set to include multiple candidates close The cipher list of code, sequentially in either order using each candidate password in above-mentioned cipher list.However, it is necessary to which the electronics of networking is close Code lock manufacturing cost it is higher, at present also be not suitable for popularization, and if networking server accessed by hacker, can cause high-volume The risk of password leakage.The electronic Dynamic coded lock of pre-set cipher list, easily occurs inside electronic lock and permutations of code The nonsynchronous phenomenon of table platform counter.In view of problem above, proposes following technical scheme.
Fig. 1 is a kind of scene graph for realizing unlocking that the exemplary embodiment of the application one is provided, as shown in figure 1, in one kind In exemplary unlocking scene, including:Terminal device 20 and server 30 that electronic lock 10, user use, wherein, electronic lock It 10 and need not network, first password is generated by offline mode, the first password is used to realize the password unlocked to be correct. , only can be in certain time length effectively after generation and the first password is continuous dynamic change over time, can be by Effective first password is constantly updated according to certain time interval.That is, at the time of for some determination, electronic lock 10 is all It can correspond to and generate the only effective first password to trigger unlocking action.
Application APP for obtaining unlocking dynamic password can be installed, the server 30 can be installed on terminal device 20 There is service end application program corresponding with the APP.When user needs to unlock, APP, choosing can be opened by terminal device 20 The electronic lock of unlocking required for taking, and click on the password for obtaining and being used for being unlocked to the lock.Hereafter, terminal device 20 is just to clothes Business device 30 sends password and obtains request, and server 30 can be according to preset algorithm, and calculating obtains a password and returns to above-mentioned end The password received is shown to user and checked by end equipment 20, terminal device 20, then, and user passes through the unlocking cipher viewed The inputting interface 11 of above-mentioned electronic lock 10 is inputted, and clicks on " unlocking " button.Finally, electronic lock 10 is by the close of user input Code the only effective first password corresponding with current time is compared, if both are consistent, performs unlocking action, otherwise, Refusal performs unlocking action.
It should be noted that, the user interface 11 on electronic lock 10 includes touch-screen or physical button mode etc., does not make herein Limit.In addition, the mode of the above-mentioned reception of electronic lock 11 unlocking cipher is not limited to the user interface by being set on electronic lock 10 11.For example, by the modes such as NFC (Near Field Communication, wireless near field communication), infrared, bluetooth from The terminal device 10 that family is used receives unlocking cipher.
Fig. 2 is the flow chart of the method for unlocking in the exemplary embodiment of the application one.With reference to shown in Fig. 1 and Fig. 2, the application In embodiment, the executive agent of the method for unlocking can be electronic lock 10, and this method is realized by step 101~103, wherein:
In a step 101, the current time factor that the key and the electronic lock 10 electronic lock 10 stored is determined as The input value for the predetermined encryption algorithm that the electronic lock 10 is stored is calculated, and obtains first password.
The embodiment of the present application can be calculated using TOTP (Time-based One-time Password) algorithm and obtain the One password.
Application embodiment in, electronic lock 10 can be obtained according to the clock module built in electronic lock 10 current time because Son.Wherein, the current time factor can include:For characterizing the first input value T at current time, and/or for characterizing Second input value X of time step.The first password that above-mentioned time step may be used to determine generation has within some period Effect, the time step can be set according to actual needs, such as:60 seconds.Wherein, in one embodiment, can according to work as At the preceding moment, corresponding unix timestamps are determined, and the unix timestamps are defined as above-mentioned first input value T.Citing and Say, if current time is:2017-3-23,12:00:00, then above-mentioned first input value T can be:“1490241600”.Certainly According to algorithm needs, corresponding numerical value of above-mentioned current time can be subjected to system conversion (such as the decimal system turns binary system);If The time step set is 60 second, then the second input value X is:60, represent at current time:2017-3-23,12:00:00 generation First password 12:00:00~12:01:In 00 effectively.
Certainly, because the process of user input password needs to expend certain duration, it is understood that there may be above-mentioned time step is too Short and cause user to have little time to complete input action in the time step, causing to unlock fails.In consideration of it, can in the application In row embodiment, the first password that can set generation is effective in the longer time, for example:5 minutes.Wherein, at 5 minutes Interior, electronic lock can generate multiple first passwords.For example, time step is 60 seconds, then 5 different first can be generated close Code.In this 5 minutes, if electronic lock receives the password (to be verified) of user input, need to verify that inputted password is Any one no for more than in 5 first passwords, if so, then performing unlocking action;Otherwise, refusal performs unlocking action.
The current time factor is determined because electronic lock is the clock module built in dependence, so the accuracy of clock module It is the key for obtaining the accurate current time factor.In the embodiment of the application one, in order to ensure the accuracy of clock module, Periodically or non-periodically the clock module can be proofreaded or updated by networking mode (such as by WI-FI), so that So that time and the network time synchronization of clock module.Wherein, the process of synchronised clock module can be operated to trigger by user, It can also be networked and triggered automatically by the electronic lock by the update cycle of setting, the application is not construed as limiting.Certainly, if electric The better performances of the built-in clock module of son lock in itself, it is sufficient to ensure that the higher reality of precision can be got in longer period When the time, then also can not for the electronic lock set networking refresh clock function.
In an embodiment is applied for, the predetermined encryption algorithm can be:HMAC(Hash-based Message Authentication Code, hash message authentication code) algorithm, HMAC-SHA-1 algorithms, HMAC-MD5 algorithms etc..Wherein, with Exemplified by HMAC-SHA-1 algorithms, if the key for defining electronic lock storage is K, the formula for calculating first password is as follows:
TOTP (K, T, X)=Truncate (HMAC-SHA-1 (K, T/X)).
In a step 102, the unlocking instruction for including the second password is received.Wherein, second password is by electronic equipment The predetermined encryption algorithm that the current time factor that the key of acquisition and the electronic equipment are determined is obtained as the electronic equipment Input value calculate and obtain, key and the key agreement of electronic lock storage that the electronic equipment is obtained, the electronics The predetermined encryption algorithm that equipment is obtained is consistent with the predetermined encryption algorithm that the electronic lock is stored.
Wherein, the electronic equipment described in step 102 can be:In terminal device 20 or server 30 that user uses It is one or more.In a kind of scene, the manufacturer of electronic lock 10 will be 10 points of the electronic lock after the electronic lock 10 is produced With a unique key and a kind of preset password algorithm to calculate dynamic password of definition.Wherein, it is above-mentioned unique close Key and preset password algorithm can also be provided to above-mentioned server 30 and be stored.So, server 30 also can according to it is current when Between the factor and the key that prestores, calculating the second password in real time using above-mentioned preset password algorithm (is used to be locked into electronics Row is unlocked), and be sent to obtained the second password is calculated on terminal device 20.It should be noted that obtaining key, being worked as Preceding time factor, the step of obtain preset password algorithm and carry out computing can by one of server 30 or terminal device 20 or Both are completed, and the application is not construed as limiting to this.
In the embodiment of the present application, the step of electronic equipment (server 30 or terminal device 20) obtains key can be with Specifically:
Electronic equipment reads the key being pre-stored within electronic equipment;Or,
Electronic equipment is searched and the corresponding key of the mark according to the mark of the electronic lock;Wherein, the electronics is set The standby corresponding relation for being above previously stored with mark and key.
Generally, due to which the password that hash algorithm calculating is obtained can be long, provided if will directly calculate obtained multidigit Inputted to user, then it is obviously cumbersome and easily input by mistake.Therefore, in the application optional embodiment, above-mentioned steps 101 can specifically include:
Step 1011:The current time factor that the key that electronic lock is stored and the electronic lock are determined is used as the electronics The input value of the predetermined encryption algorithm of storage is latched, the first output valve is calculated.
Step 1012:According to preset rules first password is intercepted from first output valve.
The preset rules are, for example,:Last 6 bit digital of the first output valve is intercepted as first password, or interception first Most preceding 6 bit digitals of output valve are used as first password etc..Wherein, the digit of the first password intercepted is not restricted, mainly It is to facilitate user quickly to input, and also assures possess certain security.
Correspondingly, second password is the current time that the key and the electronic equipment for obtaining electronic equipment are determined The input value for the predetermined encryption algorithm that the factor is obtained as the electronic equipment, after calculating obtains the second output valve, according to institute State preset rules and intercept what is obtained from second output valve.
In step 103, if the first password is consistent with second password, the unlocking for performing the electronic lock 10 is moved Make.
It is noted that user can register an ID and set on server 30 before using above-mentioned APP A fixed corresponding login password, also, the electronic lock ID that required control is unlocked is inputted upon registration, so could be by electricity The corresponding keys of son lock ID and preset password algorithm are supplied to server 30 to be stored.Wherein, in order to verify that user possesses control The authority of electronic lock processed, can be with user during electronic lock ID is inputted, it is desirable to the product serial that user input producer provides Number etc. information.After setting is completed, user just can be logged in by ID and login password, and be asked after the login Obtain the second password and attempt to unlock.For other do not possess the user of authority, the second password can not be obtained.
In the embodiment of the present application, because the first password (correct unlocking cipher) of electronic lock 10 is that the factor is not over time Disconnected change, within a period of time effectively, compared to fixed password, its security is higher.In addition, during unlocking, it is necessary to It is close that electronic equipment (server 30 or terminal device 20) calculates second by identical key, time factor and identical algorithm Yard, hereafter user utilizes second password to carry out unlocking checking, when the first password is consistent with second password, performs The unlocking action of the electronic lock 10.It can be seen that, during unlocking, electronic lock 10 need not simultaneously network, real under offline mode It is existing, while security is improved, it can also reduce the cost of electronic lock 10;In addition, the dynamic password generated under offline mode It is not easy to be stolen by others, further lifts security.
Fig. 3 is a kind of block diagram for unlocking apparatus 200 that the exemplary embodiment of the application one is provided.In hardware view, the dress Putting can be applied on electronic lock 10, and the electronic lock 10 can include processor (such as MCU) and memory, also may be used certainly With including parts necessary to some electronic locks (such as lock core, lock control unit).Processor is from nonvolatile memory Corresponding computer program is read into internal memory and then is run, the device shown in above-mentioned Fig. 3 is formed on logic level.Certainly, In addition to software realization mode, the application is not precluded from other implementations, such as logical device or software and hardware combining Mode etc., that is to say, that the executive agent of following handling process be not limited to each logic unit or hardware or Logical device.Logic is realized based on above method, the unlocking apparatus 200 includes:
Dynamic password obtaining unit 201, the current time determined for the key for storing electronic lock and the electronic lock The input value for the predetermined encryption algorithm that the factor is stored as the electronic lock is calculated, and obtains first password;
Unlocking instruction receiving unit 202, for receiving the unlocking instruction for including the second password, second password is by electricity The current time factor that the key and the electronic equipment that sub- equipment is obtained are determined default adds as what the electronic equipment was obtained The input value of close algorithm calculates what is obtained, key and the key agreement of electronic lock storage that the electronic equipment is obtained, institute The predetermined encryption algorithm for stating electronic equipment acquisition is consistent with the predetermined encryption algorithm that the electronic lock is stored;
Control unit 203, for when the first password is consistent with second password, performing opening for the electronic lock Lock is acted.
In the embodiment of the application one, the current time factor can include:The first input for characterizing current time Value, and/or the second input value for characterizing time step.
In the embodiment of the application one, the dynamic password obtaining unit 202 can include:
Computation subunit, the current time factor determined for the key for storing electronic lock and the electronic lock is used as institute The input value of the predetermined encryption algorithm of electronic lock storage is stated, the first output valve is calculated;
Subelement is intercepted, for intercepting first password from first output valve according to preset rules;
Wherein, second password be the current time that determines of the key that obtains electronic equipment and the electronic equipment because The input value for the predetermined encryption algorithm that son is obtained as the electronic equipment, after calculating obtains the second output valve, according to described Preset rules intercept what is obtained from second output valve.
It should be noted that, said apparatus embodiment and above method embodiment, can be each other on the premise of not disagreing Supplement.
System, device, module or unit that above-described embodiment is illustrated, can specifically be realized by computer chip or entity, Or realized by the product with certain function.A kind of typically to realize that equipment is computer, the concrete form of computer can To be personal computer, laptop computer, cell phone, camera phone, smart phone, personal digital assistant, media play In device, navigation equipment, E-mail receiver/send equipment, game console, tablet PC, wearable device or these equipment The combination of any several equipment.
For convenience of description, it is divided into various units during description apparatus above with function to describe respectively.Certainly, this is being implemented The function of each unit can be realized in same or multiple softwares and/or hardware during application.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program Product.Therefore, the present invention can be using the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.Moreover, the present invention can be used in one or more computers for wherein including computer usable program code The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product Figure and/or block diagram are described.It should be understood that every one stream in flow chart and/or block diagram can be realized by computer program instructions Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided The processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which is produced, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that in meter Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, thus in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net Network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM).Internal memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology realizes information Store.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moved State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus Or any other non-transmission medium, the information that can be accessed by a computing device available for storage.Define, calculate according to herein Machine computer-readable recording medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, term " comprising ", "comprising" or its any other variant are intended to nonexcludability Comprising so that process, method, commodity or equipment including a series of key elements are not only including those key elements, but also wrap Include other key elements being not expressly set out, or also include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that wanted including described Also there is other identical element in process, method, commodity or the equipment of element.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer program product. Therefore, the application can be using the embodiment in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Form.Deposited moreover, the application can use to can use in one or more computers for wherein including computer usable program code The shape for the computer program product that storage media is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
The application can be described in the general context of computer executable instructions, such as program Module.Usually, program module includes execution particular task or the routine for realizing particular abstract data type, program, object, group Part, data structure etc..The application can also be put into practice in a distributed computing environment, in these DCEs, by Remote processing devices connected by communication network perform task.In a distributed computing environment, program module can be with Positioned at including in the local and remote computer-readable storage medium including storage device.
Each embodiment in this specification is described by the way of progressive, identical similar portion between each embodiment Divide mutually referring to what each embodiment was stressed is the difference with other embodiment.It is real especially for system Apply for example, because it is substantially similar to embodiment of the method, so description is fairly simple, related part is referring to embodiment of the method Part explanation.
Embodiments herein is the foregoing is only, the application is not limited to.For those skilled in the art For, the application can have various modifications and variations.It is all any modifications made within spirit herein and principle, equivalent Replace, improve etc., it should be included within the scope of claims hereof.

Claims (10)

1. a kind of method for unlocking, it is characterised in that methods described includes:
The current time factor that the key that electronic lock is stored and the electronic lock are determined is used as presetting that the electronic lock is stored The input value of AES is calculated, and obtains first password;
The unlocking instruction for including the second password is received, second password is that the key and the electronics for obtaining electronic equipment are set The input value for the predetermined encryption algorithm that the standby current time factor determined is obtained as the electronic equipment calculates what is obtained, described Key and the key agreement of electronic lock storage that electronic equipment is obtained, predetermined encryption algorithm that the electronic equipment is obtained and The predetermined encryption algorithm of the electronic lock storage is consistent;
If the first password is consistent with second password, the unlocking action of the electronic lock is performed.
2. according to the method described in claim 1, it is characterised in that the current time factor includes:During for characterizing current The first input value carved, and/or the second input value for characterizing time step.
3. according to the method described in claim 1, it is characterised in that the key for storing electronic lock and the electronic lock are true The input value for the predetermined encryption algorithm that the fixed current time factor is stored as the electronic lock is calculated, and obtains first close Code, including:
The current time factor that the key that electronic lock is stored and the electronic lock are determined is used as presetting that the electronic lock is stored The input value of AES, calculates the first output valve;
According to preset rules first password is intercepted from first output valve;
Second password is that the current time factor that the key and the electronic equipment for obtaining electronic equipment are determined is used as institute The input value of the predetermined encryption algorithm of electronic equipment acquisition is stated, after calculating obtains the second output valve, according to the preset rules Interception is obtained from second output valve.
4. according to the method described in claim 1, it is characterised in that the electronic equipment obtains key, including:
The electronic equipment reads the key being pre-stored within the electronic equipment;Or,
The electronic equipment is searched and the corresponding key of the mark according to the mark of the electronic lock;Wherein, the electronics is set The standby corresponding relation for being above previously stored with mark and key.
5. according to the method described in claim 1, it is characterised in that the predetermined encryption algorithm includes:Hmac algorithm.
6. a kind of unlocking apparatus, it is characterised in that described device includes:
Dynamic password obtaining unit, the current time factor determined for the key for storing electronic lock and the electronic lock as The input value of the predetermined encryption algorithm of the electronic lock storage is calculated, and obtains first password;
Unlocking instruction receiving unit, for receiving the unlocking instruction for including the second password, second password is by electronic equipment The predetermined encryption algorithm that the current time factor that the key of acquisition and the electronic equipment are determined is obtained as the electronic equipment Input value calculate and obtain, key and the key agreement of electronic lock storage that the electronic equipment is obtained, the electronics The predetermined encryption algorithm that equipment is obtained is consistent with the predetermined encryption algorithm that the electronic lock is stored;
Control unit, for when the first password is consistent with second password, performing the unlocking action of the electronic lock.
7. device according to claim 6, it is characterised in that the current time factor includes:During for characterizing current The first input value carved, and/or the second input value for characterizing time step.
8. device according to claim 6, it is characterised in that the dynamic password obtaining unit includes:
Computation subunit, the current time factor determined for the key for storing electronic lock and the electronic lock is used as the electricity Son latches the input value of the predetermined encryption algorithm of storage, calculates the first output valve;
Subelement is intercepted, for intercepting first password from first output valve according to preset rules;
Wherein, second password is that the current time factor that the key and the electronic equipment for obtaining electronic equipment are determined is made The input value of the predetermined encryption algorithm obtained for the electronic equipment, after calculating obtains the second output valve, according to described default Rule interception from second output valve is obtained.
9. a kind of electronic lock, including memory, processor and it is stored in the computer journey that can be run on memory and by processor Sequence, it is characterised in that the processor realizes following steps when performing the computer program:
The current time factor that the key that electronic lock is stored and the electronic lock are determined is used as presetting that the electronic lock is stored The input value of AES is calculated, and obtains first password;
The unlocking instruction for including the second password is received, second password is that the key and the electronics for obtaining electronic equipment are set The input value for the predetermined encryption algorithm that the standby current time factor determined is obtained as the electronic equipment calculates what is obtained, described Key and the key agreement of electronic lock storage that electronic equipment is obtained, predetermined encryption algorithm that the electronic equipment is obtained and The predetermined encryption algorithm of the electronic lock storage is consistent;
When the first password is consistent with second password, the unlocking action of the electronic lock is performed.
10. electronic lock according to claim 9, it is characterised in that the current time factor includes:It is current for characterizing First input value at moment, and/or the second input value for characterizing time step.
CN201710234522.1A 2017-04-11 2017-04-11 Method for unlocking and device, electronic lock Pending CN106952378A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710234522.1A CN106952378A (en) 2017-04-11 2017-04-11 Method for unlocking and device, electronic lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710234522.1A CN106952378A (en) 2017-04-11 2017-04-11 Method for unlocking and device, electronic lock

Publications (1)

Publication Number Publication Date
CN106952378A true CN106952378A (en) 2017-07-14

Family

ID=59475726

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710234522.1A Pending CN106952378A (en) 2017-04-11 2017-04-11 Method for unlocking and device, electronic lock

Country Status (1)

Country Link
CN (1) CN106952378A (en)

Cited By (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107272503A (en) * 2017-07-27 2017-10-20 重庆科技学院 The unlocking prevention card management method of transformer station five
CN107516360A (en) * 2017-07-28 2017-12-26 江苏邦融微电子有限公司 A kind of spoonful one close intelligent fingerprint lock cipher implementation method
CN107633588A (en) * 2017-10-24 2018-01-26 北京金储自动化技术有限公司 Control method, system, lockset, electronic equipment and readable storage medium storing program for executing
CN107657692A (en) * 2017-09-12 2018-02-02 佛山君兰智能科技有限公司 A kind of temporary password generates system and method
CN107689097A (en) * 2017-08-29 2018-02-13 重庆壹元电科技有限公司 Synchronizing Passwords generation and checking system and its application based on frequency hopping
CN107818622A (en) * 2017-12-13 2018-03-20 美的集团股份有限公司 Offline verification method and system
CN107833317A (en) * 2017-10-20 2018-03-23 珠海华发新科技投资控股有限公司 Control of bluetooth access control system and method
CN108122118A (en) * 2017-12-29 2018-06-05 中国印钞造币总公司 Dynamic password providing method and device, article anti-counterfeit methods, devices and systems
CN108447149A (en) * 2018-02-05 2018-08-24 西安太极航空科技有限公司 A kind of unlocking method and device in shared house
CN108711209A (en) * 2018-07-19 2018-10-26 江苏恒宝智能系统技术有限公司 dynamic password generation and verification method and system
CN108986278A (en) * 2018-07-13 2018-12-11 深圳市欧瑞博科技有限公司 A kind of intelligent door lock off-line cipher authorization method and authoring system
CN109035499A (en) * 2018-06-30 2018-12-18 恒宝股份有限公司 A kind of electronic password lock authentication method based on dynamic password
CN109087418A (en) * 2018-07-23 2018-12-25 江苏恒宝智能系统技术有限公司 A kind of intelligent unlocking method and system
CN109147103A (en) * 2018-06-29 2019-01-04 江苏恒宝智能系统技术有限公司 dynamic password intelligent unlocking system and method
CN109285288A (en) * 2018-07-25 2019-01-29 顺丰科技有限公司 A kind of passive intelligent cabinet
CN109389716A (en) * 2018-09-21 2019-02-26 深圳市二八智能家居有限公司 Realize the method and device that safety long-distance is unlocked
CN109840975A (en) * 2019-01-29 2019-06-04 武汉天喻聚联网络有限公司 Remote authorization unlocking system and method without networking
CN110022205A (en) * 2019-04-16 2019-07-16 宁波久婵物联科技有限公司 A kind of multifunctional off-line method of password authentication of electronic lock
CN110163995A (en) * 2018-02-12 2019-08-23 天扬精密科技股份有限公司 Remote control electric lock system and its encipher-decipher method
CN110349303A (en) * 2019-06-12 2019-10-18 深圳市宝富来智能技术有限公司 Smart lock controls method, apparatus, smart lock and storage medium
CN110443915A (en) * 2019-06-24 2019-11-12 深圳绿米联创科技有限公司 Control method for door lock, control device, door lock and storage medium
CN110460437A (en) * 2019-07-30 2019-11-15 联永智能科技(上海)有限公司 Method of password authentication, device, equipment and storage medium
CN110535968A (en) * 2019-09-07 2019-12-03 长沙北之辰智能技术有限公司 A kind of cabinet door access control system and method based on dynamic password
CN110570564A (en) * 2019-09-05 2019-12-13 安恒世通(北京)网络科技有限公司 single-machine lock and control method thereof
CN110599649A (en) * 2019-09-09 2019-12-20 安恒世通(北京)网络科技有限公司 Manageable single-machine lock and implementation method thereof, and distributed single-machine lock management system
CN110895839A (en) * 2018-09-13 2020-03-20 杭州涂鸦信息技术有限公司 Intelligent door lock unlocking method and device in network-free state
CN110910544A (en) * 2019-12-17 2020-03-24 深圳市深华方科技有限公司 Dynamic password door opening method and door lock
CN111340987A (en) * 2020-03-02 2020-06-26 深圳晒尔科技有限公司 Internet of things door lock communication method, device and system and computer storage medium
CN112184952A (en) * 2019-06-17 2021-01-05 中国电信股份有限公司 Intelligent lock control system, method and storage medium
CN112419549A (en) * 2020-11-04 2021-02-26 深圳Tcl新技术有限公司 Control method of intelligent door lock, intelligent door lock and storage medium
CN112734993A (en) * 2020-12-29 2021-04-30 宁波友好智能安防科技有限公司 Communication system and method of anti-theft lock
CN113129478A (en) * 2019-12-30 2021-07-16 深圳Tcl新技术有限公司 Control method and system of intelligent door lock
CN113223210A (en) * 2020-01-21 2021-08-06 深圳市云海物联科技有限公司 Offline control method and device for electronic lock and terminal equipment
CN113538752A (en) * 2021-07-20 2021-10-22 慧管(上海)信息科技有限公司 Offline dynamic two-dimensional code verification method for access control terminal equipment
CN113554793A (en) * 2021-07-29 2021-10-26 西交利物浦大学 Temporary access method, equipment, storage medium and system of intelligent access control system
CN113715670A (en) * 2021-09-18 2021-11-30 慧管(上海)信息科技有限公司 Charging method of storage battery car charging pile equipment
CN114220199A (en) * 2021-12-15 2022-03-22 广东好太太智能家居有限公司 Unlocking method, intelligent lock and intelligent lock system
CN114333115A (en) * 2021-12-29 2022-04-12 广州商景网络科技有限公司 Unlocking method and device based on dynamic password, electronic lock device and control system
CN114694279A (en) * 2020-12-28 2022-07-01 深圳Tcl新技术有限公司 Method for acquiring offline password, computer readable storage medium and terminal device
CN114882619A (en) * 2022-04-02 2022-08-09 吴雪松 Off-line password generation and verification method and off-line password lock
CN115147960A (en) * 2022-05-18 2022-10-04 阿里云计算有限公司 Electronic lock processing method and device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101593380A (en) * 2008-05-28 2009-12-02 北京飞天诚信科技有限公司 A kind of gate control system and authentication method that generates and verify based on dynamic password
CN102843236A (en) * 2012-09-12 2012-12-26 飞天诚信科技股份有限公司 Generation and authentication method and system for dynamic password
CN103530924A (en) * 2013-10-25 2014-01-22 北京金储自动化技术有限公司 Dynamic password lock system and method for self-help network management
CN103905195A (en) * 2012-12-28 2014-07-02 中国电信股份有限公司 User card authentication method and system based on dynamic password
CN204833402U (en) * 2015-07-21 2015-12-02 杭州晟元数据安全技术股份有限公司 Two -dimensional code developments trick lock
CN105184931A (en) * 2015-09-30 2015-12-23 上海艾迅士建筑科技有限公司 Bluetooth-based unlocking method, system and hand-held terminal and Bluetooth-based electronic lock
CN105696870A (en) * 2016-03-27 2016-06-22 华北理工大学 Dynamic coded lock applying Bluetooth technology
CN106340104A (en) * 2016-08-31 2017-01-18 谢志豪 Coded lock and control system and method of coded lock

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101593380A (en) * 2008-05-28 2009-12-02 北京飞天诚信科技有限公司 A kind of gate control system and authentication method that generates and verify based on dynamic password
CN102843236A (en) * 2012-09-12 2012-12-26 飞天诚信科技股份有限公司 Generation and authentication method and system for dynamic password
CN103905195A (en) * 2012-12-28 2014-07-02 中国电信股份有限公司 User card authentication method and system based on dynamic password
CN103530924A (en) * 2013-10-25 2014-01-22 北京金储自动化技术有限公司 Dynamic password lock system and method for self-help network management
CN204833402U (en) * 2015-07-21 2015-12-02 杭州晟元数据安全技术股份有限公司 Two -dimensional code developments trick lock
CN105184931A (en) * 2015-09-30 2015-12-23 上海艾迅士建筑科技有限公司 Bluetooth-based unlocking method, system and hand-held terminal and Bluetooth-based electronic lock
CN105696870A (en) * 2016-03-27 2016-06-22 华北理工大学 Dynamic coded lock applying Bluetooth technology
CN106340104A (en) * 2016-08-31 2017-01-18 谢志豪 Coded lock and control system and method of coded lock

Cited By (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107272503B (en) * 2017-07-27 2020-06-12 重庆科技学院 Five-prevention unlocking card management method for transformer substation
CN107272503A (en) * 2017-07-27 2017-10-20 重庆科技学院 The unlocking prevention card management method of transformer station five
CN107516360A (en) * 2017-07-28 2017-12-26 江苏邦融微电子有限公司 A kind of spoonful one close intelligent fingerprint lock cipher implementation method
CN107689097B (en) * 2017-08-29 2018-08-07 重庆壹元电科技有限公司 Synchronizing Passwords based on frequency hopping generate and verify system and its application
CN107689097A (en) * 2017-08-29 2018-02-13 重庆壹元电科技有限公司 Synchronizing Passwords generation and checking system and its application based on frequency hopping
CN107657692A (en) * 2017-09-12 2018-02-02 佛山君兰智能科技有限公司 A kind of temporary password generates system and method
CN107833317A (en) * 2017-10-20 2018-03-23 珠海华发新科技投资控股有限公司 Control of bluetooth access control system and method
CN107633588A (en) * 2017-10-24 2018-01-26 北京金储自动化技术有限公司 Control method, system, lockset, electronic equipment and readable storage medium storing program for executing
CN107818622A (en) * 2017-12-13 2018-03-20 美的集团股份有限公司 Offline verification method and system
CN108122118A (en) * 2017-12-29 2018-06-05 中国印钞造币总公司 Dynamic password providing method and device, article anti-counterfeit methods, devices and systems
CN108447149A (en) * 2018-02-05 2018-08-24 西安太极航空科技有限公司 A kind of unlocking method and device in shared house
CN110163995A (en) * 2018-02-12 2019-08-23 天扬精密科技股份有限公司 Remote control electric lock system and its encipher-decipher method
CN110163995B (en) * 2018-02-12 2021-04-30 天扬精密科技股份有限公司 Remote control electronic lock system
CN109147103A (en) * 2018-06-29 2019-01-04 江苏恒宝智能系统技术有限公司 dynamic password intelligent unlocking system and method
CN109035499A (en) * 2018-06-30 2018-12-18 恒宝股份有限公司 A kind of electronic password lock authentication method based on dynamic password
CN108986278A (en) * 2018-07-13 2018-12-11 深圳市欧瑞博科技有限公司 A kind of intelligent door lock off-line cipher authorization method and authoring system
CN108711209A (en) * 2018-07-19 2018-10-26 江苏恒宝智能系统技术有限公司 dynamic password generation and verification method and system
CN109087418A (en) * 2018-07-23 2018-12-25 江苏恒宝智能系统技术有限公司 A kind of intelligent unlocking method and system
CN109285288A (en) * 2018-07-25 2019-01-29 顺丰科技有限公司 A kind of passive intelligent cabinet
CN110895839A (en) * 2018-09-13 2020-03-20 杭州涂鸦信息技术有限公司 Intelligent door lock unlocking method and device in network-free state
CN109389716A (en) * 2018-09-21 2019-02-26 深圳市二八智能家居有限公司 Realize the method and device that safety long-distance is unlocked
CN109840975A (en) * 2019-01-29 2019-06-04 武汉天喻聚联网络有限公司 Remote authorization unlocking system and method without networking
CN110022205A (en) * 2019-04-16 2019-07-16 宁波久婵物联科技有限公司 A kind of multifunctional off-line method of password authentication of electronic lock
CN110349303A (en) * 2019-06-12 2019-10-18 深圳市宝富来智能技术有限公司 Smart lock controls method, apparatus, smart lock and storage medium
CN112184952A (en) * 2019-06-17 2021-01-05 中国电信股份有限公司 Intelligent lock control system, method and storage medium
CN110443915A (en) * 2019-06-24 2019-11-12 深圳绿米联创科技有限公司 Control method for door lock, control device, door lock and storage medium
CN110460437A (en) * 2019-07-30 2019-11-15 联永智能科技(上海)有限公司 Method of password authentication, device, equipment and storage medium
CN110570564A (en) * 2019-09-05 2019-12-13 安恒世通(北京)网络科技有限公司 single-machine lock and control method thereof
CN110535968A (en) * 2019-09-07 2019-12-03 长沙北之辰智能技术有限公司 A kind of cabinet door access control system and method based on dynamic password
CN110535968B (en) * 2019-09-07 2023-04-07 长沙北之辰智能技术有限公司 Cabinet access control system and method based on dynamic password
CN110599649A (en) * 2019-09-09 2019-12-20 安恒世通(北京)网络科技有限公司 Manageable single-machine lock and implementation method thereof, and distributed single-machine lock management system
CN110910544A (en) * 2019-12-17 2020-03-24 深圳市深华方科技有限公司 Dynamic password door opening method and door lock
CN113129478A (en) * 2019-12-30 2021-07-16 深圳Tcl新技术有限公司 Control method and system of intelligent door lock
CN113223210A (en) * 2020-01-21 2021-08-06 深圳市云海物联科技有限公司 Offline control method and device for electronic lock and terminal equipment
CN111340987A (en) * 2020-03-02 2020-06-26 深圳晒尔科技有限公司 Internet of things door lock communication method, device and system and computer storage medium
CN112419549A (en) * 2020-11-04 2021-02-26 深圳Tcl新技术有限公司 Control method of intelligent door lock, intelligent door lock and storage medium
CN114694279A (en) * 2020-12-28 2022-07-01 深圳Tcl新技术有限公司 Method for acquiring offline password, computer readable storage medium and terminal device
CN112734993A (en) * 2020-12-29 2021-04-30 宁波友好智能安防科技有限公司 Communication system and method of anti-theft lock
CN113538752A (en) * 2021-07-20 2021-10-22 慧管(上海)信息科技有限公司 Offline dynamic two-dimensional code verification method for access control terminal equipment
CN113554793A (en) * 2021-07-29 2021-10-26 西交利物浦大学 Temporary access method, equipment, storage medium and system of intelligent access control system
CN113715670A (en) * 2021-09-18 2021-11-30 慧管(上海)信息科技有限公司 Charging method of storage battery car charging pile equipment
CN114220199A (en) * 2021-12-15 2022-03-22 广东好太太智能家居有限公司 Unlocking method, intelligent lock and intelligent lock system
CN114333115A (en) * 2021-12-29 2022-04-12 广州商景网络科技有限公司 Unlocking method and device based on dynamic password, electronic lock device and control system
CN114882619A (en) * 2022-04-02 2022-08-09 吴雪松 Off-line password generation and verification method and off-line password lock
CN115147960A (en) * 2022-05-18 2022-10-04 阿里云计算有限公司 Electronic lock processing method and device

Similar Documents

Publication Publication Date Title
CN106952378A (en) Method for unlocking and device, electronic lock
US11003802B2 (en) NUTS: eNcrypted userdata transit and storage
US10992651B2 (en) Streaming authentication using chained identifiers
AU2013101034A4 (en) Registration and authentication of computing devices using a digital skeleton key
US9467293B1 (en) Generating authentication codes associated with devices
US20200177375A1 (en) Method and devices for verifying authorization of an electronic device
KR20210121307A (en) System for accessing data from multiple devices
CN104168360B (en) The unlocking method and device of a kind of mobile terminal
US11381395B2 (en) System and methods for encryption based on environmental factors
CN105225314A (en) A kind of dynamic two-dimension code door control system based on pseudo-random sequence
CN104868998B (en) A kind of system, apparatus and method that encryption data is supplied to electronic equipment
KR20180119201A (en) Electronic device for authentication system
CN113282944B (en) Intelligent lock unlocking method and device, electronic equipment and storage medium
US10057240B2 (en) Single sign-on to web applications from mobile devices
KR20200123029A (en) Method for using service with one time id based on pki, and user terminal using the same
CN114741704A (en) Privacy protection method, device, equipment and medium based on marriage and love dating
EP3304737B1 (en) Method for generating a value inherent to an electronic circuit, electronic circuit generating this value and method for using such a value
CN104103107A (en) Time-varying password and time-varying password lock
TWI621029B (en) Personal identity authentication method and system using graphic lock
EP3644142A1 (en) Constrained operation of a field device
CN107920097B (en) Unlocking method and device
CN111199596A (en) Intelligent door lock control method, device and system
KR20200116233A (en) Artificial intelligence technical information data security system applying case based reasoning technology and block chain method and server thereof
CN113345139A (en) Unlocking method, intelligent lock cylinder and intelligent lock system
IL293412A (en) Encrypted userdata transit and storage

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170714