CN108055124A - Lock administration system and lock management method - Google Patents

Lock administration system and lock management method Download PDF

Info

Publication number
CN108055124A
CN108055124A CN201711128861.8A CN201711128861A CN108055124A CN 108055124 A CN108055124 A CN 108055124A CN 201711128861 A CN201711128861 A CN 201711128861A CN 108055124 A CN108055124 A CN 108055124A
Authority
CN
China
Prior art keywords
unlocking
authorized
authorization message
smart lock
lock
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711128861.8A
Other languages
Chinese (zh)
Inventor
吕锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Miaolian Digital Technology Co Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201711128861.8A priority Critical patent/CN108055124A/en
Publication of CN108055124A publication Critical patent/CN108055124A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00412Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present invention provides a kind of lock administration system and lock management methods, are related to smart lock technical field.User can establish corresponding account by account subsystem, and the unlocking authority of smart lock can be authorized to other by authorization subsystem and be authorized to side, it needs to use authorized party's digital signature during mandate, authorized party's digital signature has unique correspondence with authorized party so that the operation of mandate can not be counterfeited.It is simultaneously to have the authorized of authorized information that the ciphertext of smart lock can be decrypted just now so that can not unlock without authorized personnel to smart lock.The unlocking of smart lock need to only be can be realized by electronic equipment by being authorized to side, without carrying physical key so that licensing process is simpler.Meanwhile the corresponding public private key pair of authorized party stores respectively in lock administration system and personal terminal, can not all realize mandate and unlocking separately through public key or private key, unlocking process is safer.

Description

Lock administration system and lock management method
Technical field
The present invention relates to smart lock technical field, in particular to a kind of lock administration system and lock management method.
Background technology
Existing gate inhibition or other many Practical Intelligents in place to be opened the door by lockset control are locked to improve security.Mostly Smart lock when licensing to other users and being unlocked, the problem of often being faced with security and.For example, some are simple Password by setting password for lock, is then informed user by authorization unlocking method.In this way, password is knowable to third party, hold very much Easily leakage needs to tell others' password if other people is authorized to open.Secondly, password degree of safety itself is not high, also exists and is cracked Risk.
The content of the invention
In view of this, the present invention provides a kind of lock administration system based on asymmetric encryption techniques, it can realize and more pacify Full unlocking management.
Technical solution provided by the invention is as follows:
A kind of lock administration system, including:
Account subsystem, for distributing public private key pair according to the identity of user for the user, wherein described public and private Key is stored in including public key and corresponding private key, the public key in the lock administration system, the private key be stored in it is described In the corresponding personal terminal of user;
Authorization subsystem is locked, for the unlocking authority of smart lock to be licensed to the intelligence according to the authorization message received Lock corresponding authorized side;
Unlocking subsystem, for determining whether the unlocking received request has unlocking authority, if the request of unlocking With unlocking authority, the unlocking instruction with the corresponding smart lock of unlocking request is generated, to open the smart lock.
Further, the lock authorization subsystem is in the following manner according to authorization message the opening smart lock received Permission grant is locked to corresponding authorized side:
Receive the authorization message for the smart lock that authorized party sends;
The authorization message is encrypted, authorized informative abstract;
Authorization message summary is encrypted using private key corresponding with the authorized party, generation authorized party's number label Name;
Using the corresponding public key of the authorized side to authorized party's digital signature of the authorization message and generation into Row encryption, and encrypted authorization message and authorized party's digital signature are stored in the smart lock, complete smart lock mandate.
Further, the unlocking subsystem determines unlocking request according to the unlocking request received in the following manner Whether there is unlocking authority:
The private key for being authorized to and just providing is provided, the corresponding ciphertext of the smart lock is decrypted using the private key, and root Judge to unlock according to decrypted result and ask whether corresponding authorized side has unlocking authority;
If obtaining the authorization message and authorized party's digital signature after the ciphertext is decrypted, show to receive To unlocking corresponding authorized side is asked to possess unlocking authority;
If the ciphertext, which is decrypted, cannot obtain decrypted result, show that the unlocking received request is corresponding and awarded Quan Fang does not possess unlocking authority.
Further, the corresponding ciphertext of the smart lock is decrypted using the private key, authorized information and mandate After square digital signature, the unlocking subsystem is additionally operable to:
Public key corresponding with the authorized party is obtained according to the authorization message;
The authorized party's digital signature obtained using the public key corresponding with the authorized party to decryption is decrypted, and is obtained First authorization message is made a summary;
Computing is decrypted in the authorization message obtained to decryption, obtains the second authorization message summary;
First authorization message summary is compared with second authorization message summary, if described first authorizes Informative abstract is identical with the second authorization message summary, shows that the corresponding authorized party of the smart lock has unlocking authority, to The smart lock sends unlocking instruction.
Further, the unlocking subsystem is additionally operable in first authorization message summary and second authorization message When making a summary inconsistent, determine that the corresponding authorized party of the smart lock is insincere, record the information of the authorized side, to the intelligence It can lock transmission refusal unlocking instruction.
Further, which further includes the alert sub-system being connected with the unlocking subsystem, the alert sub-system For in first authorization message summary and inconsistent second authorization message summary, generating warning message, this being reported Alert information is sent to authorized party corresponding with the smart lock.
The present invention also provides a kind of lock management method, including:
Public private key pair is distributed for the user according to the identity of user, wherein the public private key pair includes public key and right The private key answered, the public key are stored in the lock administration system, and the private key is stored in corresponding with the user personal whole In end;
The unlocking authority of smart lock is licensed to by the corresponding authorized side of smart lock according to the authorization message received;
Whether the sender for determining unlocking information according to the unlocking information of reception has unlocking authority, if described sender With unlocking authority, the unlocking instruction of generation smart lock corresponding with the unlocking information, to open the smart lock.
Further, the unlocking authority of smart lock licenses to smart lock is corresponding to be awarded according to the authorization message received The step of Quan Fang includes:
Receive the authorization message for the smart lock that authorized party sends;
The authorization message is encrypted, authorized informative abstract;
Authorization message summary is encrypted using private key corresponding with the authorized party, generation authorized party's number label Name;
Using the corresponding public key of the authorized side to authorized party's digital signature of the authorization message and generation into Row encryption, and encrypted authorization message and authorized party's digital signature are stored in the smart lock, complete smart lock mandate.
Further, whether the sender for determining unlocking information according to the unlocking information of reception has the step of unlocking authority Including:
The private key for being authorized to and just providing is provided, the corresponding ciphertext of the smart lock is decrypted using the private key, and root Judge to unlock according to decrypted result and ask whether corresponding authorized side has unlocking authority;
If obtaining the authorization message and authorized party's digital signature after the ciphertext is decrypted, show to receive To unlocking request possess unlocking authority;
If the ciphertext, which is decrypted, cannot obtain decrypted result, show that the unlocking received request is corresponding and awarded Quan Fang does not possess unlocking authority.
Further, the authorization message and authorized party's digital signature are obtained after the ciphertext is decrypted After step, this method further includes:
Public key corresponding with the authorized party is obtained according to the authorization message;
The authorized party's digital signature obtained using the public key to decryption is decrypted, and obtains the first authorization message summary;
Computing is decrypted in the authorization message obtained to decryption, obtains the second authorization message summary;
First authorization message summary is compared with second authorization message summary, if described first authorizes Informative abstract is identical with the second authorization message summary, shows that the corresponding authorized party of the smart lock has unlocking authority, to The smart lock sends unlocking instruction.
An embodiment of the present invention provides a kind of lock administration system based on asymmetric encryption techniques, user can pass through account Subsystem establishes corresponding account, and can authorize the unlocking authority of smart lock to other by authorization subsystem and be authorized to side, It is needed during mandate using authorized party's digital signature, which has unique corresponding pass with authorized party System so that the operation of mandate can not be counterfeited.It is simultaneously to have the authorized of authorized information just now can be to the ciphertext of smart lock It is decrypted so that can not unlock without authorized personnel to smart lock.Being authorized to side only need to pass through electronic equipment The unlocking of smart lock can be realized, without carrying physical key so that licensing process is simpler.Meanwhile the corresponding public affairs of authorized party Private key can not all realize mandate separately through public key or private key and open to being stored respectively in lock administration system and personal terminal Lock, unlocking process are safer.
For the above objects, features and advantages of the present invention is enable to be clearer and more comprehensible, preferred embodiment cited below particularly, and coordinate Appended attached drawing, is described in detail below.
Description of the drawings
It in order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair The restriction of scope, for those of ordinary skill in the art, without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 is a kind of schematic diagram of lock administration system provided in an embodiment of the present invention.
Fig. 2 is the flow chart of the lock management method applied to the lock administration system.
Fig. 3 is the submethod flow diagram of the step S20 of Fig. 2.
Fig. 4 is the submethod flow diagram of the step S30 of Fig. 2.
Fig. 5 is the schematic diagram of another lock administration system provided in an embodiment of the present invention.
Icon:10- lock administration systems;101- account subsystems;102- locks authorization subsystem;103- unlocking subsystems; 104- alert sub-systems.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete Ground describes, it is clear that described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.Usually exist The component of the embodiment of the present invention described and illustrated in attached drawing can configure to arrange and design with a variety of herein.Cause This, the detailed description of the embodiment of the present invention to providing in the accompanying drawings is not intended to limit claimed invention below Scope, but it is merely representative of the selected embodiment of the present invention.Based on the embodiment of the present invention, those skilled in the art are not doing Go out all other embodiments obtained on the premise of creative work, belong to the scope of protection of the invention.
It should be noted that:Similar label and letter represents similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined, then it further need not be defined and explained in subsequent attached drawing in a attached drawing.Meanwhile the present invention's In description, term " first ", " second " etc. are only used for distinguishing description, and it is not intended that instruction or hint relative importance.
An embodiment of the present invention provides a kind of lock administration system 10 based on asymmetric encryption techniques, as shown in Figure 1, including Account subsystem 101, lock authorization subsystem 102 and unlocking subsystem 103.The lock administration system 10 carries out intelligent lock management Method is method as shown in Figure 2.
Detailed, account subsystem 101, for distributing public private key pair according to the identity of user for the user, Described in public private key pair include public key and corresponding private key, the public key is stored in the lock administration system 10, the private key It is stored in personal terminal corresponding with the user.
User can first pass through mobile terminal or other-end is established and the communication connection of lock administration system 10, establishes communication Conventional Account Registration can be carried out after connection.User can upload in oneself corresponding account shows personal identification Identity, the identification information of name, passport NO. or other forms can be included.Account subsystem 101 is receiving use After the identity that family uploads, public private key pair can be distributed for the user according to default allocation algorithm.Public private key pair includes public affairs Key and corresponding private key, the public key can be stored in the lock administration system 10, the private key can be stored in it is described In the corresponding personal terminal of user.
Public key and private key are stored separately, can fully ensure that the privacy of key, can not be extrapolated separately through public key Private key can not also extrapolate public key separately through private key.Even if the public key information in lock administration system 10 is leaked, other people also without Method passes through the safety of asymmetrical encryption technology realization key by public key acquisition to corresponding private key.
User can also register corresponding smart lock by account subsystem 101, which can be on logistics cabinet The door-control lock or the smart lock of other forms that lockset or access control open or close, smart lock can pass through communication equipment and lock Management system 10 establishes communication connection, and can be opened when lock administration system 10 issues unlocking instruction or in lock-out state Under locking when receiving blocking order.User can register the intelligent lock information of smart lock in account subsystem 101 Storage, and the mapping relations with the public private key pair of the user can be established.One user can obtain one or more pairs of public and private keys It is right, so as to establish the correspondence of a pair of of public private key pair and multiple smart locks or each smart lock is made to be corresponding with difference Public private key pair.
Authorization subsystem 102 is locked, it is described for being licensed to the unlocking authority of smart lock according to the authorization message received The corresponding authorized side of smart lock.
Lock authorization subsystem 102 can authorize the unlocking authority of chartered smart lock.Detailed, such as Fig. 3 Shown, lock authorization subsystem 102 can realize the mandate of unlocking authority by following steps.
Step S101 receives the authorization message for the smart lock that authorized party sends.
Authorized party can be the user registered in advance in lock administration system 10, which can open corresponding Lock permission authorizes other and is authorized to side.Authorization message can be the letter of the mark comprising openable smart lock that authorized party provides Breath or uncaging time information.For example, authorized party can determine to be authorized to the specific number of the openable smart lock in side, can beat Specific period for opening, the service life of unlocking authority, out-of-service time etc. information.
The authorization message is encrypted in step S102, authorized informative abstract.
Encryption Algorithm can be used, such as Hash Encryption Algorithm, authorization message is encrypted, authorized information after encryption Summary.
Step S103 is encrypted authorization message summary using private key corresponding with the authorized party, and generation is awarded Power side's digital signature.
Step S104, using the corresponding public key of the authorized side to the mandate number formulary of the authorization message and generation Word signature is encrypted, and encrypted authorization message and authorized party's digital signature are stored in the smart lock, completes intelligence It can lock mandate.
The private key for having arrived authorized party and institute of the public key to authorization message and generation for being authorized to side are used in licensing process It states authorized party's digital signature to be encrypted, encrypted authorization message and authorized party's digital signature can serve as the close of smart lock Text, the ciphertext can be stored in smart lock.Due to the use of the public key of authorized side, the mandate to being authorized to side is realized. The identity information for being authorized to side can be predefined, and then the public key for being authorized to side is determined in lock administration system 10.It is awarded Quan Fang can pass through the decryption and verification to the ciphertext when needing to open the smart lock, it is determined whether can open corresponding Smart lock.
The unlocking authority of one smart lock can be authorized one or more authorized sides by authorized party, can also be by more intelligence The unlocking authority that can be locked authorizes one or more authorized sides simultaneously.The unlocking authority of a smart lock can be authorized simultaneously more A authorized side, and only multiple authorized sides can just obtain the intelligence simultaneously all when providing the unlocking authority of the smart lock The complete unlocking authority that can be locked.
Unlocking subsystem 103, for determining whether the unlocking received request has unlocking authority, if the unlocking please It asks with unlocking authority, the unlocking instruction with the corresponding smart lock of unlocking request is generated, to open the smart lock.
It is understood that being authorized to side when needing to unlock to a certain smart lock, can establish and lock management system The communication connection of system 10, such as the connection with lock administration system 10 can be established by mobile terminal.It can be upon establishment of a connection The request that will unlock is sent to lock administration system 10, and unlocking subsystem 103, can be to the unlocking after receiving and being unlocked request Request is verified, determines whether unlocking request has unlocking authority, and can ask have the power of unlocking in the definite unlocking In limited time, unlocking instruction is generated, corresponding smart lock is opened.Unlocking subsystem 103, which can be set in advance in, is authorized to side's use Electronic equipment in or set in the server.
Detailed, as shown in figure 4, unlocking subsystem 103 can realize the judgement of unlocking authority by following steps.
Step S201 receives the private key for being authorized to and just providing, and the corresponding ciphertext of the smart lock is carried out using the private key Decryption.
Step S202, if obtaining the authorization message M and authorized party number label after the ciphertext is decrypted Name s shows that the unlocking received request possesses unlocking authority.
Since the ciphertext of smart lock is private key and the authorized square public key encryption by authorized party, it is permissible to be authorized to side The communication connection with smart lock is established, obtains the ciphertext stored in smart lock, and is reused corresponding with the public key of the authorized side Private key ciphertext is decrypted, correct private key can decrypt to obtain authorization message M and the authorized party's number that ciphertext includes Sign s.It, only just can be to by corresponding to the private key with correct correspondence due to the unique corresponding relation of public key and private key The information of public key encryption be decrypted, ensure the correctness authorized.
Step S203 if the ciphertext, which is decrypted, cannot obtain decrypted result, shows that the unlocking received is asked Corresponding authorized side does not possess unlocking authority.
Can by obtaining decrypted result, it be trusted or fly-by-night to determine that this is authorized to side, also, lock management System 10 can store the result, be recorded by inquiring about unlock corresponding with smart lock, which understanding has be authorized to Side attempts to be unlocked, while will be seen that the relevant informations such as the time for attempting to unlock.
If being authorized to side has been previously obtained the unlocking authority for being directed to a certain smart lock, due in the licensing process of smart lock Using the public key to authorized side, since public key and corresponding private key have default correspondence.It is authorized to side with this The corresponding private key of public key is exactly that the ciphertext of the smart lock can be carried out to strive for decryption.Lock administration system 10 is by being authorized to side The private key of offer can decrypt the ciphertext of smart lock authorized information M and authorized party's digital signature s.Unlocking subsystem 103 can realize issuing for further unlocking instruction by following steps again.
Step S204 obtains public key corresponding with the authorized party according to the authorization message M.
After ciphertext being decrypted authorized information M and authorized party's digital signature s, progress is included in authorization message The relevant information of the authorized party of mandate can determine corresponding public key according to the authorization message from lock administration system 10.
Step S205, using the public key corresponding with the authorized party to the obtained authorized party's digital signature s of decryption into Row decryption obtains the first authorization message summary H.
, can be for authorization to informative abstract by the decryption to authorized party's digital signature s, the mandate which is obtained is believed Breath summary is as the first authorization message summary H.
Computing is decrypted in step S206, the authorization message M obtained to decryption, obtains the second authorization message summary h.
Default decipherment algorithm, such as hash algorithm can be used, computing is decrypted to authorization message M, is decrypted Authorization message summary after computing, using the authorization message obtained after the decryption computing summary as the second authorization message summary h.
First authorization message summary h is compared step S207 with second authorization message summary H, if The first authorization message summary h is identical with the second authorization message H summaries, shows the corresponding authorized party's tool of the smart lock There is unlocking authority, unlocking instruction is sent to the smart lock.
Through the above steps, awarded if the first authorization message summary h can be obtained by comparison with described second Power information H summaries are identical as a result, showing that being authorized to side has obtained the correct mandate for the smart lock.Lock administration system 10 Unlocking instruction can be issued to smart lock, smart lock is after unlocking instruction is received, you can carry out unlocking action.Authorized side is just By the unlocking for after the mandate of authorized party, realizing smart lock.
If by the first authorization message summary h and the second authorization message make a summary it is being obtained after H is compared the result shows that, two Person is inconsistent, and it is not mandate letter corresponding or to forge to show that this is authorized to the smart lock that authorizes just obtained Breath shows that the authorized side for attempting to unlock does not obtain correct unlocking authority, belongs to and assume another's name to unlock.At this point, lock management System 10 can send the instruction that refusal is unlocked to smart lock, and the smart lock is made not to be opened.Meanwhile this can be attempted The corresponding identification information of terminal unlocked is recorded, such as can record the MAC Address of the terminal, SIM card The information such as (Subscriber Identification Module, subscriber identification card) card number.It is emitted further, it is also possible to establish The blacklist for the terminal of assuming another's name that name is unlocked stores the relevant information for the terminal unlocked of assuming another's name.
Authorizing the unlocking authority of a smart lock to multiple authorized sides, and only multiple authorized sides all carry simultaneously When can just obtain the complete unlocking authority of the smart lock for the unlocking authority of the smart lock, which opens all quilts needed Authorized party is required for providing respective part unlocking authority to lock administration system 10, and unlocking subsystem 103 can be awarded all The part unlocking authority that Quan Fang is provided forms complete unlocking authority, and the complete unlocking authority is carried out above-mentioned judgement step Suddenly, and final judgement is obtained as a result, realizing that the unlocking of smart lock or refusal are unlocked.Such situation can be realized only multiple Authorized side only possesses the part unlocking authority of a smart lock, and it is the unlocking that can not complete the smart lock that one, which is authorized to side, , the only corresponding all authorized sides of the smart lock both provide correct authorization message, could realize the correct of smart lock It unlocks.Such mode causes one multiple authorized sides to be needed to provide unlocking request simultaneously smart lock, only possesses which part Being authorized to the information of Fang Fang can not unlock, and in some special unlocking occasions, further improve the safety that smart lock is unlocked Property.
In addition, as shown in figure 5, the lock administration system 10 can also include alert sub-system 104, in unlocking subsystem 103 during whether the unlocking request for determining to receive has unlocking authority, has obtained the request of unlocking and has not unlocked Permission as a result, can generate notification information notifies the alert sub-system 104.Alert sub-system 104 can be according to notification information It alarms, such as prompt messages can be sent to the electric terminal of authorized party corresponding with smart lock, to smart lock Owner carry out warning reminding, it is prompted to have the person of unlocking to assume another's name that the unlocking assumed another's name has been used to ask to attempt to carry out smart lock Unlocking operation.Simultaneously the information such as the coding of smart lock, position can be sent to authorized party together, to assume another's name unlock behavior into Row warning reminding.
An embodiment of the present invention provides a kind of lock administration system 10 based on asymmetric encryption techniques, user can pass through account Family subsystem 101 establishes corresponding account, and can authorize the unlocking authority of smart lock to other by authorization subsystem and be awarded Quan Fang is needed during mandate using authorized party's digital signature, which has unique with authorized party Correspondence so that the operation of mandate can not be counterfeited.It is simultaneously to have the authorized of authorized information just now can be to smart lock Ciphertext be decrypted so that can not unlock without authorized personnel to smart lock.Being authorized to side only need to pass through electricity The unlocking of smart lock can be realized in sub- equipment, without carrying physical key so that licensing process is simpler.Meanwhile authorized party couple The public private key pair answered stores respectively in lock administration system 10 and personal terminal, can not all realize and award separately through public key or private key Power and unlocking, unlocking process are safer.
The embodiment of the present invention additionally provides a kind of lock management method, then as shown in Fig. 2, comprises the following steps.
Step S10 distributes public private key pair, wherein the public private key pair includes according to the identity of user for the user Public key and corresponding private key, the public key are stored in the lock administration system, and the private key is stored in corresponding with the user Personal terminal in.Detailed, it may refer to the description of above-mentioned account subsystem.
The unlocking authority of smart lock, is licensed to that smart lock is corresponding to be awarded according to the authorization message received by step S20 Quan Fang.Detailed, it may refer to the description of above-mentioned lock authorization subsystem.
Step S30, whether the sender for determining unlocking information according to the unlocking information of reception has unlocking authority, if institute Sender is stated with unlocking authority, the unlocking instruction of generation smart lock corresponding with the unlocking information, to open the smart lock. Detailed, it may refer to the description of above-mentioned unlocking subsystem.
The unlocking authority of smart lock is licensed to the step of the corresponding authorized side of smart lock according to the authorization message received Suddenly include:Receive the authorization message for the smart lock that authorized party sends;The authorization message is encrypted, authorized letter Breath summary;Authorization message summary is encrypted using private key corresponding with the authorized party, generation authorized party's number label Name;Authorized party's digital signature of the authorization message and generation is added using the authorized side corresponding public key It is close, and encrypted authorization message and authorized party's digital signature are stored in the smart lock, complete smart lock mandate.In detail , it may refer to descriptions of the above-mentioned steps S101 to step S104.
Whether the sender for determining unlocking information according to the unlocking information of reception there is the step of unlocking authority can include: The private key for being authorized to and just providing is provided, the corresponding ciphertext of the smart lock is decrypted using the private key;If to described close Text obtains the authorization message and authorized party's digital signature after being decrypted, show that the unlocking received request possesses unlocking Permission;If the ciphertext, which is decrypted, cannot obtain decrypted result, show that the unlocking received request is corresponding and be authorized to Side does not possess unlocking authority.Detailed, it may refer to descriptions of the above-mentioned steps S201 to step S203.
After the step of authorization message and authorized party's digital signature are obtained after the ciphertext is decrypted, This method further includes:Public key corresponding with the authorized party is obtained according to the authorization message;Using the public key to decrypting To authorized party's digital signature be decrypted, obtain the first authorization message summary;The authorization message that decryption obtains is carried out Computing is decrypted, obtains the second authorization message summary;By first authorization message summary with second authorization message make a summary into Row compares, if first authorization message summary is identical with the second authorization message summary, shows that the smart lock corresponds to Authorized party have unlocking authority, to the smart lock send unlocking instruction.Detailed, above-mentioned steps S204 is may refer to step The description of rapid S207.
In several embodiments provided herein, it should be understood that disclosed apparatus and method can also pass through Other modes are realized.The apparatus embodiments described above are merely exemplary, for example, flow chart and block diagram in attached drawing Show the devices of multiple embodiments according to the present invention, method and computer program product architectural framework in the cards, Function and operation.In this regard, each box in flow chart or block diagram can represent the one of a module, program segment or code Part, a part for the module, program segment or code include one or more and are used to implement holding for defined logic function Row instruction.It should also be noted that at some as in the realization method replaced, the function that is marked in box can also be to be different from The order marked in attached drawing occurs.For example, two continuous boxes can essentially perform substantially in parallel, they are sometimes It can perform in the opposite order, this is depending on involved function.It is it is also noted that every in block diagram and/or flow chart The combination of a box and the box in block diagram and/or flow chart can use function or the dedicated base of action as defined in performing It realizes or can be realized with the combination of specialized hardware and computer instruction in the system of hardware.
In addition, each function module in each embodiment of the present invention can integrate to form an independent portion Point or modules individualism, can also two or more modules be integrated to form an independent part.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.Within the spirit and principles of the invention, that is made any repaiies Change, equivalent substitution, improvement etc., should all be included in the protection scope of the present invention.It should be noted that:Similar label and letter exists Similar terms is represented in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, is then not required in subsequent attached drawing It is further defined and is explained.
The above description is merely a specific embodiment, but protection scope of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can readily occur in change or replacement, should all contain Lid is within protection scope of the present invention.Therefore, protection scope of the present invention described should be subject to the protection scope in claims.

Claims (10)

1. a kind of lock administration system, which is characterized in that including:
Account subsystem, for distributing public private key pair according to the identity of user for the user, wherein the public private key pair Including public key and corresponding private key, the public key is stored in the lock administration system, and the private key is stored in and the user In corresponding personal terminal;
Authorization subsystem is locked, for the unlocking authority of smart lock to be licensed to the smart lock pair according to the authorization message received The authorized side answered;
Unlocking subsystem, for determining whether the unlocking received request has unlocking authority, if the request of unlocking has Unlocking authority generates the unlocking instruction with the corresponding smart lock of unlocking request, to open the smart lock.
2. lock administration system according to claim 1, which is characterized in that described to lock authorization subsystem root in the following manner The unlocking authority of smart lock is licensed into corresponding authorized side according to the authorization message received:
Receive the authorization message for the smart lock that authorized party sends;
The authorization message is encrypted, authorized informative abstract;
Authorization message summary is encrypted using private key corresponding with the authorized party, generates authorized party's digital signature;
Authorized party's digital signature of the authorization message and generation is added using the authorized side corresponding public key It is close, and encrypted authorization message and authorized party's digital signature are stored in the smart lock, complete smart lock mandate.
3. lock administration system according to claim 2, which is characterized in that unlocking subsystem basis in the following manner The unlocking request received determines whether unlocking request has unlocking authority:
The private key for being authorized to and just providing is provided, the corresponding ciphertext of the smart lock is decrypted using the private key, and according to solution Close result, which judges to unlock, asks whether corresponding authorized side has unlocking authority;
If obtaining the authorization message and authorized party's digital signature after the ciphertext is decrypted, show what is received It unlocks and corresponding authorized side is asked to possess unlocking authority;
If the ciphertext, which is decrypted, cannot obtain decrypted result, show that corresponding authorized side is asked in the unlocking received Do not possess unlocking authority.
4. lock administration system according to claim 3, which is characterized in that corresponding to the smart lock close using the private key Text is decrypted, and after authorized information and authorized party's digital signature, the unlocking subsystem is additionally operable to:
Public key corresponding with the authorized party is obtained according to the authorization message;
The authorized party's digital signature obtained using the public key corresponding with the authorized party to decryption is decrypted, and obtains first Authorization message is made a summary;
Computing is decrypted in the authorization message obtained to decryption, obtains the second authorization message summary;
First authorization message summary is compared with second authorization message summary, if first authorization message Summary is identical with the second authorization message summary, shows the corresponding authorized party of the smart lock with unlocking authority, to described Smart lock sends unlocking instruction.
5. lock administration system according to claim 4, which is characterized in that the unlocking subsystem is additionally operable to described first When authorization message is made a summary and second authorization message summary is inconsistent, determine that the corresponding authorized party of the smart lock is insincere, The information of the authorized side is recorded, refusal unlocking instruction is sent to the smart lock.
6. lock administration system according to claim 5, which is characterized in that the system is further included to be connected with the unlocking subsystem The alert sub-system connect, the alert sub-system are used to make a summary with second authorization message in first authorization message summary When inconsistent, warning message is generated, which is sent to authorized party corresponding with the smart lock.
7. a kind of lock management method, which is characterized in that including:
Public private key pair is distributed for the user according to the identity of user, wherein the public private key pair includes public key and corresponding Private key, the public key are stored in the lock administration system, and the private key is stored in personal terminal corresponding with the user;
The unlocking authority of smart lock is licensed to by the corresponding authorized side of smart lock according to the authorization message received;
Whether the sender for determining unlocking information according to the unlocking information of reception has unlocking authority, if described sender has Unlocking authority generates the unlocking instruction of smart lock corresponding with the unlocking information, to open the smart lock.
8. lock management method according to claim 7, which is characterized in that according to the authorization message received by smart lock The step that unlocking authority licenses to the corresponding authorized side of smart lock includes:
Receive the authorization message for the smart lock that authorized party sends;
The authorization message is encrypted, authorized informative abstract;
Authorization message summary is encrypted using private key corresponding with the authorized party, generates authorized party's digital signature;
Authorized party's digital signature of the authorization message and generation is added using the authorized side corresponding public key It is close, and encrypted authorization message and authorized party's digital signature are stored in the smart lock, complete smart lock mandate.
9. lock management method according to claim 8, which is characterized in that unlocking information is determined according to the unlocking information of reception Sender whether have unlocking authority the step of include:
The private key for being authorized to and just providing is provided, the corresponding ciphertext of the smart lock is decrypted using the private key, and according to solution Close result, which judges to unlock, asks whether corresponding authorized side has unlocking authority;
If obtaining the authorization message and authorized party's digital signature after the ciphertext is decrypted, show what is received Request of unlocking possesses unlocking authority;
If the ciphertext, which is decrypted, cannot obtain decrypted result, show that corresponding authorized side is asked in the unlocking received Do not possess unlocking authority.
10. lock management method according to claim 9, which is characterized in that institute is obtained after the ciphertext is decrypted After the step of stating authorization message and authorized party's digital signature, this method further includes:
Public key corresponding with the authorized party is obtained according to the authorization message;
The authorized party's digital signature obtained using the public key to decryption is decrypted, and obtains the first authorization message summary;
Computing is decrypted in the authorization message obtained to decryption, obtains the second authorization message summary;
First authorization message summary is compared with second authorization message summary, if first authorization message Summary is identical with the second authorization message summary, shows the corresponding authorized party of the smart lock with unlocking authority, to described Smart lock sends unlocking instruction.
CN201711128861.8A 2017-11-15 2017-11-15 Lock administration system and lock management method Pending CN108055124A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711128861.8A CN108055124A (en) 2017-11-15 2017-11-15 Lock administration system and lock management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711128861.8A CN108055124A (en) 2017-11-15 2017-11-15 Lock administration system and lock management method

Publications (1)

Publication Number Publication Date
CN108055124A true CN108055124A (en) 2018-05-18

Family

ID=62120106

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711128861.8A Pending CN108055124A (en) 2017-11-15 2017-11-15 Lock administration system and lock management method

Country Status (1)

Country Link
CN (1) CN108055124A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108830983A (en) * 2018-05-29 2018-11-16 广州蛙管家科技有限公司 A kind of access control system and its working method based on block chain
CN109617703A (en) * 2019-01-31 2019-04-12 北京深思数盾科技股份有限公司 Key management method and device, electronic equipment and storage medium
CN110310406A (en) * 2019-07-24 2019-10-08 珠海格力电器股份有限公司 Unlocking method of intelligent door lock and intelligent door lock

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104933793A (en) * 2015-06-11 2015-09-23 宁波飞拓电器有限公司 Two-dimension code electronic key implementation method based on digital signature
US20160197893A1 (en) * 2015-01-07 2016-07-07 WaveLynx Technologies Corporation Systems and methods for secure electronic access control
CN105931337A (en) * 2016-05-09 2016-09-07 杭州摇光科技有限公司 Electronic lock device and system and authorizing method of electronic lock system
CN106603484A (en) * 2016-10-25 2017-04-26 雷飏 Virtual key method and apparatus using the same, background system, and user terminal
CN106652129A (en) * 2016-11-29 2017-05-10 宁波飞拓电器有限公司 Door control system design method based on mobile phone APP (application)
US20170180125A1 (en) * 2015-12-17 2017-06-22 Deutsche Post Ag Device and method for the personalized provision of a key

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160197893A1 (en) * 2015-01-07 2016-07-07 WaveLynx Technologies Corporation Systems and methods for secure electronic access control
CN104933793A (en) * 2015-06-11 2015-09-23 宁波飞拓电器有限公司 Two-dimension code electronic key implementation method based on digital signature
US20170180125A1 (en) * 2015-12-17 2017-06-22 Deutsche Post Ag Device and method for the personalized provision of a key
CN105931337A (en) * 2016-05-09 2016-09-07 杭州摇光科技有限公司 Electronic lock device and system and authorizing method of electronic lock system
CN106603484A (en) * 2016-10-25 2017-04-26 雷飏 Virtual key method and apparatus using the same, background system, and user terminal
CN106652129A (en) * 2016-11-29 2017-05-10 宁波飞拓电器有限公司 Door control system design method based on mobile phone APP (application)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108830983A (en) * 2018-05-29 2018-11-16 广州蛙管家科技有限公司 A kind of access control system and its working method based on block chain
CN108830983B (en) * 2018-05-29 2021-03-02 广州足迹体育文化发展有限公司 Access control system based on block chain and working method thereof
CN109617703A (en) * 2019-01-31 2019-04-12 北京深思数盾科技股份有限公司 Key management method and device, electronic equipment and storage medium
CN109617703B (en) * 2019-01-31 2022-07-05 北京深思数盾科技股份有限公司 Key management method and device, electronic equipment and storage medium
CN110310406A (en) * 2019-07-24 2019-10-08 珠海格力电器股份有限公司 Unlocking method of intelligent door lock and intelligent door lock

Similar Documents

Publication Publication Date Title
US6073237A (en) Tamper resistant method and apparatus
JP3595109B2 (en) Authentication device, terminal device, authentication method in those devices, and storage medium
CN1820482B (en) Method for generating and managing a local area network
US20070271596A1 (en) Security, storage and communication system
CN107492161A (en) A kind of lock management scheme of time-based dynamic token and low-power consumption bluetooth technology
WO2007103298A2 (en) Security, storage and communication system
CN108900296B (en) Secret key storage method based on biological feature identification
US20130097427A1 (en) Soft-Token Authentication System
CN108447154A (en) Safe unlocking method and device, encryption and decryption method and device, lock and server
CN109474419A (en) A kind of living body portrait photo encryption and decryption method and encrypting and deciphering system
CN112565265B (en) Authentication method, authentication system and communication method between terminal devices of Internet of things
CN109272609A (en) A kind of CPU safety door inhibition control method and system
CN103391194B (en) The method and system that the safety equipment of user are unlocked
CN109285256A (en) Computer room based on block chain authentication enter permission give method
CN113886771A (en) Software authorization authentication method
CN111540093A (en) Access control system and control method thereof
CN108055124A (en) Lock administration system and lock management method
CN101192927B (en) Authorization based on identity confidentiality and multiple authentication method
CN1953366B (en) Password management method and system for intelligent secret key device
CN114401087B (en) Passive lock identity authentication and key agreement system based on state cryptographic algorithm
CN112073422A (en) Intelligent home protection system and protection method thereof
CN104753886B (en) It is a kind of to the locking method of remote user, unlocking method and device
CN106027464B (en) A kind of security information control method and identity card card-reading terminal
CN106855924A (en) Embedded intelligent chip equipment and background application system
CN107104792B (en) Portable mobile password management system and management method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20190214

Address after: Room 340, 1st floor, No. 350 Xianxia Road, Changning District, Shanghai, 200336

Applicant after: Shanghai Miaolian Digital Technology Co., Ltd.

Address before: 200020 No. 47, Nanchang Road, Shanghai, Luwan District

Applicant before: Lv Feng

TA01 Transfer of patent application right
RJ01 Rejection of invention patent application after publication

Application publication date: 20180518

RJ01 Rejection of invention patent application after publication