CN107146307A - A kind of method of securely unlocking of intelligent lock system - Google Patents

A kind of method of securely unlocking of intelligent lock system Download PDF

Info

Publication number
CN107146307A
CN107146307A CN201710305357.4A CN201710305357A CN107146307A CN 107146307 A CN107146307 A CN 107146307A CN 201710305357 A CN201710305357 A CN 201710305357A CN 107146307 A CN107146307 A CN 107146307A
Authority
CN
China
Prior art keywords
lock
mobile phone
password
unlocking
middle control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710305357.4A
Other languages
Chinese (zh)
Other versions
CN107146307B (en
Inventor
吕建忠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan Chuan Tong Electronic Science And Technology Co Ltd
Original Assignee
Henan Chuan Tong Electronic Science And Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan Chuan Tong Electronic Science And Technology Co Ltd filed Critical Henan Chuan Tong Electronic Science And Technology Co Ltd
Priority to CN201710305357.4A priority Critical patent/CN107146307B/en
Publication of CN107146307A publication Critical patent/CN107146307A/en
Application granted granted Critical
Publication of CN107146307B publication Critical patent/CN107146307B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72412User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72415User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Human Computer Interaction (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of method of securely unlocking of intelligent lock system, middle control mobile phone is first bound for the first time with smart lock, the smart lock identification information of middle control mobile phone storage binding smart lock, the handset identity information of mobile phone is controlled in smart lock storage binding, middle control mobile phone independently generates unlocking cipher according to the smart lock identification information of handset identity information and storage, and smart lock independently generates password in lock according to memory mobile phone identification information and the smart lock identification information of itself.When unlocking, the unlocking cipher of middle control mobile phone generation is input to password in smart lock, the lock that smart lock generates the unlocking cipher with it and carries out contrast verification, unlocking cipher is identical with password in lock, then smart lock is unlocked, if unlocking cipher is different from password in lock, continues to close smart lock.The method of securely unlocking that the present invention is provided, whole process is that actual use person initiates and used, and is not required to third-party platform participation, it is ensured that the safety and reliability of unlocking, it is ensured that the personal safety of user and property safety.

Description

A kind of method of securely unlocking of intelligent lock system
Technical field
The present invention relates to technical field of security and protection, and in particular to a kind of securely unlocking technology of intelligent lock system.
Background technology
With the development of smart home industry, the direction that smart lock has started to manage and control to high in the clouds is developed.It is existing Safe and intelligent lock system includes smart lock cloud service platform, mobile phone and unlocking APP softwares on mobile phone, installed in intelligence Intelligent lock controller inside lock, and the communication network (such as WiFi network) interconnected that communicated with Intelligent lock controller, by communicating Network insertion internet, and then networked with smart lock cloud service platform.
The method for unlocking of the smart lock of prior art is:Mobile phone is sent out by unlocking APP softwares to smart lock cloud service platform Send unlocking ask, by smart lock cloud service platform calculate temporary password and by temporary password by network be respectively transmitted to mobile phone and Corresponding Intelligent lock controller, Intelligent lock controller stores the temporary password, and mobile phone receives the temporary password, and then user should Temporary password is input to smart lock, and it is interim that the temporary password that Intelligent lock controller inputs user and Intelligent lock controller are stored Password carries out contrast verification, and when both checkings are identical, Intelligent lock controller opens smart lock, is tested if two temporary passwords are compared When card is differed, smart lock continues to close.This method unlocked by smart lock cloud service platform and network is present such as Lower potential safety hazard:
1st, information leakage.Temporary password is produced by cloud platform and by public network transmissions, from cloud platform owner in one's hands If mobile Internet, it is mainly computer internet from cloud platform to Intelligent lock controller, these public networks may be deposited In potential safety hazard, the situation that network is stolen, information is stolen occurs now and then.
2nd, it can not unlock.Because temporary password will be transferred to Intelligent lock controller by smart lock cloud service platform, it is transmitted across Cheng Zhonghui exist error of transmission, intermediate equipment failure and other reasons and cause the temporary password correctly to be connect by Intelligent lock controller Receive and store, even if user inputs correct temporary password and can not unlocked.
3rd, it is under one's control.The smart lock of all use this kind of function, all by technology provider remote control, by smart lock cloud Service platform issues temporary password, and the property safety of such user has very big potential safety hazard.Also, if smart lock cloud takes Business platform and technology provider no longer provide this service, then smart lock becomes mechanical lock, and user benefit can not be ensured.
Therefore, it is necessary to provide a kind of safer smart lock method for unlocking.
The content of the invention
The present invention solves the technical problem of provide a kind of method of securely unlocking of intelligent lock system so that based on thing Password keeps independence with network in the unlocking cipher and lock that the intelligent lock system of networking is generated in securely unlocking, will not produce The safety issue brought on public network by password in transmission unlocking cipher and lock.
In order to solve the above technical problems, the technical scheme that a kind of method of securely unlocking of intelligent lock system of the present invention is used It is:The intelligent lock system includes smart lock and middle control mobile phone, and the smart lock includes Intelligent lock controller, the method for securely unlocking bag Include following steps:
First binding, control mobile phone sets up the interconnection that communicates with the Intelligent lock controller in this, controls handset identity in this and stores The smart lock identification information of the Intelligent lock controller, the Intelligent lock controller recognizes and stored the handset identity letter that mobile phone is controlled in this Breath;
Password is generated, mobile phone is controlled in this and is unlocked using the handset identity information and the generation of the smart lock identification information of storage Password, the Intelligent lock controller utilizes password in the smart lock identification information and the handset identity information of storage generation lock;Or Person, sets unlocking cipher, and the unlocking cipher of setting is controlled by controlling mobile phone in this with the smart lock by controlling mobile phone in this The communication connection that device has been set up, is transferred in the Intelligent lock controller as password in corresponding lock;
Password authentification, during unlocking, unlocking cipher is inputted to the smart lock, the Intelligent lock controller of the smart lock inputs this Unlocking cipher with lock in password carry out contrast verification;
Unlock response, if the unlocking cipher is identical with password in the lock, the Intelligent lock controller is considered effectively to unlock close Code, then open the smart lock, if the unlocking cipher is different from password in the lock, and the Intelligent lock controller is considered that invalid unlocking is close Code, then continue to close the smart lock.
In another embodiment of the method for securely unlocking of intelligent lock system of the present invention, hand is controlled in first binding, in this It is bluetooth data communication interconnection that machine sets up the interconnection that communicates with the Intelligent lock controller.
In another embodiment of the method for securely unlocking of intelligent lock system of the present invention, the handset identity information includes middle control The mobile phone IMEI code of mobile phone, the smart lock identification information include Intelligent lock controller in Intelligent lock controller MAC Address and/ Or the UUID of bluetooth service.
, should when using when generating password in another embodiment of the method for securely unlocking of intelligent lock system of the present invention Middle control mobile phone is controlled using the handset identity information and the smart lock identification information of storage generation unlocking cipher, and the smart lock Device is using during password, generation of control mobile phone is unlocked in this in the smart lock identification information and the handset identity information of storage generation lock The process of password also includes adding the dynamic unlocking cipher of the mobile phone time information formation in control mobile phone in this, the intelligent lock control The process of password is also included adding in the lock of the Intelligent lock controller in the dynamic lock of temporal information formation in device generation lock processed Password.
In another embodiment of the method for securely unlocking of intelligent lock system of the present invention, control mobile phone and the intelligent lock control in this Device processed is set up after communication interconnection, in addition to during by controlling the mobile phone time information of mobile phone in this with the lock in the Intelligent lock controller Between information correction it is identical.
In another embodiment of the method for securely unlocking of intelligent lock system of the present invention, when in the mobile phone time information and lock Between information include year, month, day, when and point.
, should when utilizing in password authentification in another embodiment of the method for securely unlocking of intelligent lock system of the present invention When password is verified in the dynamic lock that the dynamic unlocking cipher of middle control mobile phone generation is generated with the Intelligent lock controller, by Mobile phone is controlled in this and generates dynamic unlocking cipher to password progress contrast verification in the dynamic unlocking cipher and the dynamic lock Between be provided with maximum time interval.
In another embodiment of the method for securely unlocking of intelligent lock system of the present invention, generation password and password authentification it Between, when being unlocked using the dynamic unlocking cipher that mobile phone generation is controlled in this, in addition to mobile phone being somebody's turn to do generation is controlled in this Dynamic unlocking cipher is sent to user mobile phone by short message or network data, and user is obtained using the user mobile phone and dynamically opened Lock cipher.
In another embodiment of the method for securely unlocking of intelligent lock system of the present invention, password in the unlocking cipher and the lock It is at least 6 passwords.
A kind of another embodiment of the method for securely unlocking of intelligent lock system, will control mobile phone and the smart lock is accessed in this To cloud platform, the status information one-way transmission of the smart lock to the cloud platform, the cloud platform sends out the status information of the smart lock Give and mobile phone is controlled in this, mobile phone is controlled in this smart lock is monitored according to the status information of the smart lock of reception.
The beneficial effects of the invention are as follows:Bound for the first time with smart lock by middle control mobile phone, middle control mobile phone stores smart lock Identification information, the Intelligent lock controller of smart lock stores the handset identity information of the middle control mobile phone of binding, is being ready for out During lock, middle control mobile phone independently generates unlocking cipher, intelligence according to the smart lock identification information of the handset identity information of itself and storage Can lock controller according to the handset identity information and the smart lock identification information of itself of the middle control mobile phone bound therewith of storage Password in lock is independently generated, when unlocking, the unlocking cipher of middle control mobile phone generation smart lock is input to, Intelligent lock controller will Password carries out contrast verification in the lock that the unlocking cipher is generated with it, and unlocking cipher is identical with password in lock, then smart lock is controlled Device is unlocked, if unlocking cipher is different from password in lock, continues to close smart lock.A kind of method of securely unlocking of the present invention Scheme, unlocking cipher and lock in password be all respectively by it is middle control mobile phone and Intelligent lock controller independently calculate generation, middle control hand Machine and smart lock need not all access public network and carry out generation password, it is not required that generate and issue by cloud platform and be interim close Code storage is to Intelligent lock controller and is issued on middle control mobile phone, therefore whole process is all that actual use person is initiated with using, Third-party platform and network is not needed to participate in, it is ensured that the safety and reliability of unlocking, while decreasing the cost of user. The scheme of another method of securely unlocking is to set unlocking cipher by middle control mobile phone, and is transferred to smart lock, is opened using this Lock cipher is unlocked, be also only it is middle control mobile phone and smart lock between participate in, again without by cloud platform generation and under The storage of hair temporary password is to Intelligent lock controller and is issued on middle control mobile phone, it is not necessary to which third-party platform and network are participated in, and are protected The safety and reliability unlocked is demonstrate,proved.The securely unlocking process of the present invention is no longer limited by the constraint of technology provider remote control System.The method of securely unlocking of the present invention ensure that personal safety and the property safety of user, it is ensured that the interests of user.
It is further preferred that middle control mobile phone generation unlocking cipher controls the mobile phone time information of mobile phone, intelligent lock control in adding Password adds temporal information in the lock of Intelligent lock controller in device generation lock processed, because the middle mobile phone and Intelligent lock controller controlled all is The generation of password in unlocking cipher and lock is independently carried out in the same time, ensure that unlocking cipher and password in lock are accurate Correspondence, and because in the different periods, the unlocking cipher that middle control mobile phone is produced is different, it is ensured that middle control mobile phone is produced Unlocking cipher change over time be dynamic change, further ensure the security of unlocking.
It is further preferred that temporal information in the lock of the mobile phone time information of middle control mobile phone and Intelligent lock controller is carried out Correction, makes two times identical consistent, it is ensured that the accuracy of the unlocking cipher of generation and password in lock.
It is further preferred that middle control mobile phone carries out communication interconnection with Intelligent lock controller by bluetooth data communication, it is not required to Want external network to participate in, further ensure the security of unlocking.
It is further preferred that handset identity information includes IMEI code, smart lock identification information includes the UUID of bluetooth service And/or the MAC Address of Intelligent lock controller, because above-mentioned information all has uniqueness, so ensure that the unlocking of generation is close Password is unique in code and lock.
It is further preferred that password is at least 6 passwords in unlocking cipher and lock, preferably 10 passwords are added The safety coefficient of password in unlocking cipher and lock.
It is further preferred that smart lock can also be unlocked by fingerprint typing, the securely unlocking side of smart lock can be made Method security is further enhanced, and further ensures the reliability of method for unlocking.
Brief description of the drawings
Fig. 1 is the flow chart of the method for securely unlocking embodiment of the intelligent lock system of the present invention;
Fig. 2 be the intelligent lock system of the present invention method of securely unlocking embodiment in the interconnection that communicated with smart lock of control mobile phone show It is intended to;
Fig. 3 is the composition frame chart of safety intelligent lock.
Embodiment
Embodiments of the present invention are described below in detail, the example of the embodiment is shown in the drawings, wherein from beginning Same or similar element or element with same or like function are represented to same or similar label eventually.Below by ginseng The embodiment for examining accompanying drawing description is exemplary, is only used for explaining the present invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are it is understood that the correlation module and its function of realization that are related in the present invention It is that computer software programs conventional in the prior art are carried in device, device or the system of hardware after improvement and its composition It is not that computer software programs of the prior art or relevant agreement are improved or relevant agreement is achieved that.For example, Computer hardware system after improvement still can realize the spy of the hardware system by loading existing operation system of software Determine function.It is understood, therefore, that the innovation of the present invention is the improvement to hardware module in the prior art and its company Syntagmatic is connect, rather than is only the improvement to realizing the software carried about function or agreement in hardware module.
Those skilled in the art of the present technique are it is understood that the correlation module mentioned in the present invention is performed for the application Described in one or more of hardware device in step in operation, method, flow, measure, scheme.The hardware device can Purpose needed for thinking and specially design and manufacture, or can also use known device in all-purpose computer or it is known its His hardware device.The all-purpose computer is activated or reconstructed with having the procedure selection being stored in it.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative " one " used herein, " one It is individual ", " described " and "the" may also comprise plural form.It is to be further understood that what is used in the specification of the present invention arranges Diction " comprising " refer to there is the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition Other one or more features, integer, step, operation, element, component and/or combinations thereof.It should be understood that when we claim Element is " connected " or during " coupled " to another element, and it can be directly connected or coupled to other elements, or can also deposit In intermediary element.In addition, " connection " used herein or " coupling " can include wireless connection or coupling.Wording used herein "and/or" includes one or more associated any cells for listing item and all combined.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art Language and scientific terminology) with the general understanding identical meaning with the those of ordinary skill in art of the present invention.Should also Understand, those terms defined in such as general dictionary, which should be understood that, to be had and the meaning in the context of prior art The consistent meaning of justice, and unless defined as here, will not be explained with idealization or excessively formal implication.
The embodiment to the method for securely unlocking of the intelligent lock system of the present invention is described in detail below.
As depicted in figs. 1 and 2, the embodiment of intelligent lock system method of securely unlocking of the invention, the intelligent lock system bag Smart lock 1 and middle control mobile phone 2 are included, the smart lock includes Intelligent lock controller.Here, middle control mobile phone 2 refers to carry out smart lock 1 The mobile phone of unlocking control.Method of securely unlocking comprises the following steps:
S1:First binding, before being applied to smart lock 1, the middle control mobile phone 2 that first needs are unlocked and intelligence Lock 1 is bound for the first time, the purpose bound for the first time, is sought to control mobile phone 2 in this to bind and is carried out unlocking control to the smart lock 1 The device of system., it is necessary to middle control mobile phone 2 be carried out into communication interconnection with smart lock 1, middle control mobile phone 2 is recognized and stored during first binding The smart lock identification information of smart lock 1, Intelligent lock controller recognizes and stores the handset identity letter for the middle control mobile phone 2 bound therewith Breath.
The present embodiment preferably, carries out communicating mutually between middle control mobile phone 2 and smart lock 1 using blue-teeth data connected mode Connection.Blue-teeth data connected mode need not access public network, and the equipment of only two interconnections is participated in, i.e., in middle control mobile phone Data are transmitted between 2 and smart lock 1, it is ensured that the security of data transfer.
The present embodiment generally has it is further preferred that handset identity information is primarily referred to as the identification information of interior of mobile phone Uniqueness, includes the mobile phone IMEI code of middle control mobile phone, IMEI (International Mobile Equipment Identity) Code is the abbreviation of International Mobile Equipment Identity code, " the electronics string number " being made up of 15 bit digitals, it and every cell phone one One correspondence, and every cell phone IMEI code is that the whole world is unique.Smart lock identification information is primarily referred to as inside smart lock Identification information, generally also with uniqueness, the UUID of MAC Address and/or bluetooth service comprising Intelligent lock controller.Its In, the MAC Address of Intelligent lock controller, the MAC Address is also hardware address, and length is generally 48 bits, by the number of 16 systems Word is constituted, and is divided into first 24 and latter 24.First 24 are called tissue unique identifier (Organizationally Unique Identifier, i.e. OUI), it is the code distributed by IEEE registration management mechanism to different manufacturers, has distinguished different factories Family.24 are distributed by producer oneself afterwards, referred to as extended identifier (having uniqueness).Therefore, each smart lock is controlled The MAC Address of device is all unique, and the MAC Address of the Intelligent lock controller is usual with one two when smart lock 1 dispatches from the factory The mode of dimension code is shown on smart lock 1.The UUID of bluetooth service is " Universally Unique Identifier " letter Claim, the meaning of general unique identifier.There is general, independent, unique UUID to correspond to therewith for each bluetooth service.Therefore The UUID of the bluetooth service is also unique, in same time, same place, it is impossible to have two identical UUID marks not With service.
It is above-mentioned to there are two kinds of situations during middle control mobile phone 2 is bound with smart lock 1:
The first situation is, before the smart lock 1 is bound for the first time with middle control mobile phone 2 for the first time after dispatching from the factory, the intelligence There is no any handset identity information in lock 1.The first binding method of such case is:Middle control mobile phone 2 and the Bluetooth communication of smart lock 1 After connection, the two carries out information exchange, and middle control mobile phone 2 finds do not have any handset identity information in the smart lock 1, and prompting is just It is secondary to use, the software with encryption function on mobile phone 2 by setting is controlled in this, behaviour is encrypted in the binding to the smart lock 1 Make, the method for encryption can be password encryption or encrypting fingerprint, can be to prevent other mobile phones arbitrarily tying up to the smart lock 1 It is fixed.The MAC Address for the Intelligent lock controller that middle control mobile phone 2 obtains and stores smart lock 1, while middle control mobile phone 2 is obtained and stored The UUID of this bluetooth service.The mobile phone IMEI code of control mobile phone 2 during smart lock 1 is obtained and stored, and this bluetooth service UUID.The first binding of mobile phone 2 and smart lock 1 is controlled in completion.
Second of situation is that smart lock 1 had bound other mobile phones, therefore the smart lock is in other hands that are stored with before The handset identity information of machine, when needs change the middle control hands that the unlock middle control mobile phone used or newly-increased other unlockings are used Machine, it is also desirable to bound for the middle control mobile phone or newly-increased middle control mobile phone being modified.
The first binding method of control mobile phone is in change, it would be desirable to which the middle control mobile phone 2 of binding carries out bluetooth with smart lock 1 and led to After letter connection, now, the middle control mobile phone 2 bound can point out to have had users, the middle control mobile phone 2 now bound It must could continue to bind by an encryption identification information and mobile phone 2 is controlled in this, the encryption identification information, which is input to, needs binding Middle control mobile phone 2 after, can show the information for the other mobile phones bound in the middle control mobile phone 2 bound, carry out The handset identity information that has existed of selection change in the middle control mobile phone 2 of binding, the middle control mobile phone 2 bound is by smart lock 1 In the handset identity information deletion that has existed, the middle control mobile phone 2 bound obtains and stores the Quick Response Code of smart lock 1 and wrapped The MAC Address of the Intelligent lock controller contained, while the middle control mobile phone 2 bound obtains and stores this bluetooth service UUID.Smart lock 1 reacquires and stored the mobile phone IMEI code that mobile phone 2 is controlled in this, and this time UUID of bluetooth service.Complete The first binding of the middle control mobile phone 2 being modified and smart lock 1.
The newly-increased first binding method for unlocking the middle control mobile phone used is to carry out newly-increased middle control mobile phone 2 with smart lock 1 After Bluetooth communication connection, now, newly-increased middle control mobile phone 2 can point out to have had users, and newly-increased middle control mobile phone 2 is equally Need an encryption identification information to continue binding, the encryption identification information is input to after newly-increased middle control mobile phone 2, new The information for the middle control mobile phone bound can be shown on the middle control mobile phone 2 increased, selects newly-increased in newly-increased middle control mobile phone 2, Newly-increased middle control mobile phone 2 obtains and stored the MAC Address for the Intelligent lock controller that the Quick Response Code of smart lock 1 is included, with stylish The middle control mobile phone 2 increased obtains and stores the UUID of this bluetooth service.Smart lock 1 obtains and stores newly-increased middle control mobile phone 2 Mobile phone IMEI code, and this time UUID of bluetooth service.Thus, newly-increased middle control mobile phone 2 is completed to tie up with the first of smart lock 1 It is fixed.By the first binding method of the above-mentioned newly-increased middle control mobile phone used of unlocking, controlled in can storing at least two in smart lock 1 The handset identity information of mobile phone so that smart lock 1 controls mobile phone in being controlled by least two.And each middle control mobile phone and intelligence Binding and follow-up unlocking step between lock 1 are all separate, and contact is not produced each other.
S2:Password is generated, after the binding of middle control mobile phone 2 and smart lock 1 is completed, a kind of mode of generation password is, middle control Mobile phone 2 can utilize handset identity information and the smart lock identification information of storage generation unlocking cipher, the intelligent lock control of smart lock 1 Device processed can utilize password in smart lock identification information and the handset identity information of storage generation lock.
Specifically, middle control mobile phone 2 using itself mobile phone IMEI code and above-mentioned storage Intelligent lock controller MAC The UUID of location and bluetooth service resolves generation unlocking cipher;MAC Address of the Intelligent lock controller using itself, bluetooth service The IMEI code of UUID and the mobile phone of above-mentioned storage resolves password in generation lock.Due in middle control mobile phone 2 and Intelligent lock controller Password generating algorithm be identical, the two is encrypted as key and counted using handset identity information and smart lock identification information Calculate, in the case where not considering other factors, at this time point of unlocking, password should in the unlocking cipher generated respectively and lock It is identical.Here, when generating password in unlocking cipher and lock, the MAC Address of Intelligent lock controller and bluetooth service UUID can be combined and use, you can so that the MAC Address of Intelligent lock controller or the UUID of bluetooth service is used alone, or Can also be simultaneously using the MAC Address and the UUID of bluetooth service of Intelligent lock controller.
Password can be static password in above-mentioned unlocking cipher and lock, and generating process is:
For middle control mobile phone 2, when above-mentioned middle control mobile phone 2 is bound for the first time with smart lock 1, central control mobile phone 2 When obtaining and storing the smart lock identification information of smart lock 1, using itself mobile phone IMEI code and above-mentioned storage intelligent lock control All numerals that the MAC Address of device processed and the UUID of bluetooth service these three information are included carry out a permutation and combination, or The all numerals included using above three information carry out a logical operation with a pseudo-random sequence, and such as XOR is transported Calculate, corresponding permutation and combination result or operation result are used as a static unlocking cipher.
For smart lock 1, smart lock 1 with middle control mobile phone 2 when being bound, while obtaining and controlling mobile phone in storing 2 handset identity information, immediately using the computational methods as middle control mobile phone 2, utilizes the MAC Address of itself, bluetooth service UUID and all numerals for being included of the IMEI code of mobile phone of above-mentioned storage these three information carry out a permutation and combination, or It is that all numerals included using three information carry out a logic XOR with a pseudo-random sequence, it is corresponding to be somebody's turn to do Permutation and combination result or operation result are stored in Intelligent lock controller as password in a static lock.
Password can be changeless in this static unlocking cipher and static lock, always by the middle control He of mobile phone 2 Smart lock 1 is used;Or control mobile phone 2 week about in can also using or re-start within one month and once tied up again with smart lock 1 It is fixed, regenerate password in the static lock of static unlocking cipher and matching.The process for re-starting binding is controlled according in change The first binding method of mobile phone is operated, and will not be repeated here.
In other embodiments, generation password of the invention in addition to those mentioned earlier, can also pass through middle control mobile phone 2 Fixed unlocking cipher, the unlocking cipher of such as stationary digital are set.The unlocking cipher set by middle control mobile phone 2 can be write Enter in Intelligent lock controller as password in lock.In this process, handset identity information and smart lock identification information are not involved in out The generation of password in lock cipher and lock, is intended only as the identity information that middle control mobile phone 2 and smart lock 1 are bound, middle control mobile phone 2 Obtain just to bind the smart lock 1 after smart lock identification information and the smart lock of unlocking control can be carried out to it, and smart lock 1 Obtain the mobile phone that just control mobile phone 2 in this is bound after handset identity information and controlled by its unlocking.In this manner, smart lock Lock in password can only be configured by middle control mobile phone 2 in binding procedure, and can not be entered the keyboard of itself by smart lock 1 Row sets or deleted, and thus avoid artificial malice and password in fixed lock is pre-set to smart lock.
Equally, the unlocking cipher that another is fixed, i.e. finger-print cipher can also be set by middle control mobile phone, are referred to as here For unlocking finger-print cipher, the unlocking finger-print cipher can be write and finger-print cipher in lock is used as in Intelligent lock controller.Here open Finger-print cipher is locked, fingerprint is exactly entered into middle control mobile phone 2 and is used as unlocking cipher.Equally, in this process, handset identity information The generation of finger-print cipher in unlocking finger-print cipher and lock is not involved in smart lock identification information, middle control mobile phone 2 and intelligence is intended only as 1 identity information bound can be locked.In this manner, finger-print cipher can only be existed by middle control mobile phone 2 in the lock of smart lock 1 It is configured in binding procedure, and can not be configured or delete by the Fingerprint Identification Unit of of smart lock 1 itself, that is to say, that Any setting or modification that can not be completed by the man-machine interface operation to smart lock 1 itself to its inner cipher are operated, and all must Must be operated and managed on the middle control mobile phone 2 bound.
Both modes, simplify the mode of password generation above, while also enhancing middle control mobile phone 2 to smart lock 1 Safety management function.
Password can also be dynamic password in above-mentioned unlocking cipher and lock, be using the beneficial effect of dynamic password, The unlocking cipher used during unlocking can be changed over time and dynamic is changed, and add the security of unlocking.
The dynamic password generating process is exemplified below.This be accomplished by by it is middle control mobile phone 2 mobile phone time information with Temporal information is corrected in the lock of the Intelligent lock controller of smart lock 1, to control the mobile phone time information and intelligence of mobile phone 2 in guarantee Temporal information is identical in the lock for the Intelligent lock controller that 1 can be locked.Trimming process is to have a clock inside Intelligent lock controller, If Intelligent lock controller accesses public network by modes such as WiFi, self time adjustment can be carried out.If do not accessed Public network, middle control mobile phone 2 is set up after the interconnection that communicates with the Intelligent lock controller of smart lock 1, by the mobile phone time of middle control mobile phone 2 Information is identical with temporal information correction in the lock in Intelligent lock controller.The correction can control mobile phone 2 at regular intervals by middle, Such as 2 days, one week or 15 days are corrected by Bluetooth communication.
After middle control mobile phone 2 and smart lock 1 binding is completed, middle control mobile phone 2 is using the computational methods of permutation and combination by hand These four letters of machine IMEI code, the MAC Address of the Intelligent lock controller of above-mentioned storage, the UUID of bluetooth service and mobile phone time information The included all numerals of breath carry out permutation and combination or carried out with a pseudo-random sequence after a logical operation, and generation is unlocked Password, or middle control mobile phone recognize current uncaging time respectively with Intelligent lock controller, are distinguished according to current uncaging time To mobile phone IMEI code, the MAC Address of the Intelligent lock controller of above-mentioned storage, bluetooth service UUID be combined correspondence generation open Password in lock cipher and lock.Because mobile phone time information is dynamic change, therefore the unlocking cipher of generation is also dynamic change 's.Equally, smart lock 1 utilizes password in password in the lock with middle control mobile phone 2 identical computational methods generation, the lock to be also dynamic Change.But because the time of smart lock 1 and middle control mobile phone 2 is dynamic change, the two can have certain deviation or error, Should be by the deviation or control errors in rational scope, therefore be also required to every after a period of time, to smart lock 1 and middle control hand The time of machine 2 is corrected.
Because password all passes through in the Intelligent lock controller generation lock of middle control mobile phone 2 generation unlocking cipher and smart lock 1 Identical algorithm and be complete independently, in generation unlocking cipher and lock during password, middle control mobile phone 2 and smart lock 1 Between there is no any information exchange, while also without the participation of network, it is ensured that the security of password.
In addition, password in the unlocking cipher time to time change that middle control mobile phone 2 is produced, the lock that Intelligent lock controller is produced Time to time change, it is ensured that two kinds of passwords are all changed over time and dynamic changes, and further ensure the security of unlocking;Again Secondary, if unlocking cipher is not used in cryptographic validity, the unlocking cipher will fail, and middle control mobile phone 2 needs to regenerate New unlocking cipher, it is ensured that the unlocking cipher is not in situation about being usurped by other people or equipment, is further increased out The security of lock.
Password in the further preferred ground of embodiments of the invention, unlocking cipher as needed and lock, is arranged to 6 and 6 Password more than position, preferably could be arranged to 10 passwords, by increasing capacitance it is possible to increase the safety coefficient of password.
S3:Password authentification, is input to smart lock 1, the intelligence by the above-mentioned unlocking cipher for being generated or being set by middle control mobile phone 2 Password in the unlocking cipher of input and above-mentioned lock is carried out contrast verification by the Intelligent lock controller of lock 1.
In step S3, unlocking cipher is input into the mode of smart lock 1 can use by the keyboard on smart lock 1 11 inputs.
Embodiments of the invention are it is further preferred that between step S2 and step S3, in addition to step S2-1, middle control hand The dynamic unlocking cipher of generation is sent to user mobile phone by machine 2 by short message or network data, and user is according to the user mobile phone Obtain dynamic unlocking cipher.Such as, carried out with the smart lock 1 when the cellphone subscriber that bound needs to unlock when not being, it is necessary to Password request is sent to the middle control mobile phone 2 bound, the dynamic unlocking generated by middle control mobile phone 2 according to password request Password simultaneously be sent to by way of short message need unlock user mobile phone, now user mobile phone have received dynamically unlock it is close Code, can be input to smart lock 1 by the dynamic unlocking cipher and be unlocked, and increase the convenience and peace of the entrance of casual user Quan Xing.
When producing dynamic password for adding temporal information in the password generating process in unlocking cipher and lock, middle control Mobile phone 2 is generated after dynamic unlocking cipher, and user inputs the dynamic unlocking cipher to smart lock 1, and smart lock 1 receives the dynamic Unlocking cipher while the also password in the dynamic lock of dynamic calculation smart lock 1.Obviously, middle control mobile phone 2 is generated dynamically The mobile phone time information that unlocking cipher is utilized, temporal information in the lock that password is utilized in dynamic lock is generated with smart lock 1 And differ, or temporal information will be later than the mobile phone time information that middle control mobile phone 2 is utilized in the lock that utilizes of smart lock 1.Therefore, To password in the dynamic unlocking cipher and dynamic lock should set between contrast verification generating dynamic unlocking cipher A maximum time interval is equipped with, in the time interval, the dynamic unlocking cipher and dynamic lock of generation is ensure that Interior password is identical, otherwise beyond the time interval, and two passwords can be different.The such as time interval is 3 minutes, that is to say, that raw Time into dynamic unlocking cipher can not be 3 minutes earlier than password in the dynamic lock of generation, and middle control mobile phone 2 generates dynamic in other words Unlocking cipher after, to be unlocked in 3 minutes, otherwise the dynamic unlocking cipher is timed out.Therefore, by middle control mobile phone 2 Generate dynamic unlocking cipher and generate the time interval that password in dynamic lock is provided with maximum to smart lock, the time interval is excellent Elect as 3 minutes.
It is preferred that, mobile phone time information, and lock in temporal information be accurate to year, month, day, when and point.
S4:Unlock and respond, when password is identical in lock of the unlocking cipher inputted in step S3 with Intelligent lock controller, intelligence Energy lock controller is considered effective unlocking cipher, then opens the smart lock 1, if password is not in the unlocking cipher and the lock of input Together, then Intelligent lock controller is considered invalid unlocking cipher, then continues to close the smart lock 1.
It is further preferred that in embodiments of the invention, above-mentioned middle control mobile phone 2 can also be added when generating unlocking cipher The finger print information of typing.The process of middle control mobile phone 2 generation unlocking cipher is that middle control mobile phone 2 first changes the finger print information of typing Into digital information, middle control mobile phone 2 utilizes the mobile phone IMEI code of itself, the MAC Address of the Intelligent lock controller of storage, bluetooth service UUID and the typing fingerprint digital information pass through an algorithm resolve generation unlocking cipher;The smart lock control of smart lock 1 Fingerprint in effective lock of storage is converted into digital information by device in advance, using the MAC Address of itself, the UUID of bluetooth service, is deposited The IMEI code of the mobile phone of storage and the digital information of effective fingerprint of the conversion are used to resolve with middle control mobile phone 2 identical algorithm and given birth to Password in into lock.Password adds the digital information of fingerprint in the unlocking cipher and lock, further ensures the security of unlocking. Certainly, among these can also include add mobile phone time information and lock in temporal information, generate respectively dynamic unlocking cipher and Password in lock.
The method for unlocking of the embodiment of the present invention further, can also be applied to based on cloud platform by embodiments of the invention Intelligent lock system in, i.e., in control mobile phone 2 and smart lock 1 be linked into cloud platform, but place unlike the prior art is The cloud platform does not provide unlocking service function, but uses the method for unlocking in the embodiment of the present invention.Further improvements It is, smart lock 1 can access cloud platform by WIFI, ZIGBEE, wireless module etc., and the work state information of smart lock 1 can To be sent to middle control mobile phone 2 by cloud platform, middle control mobile phone 2 is alerted according to the status information of reception.Supervised on middle control mobile phone 2 The warning information of smart lock 1 is measured, such as:Men Wei is shut, and door is prized, the low information of battery electric quantity, is further ensured that smart lock 1 Safety and reliability.
Based on above-mentioned same design, still further provides a kind of safety intelligent lock.
The safety intelligent lock generates unlocking cipher by middle control mobile phone, and the safety intelligent lock includes Intelligent lock controller and opened Keyboard.Fig. 3 is the composition frame chart of the Intelligent lock controller of the safety intelligent lock, wherein, Intelligent lock controller 31 include with The cipher key communication module 312 of CPU311 electrical connections, the handset identity information of middle control mobile phone 2 is inputted by cipher key communication module 312 To Intelligent lock controller 31, Intelligent lock controller 31 utilizes the smart lock identification information of itself and the life of the handset identity information of input Password in into lock;Smart lock identification information is input to middle control mobile phone 2, or smart lock identification letter by cipher key communication module 312 Breath scans input in Quick Response Code form by middle control mobile phone 2, and middle control mobile phone 2 utilizes handset identity information and the smart lock of input Identification information generates unlocking cipher.
Here, CPU311 is the core processor of Intelligent lock controller 31, in lock in the generation of password, unlocking cipher and lock The processes such as the checking of password are all to be handled to complete by CPU311.
Password is all that middle control mobile phone 2 is given birth to independent calculate of smart lock 1 in the safety intelligent lock of the present invention, unlocking cipher and lock Into, middle control mobile phone 2 and smart lock 1 all access network need not carry out networking again, it is not required that flat by smart lock cloud service Platform generates and issued temporary password storage to smart lock 1 and is issued on middle control mobile phone 2, therefore whole process is all actual use Person is initiated with using, it is not necessary to which third-party platform and network are participated in, it is ensured that the safety and reliability of smart lock, and then are ensured The personal safety of user and property safety, it is ensured that the interests of user.
Here, it is relevant with the first binding described in Fig. 1 and generation password, the cipher key communication mould in Intelligent lock controller 31 Block 312 is that the module for communicate and interconnecting is set up between middle control mobile phone 2 and smart lock 1, it is preferred that the cipher key communication module 312 is Bluetooth module or infrared communication module.Middle control mobile phone 2 is generally also integrated with the interfaces such as bluetooth, infrared communication, therefore, Interacting for identification information is can be carried out with the blue tooth interface of middle control mobile phone 2 using the bluetooth module of Intelligent lock controller, is realized The function of binding for the first time.In addition, Intelligent lock controller 31 is received after handset identity information by cipher key communication module 312, by hand Machine identification information is input to CPU311, by CPU311 according to the smart lock identification information of Intelligent lock controller 31 and the mobile phone of input Password in identification information generation lock.
It is preferred that, the handset identity information of middle control mobile phone includes the mobile phone IMEI code of middle control mobile phone;Smart lock identification information The bluetooth service UUID codes and/or the mac address information of Intelligent lock controller provided including the bluetooth module.
It is further preferred that middle control mobile phone 2 generation unlocking cipher also includes adding mobile phone time information, Intelligent lock controller Password also includes adding temporal information in lock in 31 generation locks.Further, since the mobile phone time information and smart lock of middle control mobile phone 2 Temporal information is two independent temporal informations in lock in 1, can there is error each other, be therefore, it can middle control mobile phone 2 The mobile phone time information of generation is input to Intelligent lock controller by cipher key communication module 312, and temporal information in the lock is entered Row correction.
It is preferred that, the above-mentioned mobile phone time information for being used to generate unlocking cipher, and for generating in lock in the lock of password Temporal information include year, month, day, when and point.
When generating password in unlocking cipher and lock, temporal information in corresponding mobile phone time information and lock is separately added into, Uncaging time be accurate to year, month, day, when and point, it is ensured that unlocking cipher change over time and dynamic change, further ensure The security of smart lock;Again, if unlocking cipher in cryptographic validity be not used, the unlocking cipher will fail, it is necessary to Regenerate new unlocking cipher, it is ensured that the unlocking cipher is not in situation about being usurped by other people or equipment, further Add the security of unlocking.
It is preferred that, password is at least 6 passwords in unlocking cipher and lock, for example, password is in unlocking cipher and lock 10 passwords.
Utilize temporal information generation in above-mentioned handset identity information, smart lock identification information and mobile phone time information and lock The method of password refers to the description generated in Fig. 1 to password in unlocking cipher and lock, and here is omitted.
It is further preferred that in figure 3, Intelligent lock controller 31 also includes the monitoring communication module electrically connected with CPU311 313, monitoring communication module 313 and the cloud platform of safety intelligent lock 31 are interconnected, and the status information of safety intelligent lock is communicated by monitoring Module 313 is transferred to the cloud platform.
It is preferred that, monitoring communication module 313 includes network communication module or ZIGBEE communication modules.Herein, network service Module is primarily referred to as having access to the communication module of public network, such as wireless WiFi communication module, wireless network card, wired network adapter Deng.ZIGBEE communication modules are also a kind of broadband wireless communications access node module, can also be real using ZIGBEE communication modules Now access the purpose of public network.
, can't be public because of safety intelligent lock is accessed after Intelligent lock controller 31 includes monitoring communication module 313 Network and influence security because above-mentioned method for unlocking not therefore and change.And further, the state letter of safety intelligent lock Breath, including unlocking, normally closure, the status information such as opening, illegal opening and/or battery electric quantity, then can pass through and monitor communication Module 313 is transferred to public network and cloud service platform, it is possible thereby to middle control mobile phone further is given by these status information feedbacks, Middle control mobile phone is monitored to the state of safety intelligent lock, it is further provided the safety of this safety intelligent lock Property.
It is further preferred that as shown in figure 3, Intelligent lock controller 31 also includes the Fingerprint Identification Unit electrically connected with CPU 314, middle control mobile phone generation unlocking cipher need to further comprise the mobile fingerprint information of middle control mobile phone scanning, Intelligent lock controller 31 Password need to further comprise that Fingerprint Identification Unit 314 receives the door lock finger print information of identification in generation lock.
Here, the information needed for centering control mobile phone generation unlocking cipher is further expanded, except including before Handset identity information, smart lock identification information, mobile phone time information, in addition to mobile fingerprint information.The mobile fingerprint information It is to be inputted by the finger scan function of middle control mobile phone.Equally, the letter in lock needed for password is generated to safety intelligent lock Breath is also further expanded, except temporal information in the handset identity information including before, smart lock identification information, lock, Also include door lock finger print information.The door lock finger print information, the finger print information for receiving user is scanned by the Fingerprint Identification Unit 314.By This is visible, so that guarantee normal unlocking, it is necessary to mobile fingerprint information is identical with door lock finger print information to can guarantee that unlocking Password is identical with password in lock.In actual use, many personal finger print informations of storage can be scanned in middle control mobile phone, as to be selected Mobile fingerprint information, when wherein someone unlocks, the finger print information of the people can be called as current in middle control mobile phone Generate the mobile fingerprint information of unlocking cipher, at the same the people also by the Fingerprint Identification Unit 314 of safety intelligent lock to safe and intelligent Lock inputs its finger print information, as the door lock finger print information of password in generation lock, it is possible thereby to ensure by the people to be pacified Standard-sized sheet is locked, and further enhancing the security reliability of safety intelligent lock.
In addition, Fingerprint Identification Unit 314, which is also used as middle control mobile phone, generates another unlocking finger-print cipher fixed Instrument.Here unlock finger-print cipher, fingerprint is exactly entered into middle control mobile phone and is used as unlocking cipher.Then middle mobile phone of controlling is by typing Finger print information be transferred to Intelligent lock controller, Intelligent lock controller is used as finger-print cipher in lock.In this manner, smart lock Lock in finger-print cipher can only be configured by middle control mobile phone in binding procedure, and the fingerprint of smart lock in itself can not be passed through Identifier is configured or deleted, that is to say, that can not be by completing the man-machine interface operation of smart lock in itself to its inside Any setting or modification operation of password, it is necessary to operated and managed on the middle control mobile phone bound.
The safety intelligent lock shown in Fig. 3 is illustrated above, due to being based on same with above-mentioned method of securely unlocking Design, related content can be referred to, and here is omitted.
Embodiments of the invention are the foregoing is only, are not intended to limit the scope of the invention, it is every to utilize this hair The equivalent structure transformation that bright specification and accompanying drawing content are made, or other related technical fields are directly or indirectly used in, It is included within the scope of the present invention.

Claims (10)

1. a kind of method of securely unlocking of intelligent lock system, the intelligent lock system includes smart lock and middle control mobile phone, the intelligence Can lock includes Intelligent lock controller, it is characterised in that the method for securely unlocking comprises the following steps:
First binding, the middle control mobile phone sets up the interconnection that communicates with the Intelligent lock controller, and the middle control handset identity is simultaneously deposited The smart lock identification information of the Intelligent lock controller is stored up, the Intelligent lock controller recognizes and stores the hand of the middle control mobile phone Machine identification information;
Password is generated, the middle control mobile phone is opened using the handset identity information and the generation of the smart lock identification information of storage Lock cipher, the Intelligent lock controller is using in the smart lock identification information and the handset identity information of storage generation lock Password;Or, by it is described it is middle control mobile phone set unlocking cipher, and by the unlocking cipher of setting by it is described it is middle control mobile phone with The communication connection that the Intelligent lock controller has been set up, is transferred in the Intelligent lock controller as password in corresponding lock;
Password authentification, during unlocking, the unlocking cipher is inputted to the smart lock, and the Intelligent lock controller of the smart lock is by institute The unlocking cipher and password in the lock for stating input carry out contrast verification;
Unlock and respond, if the unlocking cipher is identical with password in the lock, the Intelligent lock controller is considered effective unlocking Password, then open the smart lock, if the unlocking cipher is different from password in the lock, the Intelligent lock controller is considered Invalid unlocking cipher, then continue to close the smart lock.
2. method of securely unlocking according to claim 1, it is characterised in that in first binding, the middle control mobile phone with It is bluetooth data communication interconnection that the Intelligent lock controller, which sets up communication interconnection,.
3. method of securely unlocking according to claim 2, it is characterised in that the handset identity information includes middle control mobile phone Mobile phone IMEI code, the smart lock identification information include Intelligent lock controller in Intelligent lock controller MAC Address and/or The UUID of bluetooth service.
4. the method for securely unlocking according to claims 1 to 3 any claim, it is characterised in that when generating password, When using it is described it is middle control mobile phone using the handset identity information and storage the smart lock identification information generate unlocking cipher, And the Intelligent lock controller utilizes password in the smart lock identification information and the handset identity information of storage generation lock When, the process of the middle control mobile phone generation unlocking cipher also includes the mobile phone time information formation added in the middle control mobile phone The process of password also includes adding the Intelligent lock controller in dynamic unlocking cipher, the Intelligent lock controller generation lock Password in the dynamic lock of temporal information formation in lock.
5. method of securely unlocking according to claim 4, it is characterised in that the middle control mobile phone is controlled with the smart lock Device is set up after communication interconnection, in addition to by the lock in the mobile phone time information and the Intelligent lock controller of the middle control mobile phone Temporal information correction is identical.
6. method of securely unlocking according to claim 5, it is characterised in that time letter in the mobile phone time information and lock Breath include year, month, day, when and point.
7. method of securely unlocking according to claim 5, it is characterised in that in password authentification, when controlling mobile phone in utilization When password is verified in the dynamic lock that the dynamic unlocking cipher of generation is generated with the Intelligent lock controller, in described Control mobile phone and generate dynamic unlocking cipher to password progress contrast verification in the dynamic unlocking cipher and the dynamic lock Between be provided with maximum time interval.
8. method of securely unlocking according to claim 7, it is characterised in that between generation password and password authentification, when When the dynamic unlocking cipher that mobile phone generation is controlled in is unlocked, in addition to the middle mobile phone of controlling is by the dynamic of generation Unlocking cipher user mobile phone is sent to by short message or network data, user obtains dynamic unlock using the user mobile phone Password.
9. method of securely unlocking according to claim 8, it is characterised in that password is equal in the unlocking cipher and the lock It is at least 6 passwords.
10. method of securely unlocking according to claim 1, it is characterised in that by the middle control mobile phone and the smart lock It is linked into cloud platform, the status information one-way transmission of the smart lock to the cloud platform, the cloud platform is by the smart lock Status information be sent to middle control mobile phone, the middle control mobile phone is according to the status information of the smart lock of reception to the intelligence Lock is monitored.
CN201710305357.4A 2017-05-03 2017-05-03 A kind of method of securely unlocking of intelligent lock system Active CN107146307B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710305357.4A CN107146307B (en) 2017-05-03 2017-05-03 A kind of method of securely unlocking of intelligent lock system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710305357.4A CN107146307B (en) 2017-05-03 2017-05-03 A kind of method of securely unlocking of intelligent lock system

Publications (2)

Publication Number Publication Date
CN107146307A true CN107146307A (en) 2017-09-08
CN107146307B CN107146307B (en) 2018-05-25

Family

ID=59774530

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710305357.4A Active CN107146307B (en) 2017-05-03 2017-05-03 A kind of method of securely unlocking of intelligent lock system

Country Status (1)

Country Link
CN (1) CN107146307B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107680211A (en) * 2017-09-22 2018-02-09 重庆市达林顿科技发展有限公司 Intelligent unlocking device based on arrowband technology of Internet of things
CN108711209A (en) * 2018-07-19 2018-10-26 江苏恒宝智能系统技术有限公司 dynamic password generation and verification method and system
CN109410402A (en) * 2018-11-09 2019-03-01 杭州力谱科技有限公司 A kind of building gate control system
CN109636970A (en) * 2018-12-07 2019-04-16 李自力 Dynamic puzzle-lock and its locking method
CN109889596A (en) * 2018-12-29 2019-06-14 珠海汇金科技股份有限公司 Smart lock binding method, smart lock and smart lock binding system
CN109914934A (en) * 2019-04-01 2019-06-21 河南传通电子科技有限公司 A kind of intelligent case monitoring management system based on Internet of Things
CN109914933A (en) * 2019-04-01 2019-06-21 河南传通电子科技有限公司 A kind of intelligent well cover monitoring management system based on Internet of Things
CN110070656A (en) * 2019-05-07 2019-07-30 中国电子信息产业集团有限公司第六研究所 Secrecy box and method for unlocking
CN110176091A (en) * 2019-05-15 2019-08-27 广东科徕尼智能科技有限公司 A method of smart lock safety is improved by mobile terminal device code
CN110853191A (en) * 2019-11-12 2020-02-28 珠海格力电器股份有限公司 Intelligent door lock unlocking method, equipment and medium
CN110890958A (en) * 2019-10-16 2020-03-17 蔚复来(浙江)科技股份有限公司 Method for generating and verifying offline remote temporary password
CN111145400A (en) * 2020-02-25 2020-05-12 佛山市翰文裕城智能科技有限公司 Safe and simple low-power-consumption Bluetooth lock and control method thereof

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109448171A (en) * 2018-09-27 2019-03-08 深圳市迈悍德实业有限公司 A kind of method and smart lock of unlocking

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN204883882U (en) * 2015-07-06 2015-12-16 深圳市浩卓科技有限公司 Fingerprint lock system and lock
US20160055694A1 (en) * 2014-08-20 2016-02-25 Gate Labs Inc. Access management and resource sharing system based on biometric identity
CN106097494A (en) * 2016-06-03 2016-11-09 北京小米移动软件有限公司 The method for unlocking of smart lock and device
CN106355717A (en) * 2016-09-05 2017-01-25 惠州Tcl移动通信有限公司 Mobile terminal unlocking method and system based on fingerprint recognition and NFC (near field communication)

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160055694A1 (en) * 2014-08-20 2016-02-25 Gate Labs Inc. Access management and resource sharing system based on biometric identity
CN204883882U (en) * 2015-07-06 2015-12-16 深圳市浩卓科技有限公司 Fingerprint lock system and lock
CN106097494A (en) * 2016-06-03 2016-11-09 北京小米移动软件有限公司 The method for unlocking of smart lock and device
CN106355717A (en) * 2016-09-05 2017-01-25 惠州Tcl移动通信有限公司 Mobile terminal unlocking method and system based on fingerprint recognition and NFC (near field communication)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107680211A (en) * 2017-09-22 2018-02-09 重庆市达林顿科技发展有限公司 Intelligent unlocking device based on arrowband technology of Internet of things
CN108711209A (en) * 2018-07-19 2018-10-26 江苏恒宝智能系统技术有限公司 dynamic password generation and verification method and system
CN109410402B (en) * 2018-11-09 2020-11-17 王锐 Building access control system
CN109410402A (en) * 2018-11-09 2019-03-01 杭州力谱科技有限公司 A kind of building gate control system
CN109636970A (en) * 2018-12-07 2019-04-16 李自力 Dynamic puzzle-lock and its locking method
CN109889596A (en) * 2018-12-29 2019-06-14 珠海汇金科技股份有限公司 Smart lock binding method, smart lock and smart lock binding system
CN109914933A (en) * 2019-04-01 2019-06-21 河南传通电子科技有限公司 A kind of intelligent well cover monitoring management system based on Internet of Things
CN109914934A (en) * 2019-04-01 2019-06-21 河南传通电子科技有限公司 A kind of intelligent case monitoring management system based on Internet of Things
CN109914933B (en) * 2019-04-01 2021-02-19 河南传通电子科技有限公司 Intelligent well lid monitoring management system based on Internet of things
CN110070656A (en) * 2019-05-07 2019-07-30 中国电子信息产业集团有限公司第六研究所 Secrecy box and method for unlocking
CN110070656B (en) * 2019-05-07 2021-04-06 中国电子信息产业集团有限公司第六研究所 Security box and unlocking method
CN110176091A (en) * 2019-05-15 2019-08-27 广东科徕尼智能科技有限公司 A method of smart lock safety is improved by mobile terminal device code
CN110890958A (en) * 2019-10-16 2020-03-17 蔚复来(浙江)科技股份有限公司 Method for generating and verifying offline remote temporary password
CN110890958B (en) * 2019-10-16 2023-09-12 蔚复来(浙江)科技股份有限公司 Offline remote temporary password generation method and verification method
CN110853191A (en) * 2019-11-12 2020-02-28 珠海格力电器股份有限公司 Intelligent door lock unlocking method, equipment and medium
CN111145400A (en) * 2020-02-25 2020-05-12 佛山市翰文裕城智能科技有限公司 Safe and simple low-power-consumption Bluetooth lock and control method thereof

Also Published As

Publication number Publication date
CN107146307B (en) 2018-05-25

Similar Documents

Publication Publication Date Title
CN106971442B (en) A kind of safe and intelligent lock system
CN107146307B (en) A kind of method of securely unlocking of intelligent lock system
US11120656B2 (en) Methods and systems for offline verification code generation based on smart door lock system
CN207409010U (en) The newer temporary password access control system of encryption parameter dynamic
CN105654580B (en) Access control method and system, electronic lock, management and visitor's terminal
CN107274532A (en) The temporary password gate control system that encryption parameter dynamically updates
CN109905235A (en) A kind of smart lock unlocking method, smart lock, terminal, server and system
EP2320388A1 (en) Security system
US20180359635A1 (en) Securitization of Temporal Digital Communications Via Authentication and Validation for Wireless User and Access Devices
CN106340104B (en) A kind of coded lock, coded lock control system and method
CN106375091A (en) communication link established to user apparatus via an access control device
CN108449177A (en) The use control method and system of temporary password
CN104050742A (en) Intelligent door and control method and system thereof
US9779568B2 (en) Locking control device, locking control system, and locking control method
CN206961200U (en) A kind of safe and intelligent lock system
CN105869246A (en) Intelligent unlocking system and method thereof
CN107154847A (en) Towards the method for generating cipher code, verification method and its smart machine of offline environment
CN109035515A (en) The control method and door-locking system of smart lock
CN106912046A (en) One-pass key card and vehicle pairs
CN108460862A (en) The method and electric lockset, lock system having with palmprint authentication and Mobile phone control lock
CN106846573A (en) The method and corresponding electronic lock of electronic lock are opened when without linking Internet
CN107221061A (en) A kind of cipher management method of smart lock
CN107958513A (en) A kind of offline authorization method and system of electronic lock
CN111127710B (en) Intelligent lock safe off-line unlocking password generation method
CN113593085A (en) Door lock temporary password generation method, system, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant