CN108055235B - Control method of intelligent lock, related equipment and system - Google Patents

Control method of intelligent lock, related equipment and system Download PDF

Info

Publication number
CN108055235B
CN108055235B CN201711057311.1A CN201711057311A CN108055235B CN 108055235 B CN108055235 B CN 108055235B CN 201711057311 A CN201711057311 A CN 201711057311A CN 108055235 B CN108055235 B CN 108055235B
Authority
CN
China
Prior art keywords
intelligent lock
mobile terminal
unlocking
random number
unlocking password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201711057311.1A
Other languages
Chinese (zh)
Other versions
CN108055235A (en
Inventor
刘政林
龚明杨
姚旭宁
闵闰
陈晓飞
郑朝霞
童乔凌
邹雪城
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huazhong University of Science and Technology
Original Assignee
Huazhong University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huazhong University of Science and Technology filed Critical Huazhong University of Science and Technology
Priority to CN201711057311.1A priority Critical patent/CN108055235B/en
Publication of CN108055235A publication Critical patent/CN108055235A/en
Application granted granted Critical
Publication of CN108055235B publication Critical patent/CN108055235B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/067Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a control method of an intelligent lock, related equipment and a system, wherein the control method comprises the following steps: the method comprises the steps that a mobile terminal obtains identification information of an intelligent lock and sends the identification information to a cloud server side, so that the cloud server side obtains first key information corresponding to the identification information; the mobile terminal receives first key information sent by a cloud server terminal, and sends an authentication instruction to the intelligent lock, so that the intelligent lock sends a first random number to the mobile terminal after passing the authentication of the mobile terminal, and a first unlocking password is generated by the first random number, wherein the authentication instruction is used for verifying the validity of the mobile terminal; the mobile terminal generates a second unlocking password of the intelligent lock according to the identification information, the first key information and the first random number, so that the intelligent lock is unlocked through the second unlocking password, and the unlocking operation is completed when the first unlocking password is matched with the second unlocking password. The invention can meet the requirements of cloud server side, intelligent lock and mobile terminal on safe communication.

Description

Control method of intelligent lock, related equipment and system
Technical Field
The invention belongs to the field of intelligent lock management, and particularly relates to a control method of an intelligent lock, and related equipment and a system.
Background
The intelligent lock system is composed of a cloud server, an intelligent lock and a mobile phone APP end, communication among the cloud server, the intelligent lock and the mobile phone APP end is conducted in a wireless mode, the possibility of monitoring the aerial wireless communication channel is achieved, and then cracking is conducted, so that unlocking of non-safety authentication is achieved. Most of the existing intelligent lock systems have some security attack problems, or the security locking and unlocking process is too complex to be applied to the field of low-cost wireless communication.
Disclosure of Invention
In view of the above defects or improvement needs in the prior art, the present invention provides a control method, related device and system for an intelligent lock, so as to solve the technical problems of low security of the existing intelligent lock system or high cost caused by too complicated safety locking and unlocking process.
To achieve the above object, according to an aspect of the present invention, there is provided a method for controlling an intelligent lock, including:
the method comprises the steps that a mobile terminal obtains identification information of an intelligent lock and sends the identification information to a cloud server side, so that the cloud server side obtains first key information corresponding to the identification information;
the mobile terminal receives the first key information sent by the cloud server, and sends an authentication instruction to the intelligent lock, so that after the intelligent lock passes the authentication of the mobile terminal, a first random number is sent to the mobile terminal, and a first unlocking password is generated by the first random number, wherein the authentication instruction is used for verifying the legality of the mobile terminal;
and the mobile terminal generates a second unlocking password of the intelligent lock according to the identification information, the first key information and the first random number, so that the intelligent lock is unlocked by the second unlocking password, and the intelligent lock completes unlocking operation when the first unlocking password is matched with the second unlocking password.
Preferably, the data to be transmitted between the mobile terminal and the cloud server is encrypted by second key information and then transmitted, wherein the second key information is a key corresponding to the identification information of the mobile terminal;
and the data to be transmitted between the mobile terminal and the intelligent lock is encrypted through the first key information and then transmitted.
Preferably, the generating, by the mobile terminal, a second unlocking password of the smart lock according to the identification information, the first key information, and the first random number includes:
and the mobile terminal generates a first encryption value of the first random number according to the identification information, the first key information and the first random number, and extracts a plurality of bits from the first encryption value as a second unlocking password of the intelligent lock.
Preferably, the method further comprises:
and the mobile terminal obtains a new unlocking instruction by carrying out XOR on the first encryption value of the first random number and the unlocking instruction, generates an encryption value of the new unlocking instruction, and sends the encryption value of the new unlocking instruction to the intelligent lock so as to realize unlocking by the intelligent lock.
Preferably, the method further comprises:
the mobile terminal receives a locked instruction sent by the intelligent lock, generates a second random number, generates a second encryption value of the second random number, and simultaneously sends the second random number to the intelligent lock so as to generate a third encryption value of the second random number by the intelligent lock;
and the mobile terminal receives the third encrypted value sent by the intelligent lock, judges whether the third encrypted value is matched with the second encrypted value or not, outputs locking success information if the third encrypted value is matched with the second encrypted value, and outputs locking failure information if the third encrypted value is not matched with the second encrypted value.
According to another aspect of the present invention, there is provided a method for controlling an intelligent lock, including:
the intelligent lock receives an authentication instruction sent by a mobile terminal, and the validity of the mobile terminal is verified by the authentication instruction;
if the mobile terminal is legal, generating a first random number by the intelligent lock, generating a first encryption value of the first random number, extracting a plurality of bits from the first encryption value as a first unlocking password of the intelligent lock, and simultaneously sending the first random number to the mobile terminal so as to generate a second unlocking password of the intelligent lock by the mobile terminal according to the first random number;
the intelligent lock receives an unlocking instruction, and completes unlocking operation when the second unlocking password is matched with the first unlocking password, wherein the unlocking instruction comprises the second unlocking password.
Preferably, the data to be transmitted between the mobile terminal and the intelligent lock is encrypted by key information and then transmitted, wherein the key information is the key information which is acquired by the mobile terminal from a cloud server and corresponds to the identification information of the intelligent lock.
Preferably, the method further comprises:
after the intelligent lock detects the locking, a locked instruction is sent to the mobile terminal, so that the mobile terminal generates a second random number after receiving the locked instruction and generates a second encryption value of the second random number;
and the intelligent lock receives the second random number sent by the mobile terminal, generates a third encryption value of the second random number, and simultaneously sends the third encryption value to the mobile terminal, so that the mobile terminal judges the locking state according to the matching relation between the third encryption value and the second encryption value.
According to another aspect of the present invention, there is provided a mobile terminal including:
the acquisition module is used for acquiring the identification information of the intelligent lock;
the first sending module is used for sending the identification information to a cloud server so that the cloud server can obtain first key information corresponding to the identification information;
the first receiving module is used for receiving the first key information sent by the cloud server side;
the second sending module is used for sending an authentication instruction to the intelligent lock, so that the intelligent lock sends a first random number to the mobile terminal after passing the authentication of the mobile terminal, and a first unlocking password is generated by the first random number, wherein the authentication instruction is used for verifying the legality of the mobile terminal;
and the encryption module is used for generating a second unlocking password of the intelligent lock according to the identification information, the first key information and the first random number, so that the intelligent lock is unlocked by the second unlocking password, and the intelligent lock completes unlocking operation when the first unlocking password is matched with the second unlocking password.
According to another aspect of the present invention, there is provided a smart lock, comprising:
the first receiving module is used for receiving an authentication instruction sent by the mobile terminal;
the verification module is used for verifying the validity of the mobile terminal by the authentication instruction;
the encryption module is used for generating a first random number when the mobile terminal is legal, generating a first encryption value of the first random number, and extracting a plurality of bits from the first encryption value to be used as a first unlocking password of the intelligent lock;
the sending module is used for sending the first random number to the mobile terminal so that the mobile terminal generates a second unlocking password of the intelligent lock according to the first random number;
the second receiving module is used for receiving an unlocking instruction, wherein the unlocking instruction comprises the second unlocking password;
and the unlocking module is used for completing unlocking operation when the second unlocking password is matched with the first unlocking password.
According to another aspect of the present invention, there is provided a control system of an intelligent lock, including: the system comprises a mobile terminal, an intelligent lock and a cloud server side;
the mobile terminal is used for acquiring the identification information of the intelligent lock and sending the identification information of the intelligent lock to the cloud server;
the cloud server side is used for receiving the identification information of the intelligent lock, acquiring first key information corresponding to the identification information of the intelligent lock, and sending the first key information to the mobile terminal;
the mobile terminal is further used for receiving the first key information and sending an authentication instruction to the intelligent lock;
the intelligent lock is used for receiving the authentication instruction, sending a first random number to the mobile terminal after the mobile terminal passes the authentication, and generating a first unlocking password by the first random number, wherein the authentication instruction is used for verifying the legality of the mobile terminal;
the mobile terminal is further configured to generate a second unlocking password of the intelligent lock according to the identification information, the first key information and the first random number, so that the intelligent lock is unlocked by the second unlocking password;
the intelligent lock is further used for completing unlocking operation when the first unlocking password is matched with the second unlocking password.
In general, compared with the prior art, the above technical solution contemplated by the present invention can achieve the following beneficial effects:
through the control mechanism in the invention, the unlocking password is required to be independently generated in the intelligent lock and the mobile terminal, and the communication contents among the intelligent lock, the server end and the mobile terminal do not comprise the unlocking password or the encryption ciphertext of the unlocking password. The security of the process can be ensured, and a malicious attacker is prevented from monitoring the communication among the intelligent lock, the mobile terminal and the cloud server.
Drawings
Fig. 1 is a schematic flowchart of a control method of an intelligent lock according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart illustrating another method for controlling an intelligent lock according to an embodiment of the present invention;
fig. 3 is a schematic flow chart of a control method of an intelligent lock relating to an unlocking method according to an embodiment of the present invention;
fig. 4 is a schematic flow chart of a locking mode in the control method of the intelligent lock disclosed in the embodiment of the present invention;
fig. 5 is a schematic structural diagram of a control system of an intelligent lock according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. In addition, the technical features involved in the embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
The terms "first" and "second," and the like in the description and claims of the present invention and the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "comprises" and any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
The invention relates to a control method of an intelligent lock, and related equipment and a system. And the cloud server stores the key of each intelligent lock and the key corresponding to the mobile terminal. In the process of controlling the intelligent lock by using the mobile terminal, the control mechanism in the invention ensures the process security, prevents a malicious attacker from monitoring the communication among the intelligent lock, the mobile terminal and the cloud server, and identifies malicious users, wherein the behaviors of the malicious users include but are not limited to: no record unlocking, eavesdropping other people to unlock by password, record but no charge, etc. The invention also provides an intelligent lock unlocking password generation method, the method requires that the unlocking password is independently generated at the intelligent lock, the cloud server end and the mobile terminal, and the communication contents among the intelligent lock, the server end and the mobile terminal do not include the unlocking password or the encryption ciphertext of the unlocking password.
In the embodiment of the present invention, the Mobile terminal includes a Mobile terminal running an Android operating system, an iOS operating system, a Windows operating system, or other operating systems, for example, various Mobile terminals such as a Mobile phone, a tablet computer, a Personal Digital Assistant (PDA), a Mobile Internet Device (MID), and the like.
In the embodiment of the invention, each intelligent lock has unique identification information UID1, and each UID1 corresponds to a group of secret keys KUIDThe UID1 and the key K are stored in the intelligent lockUIDSecret key K used in smart lockUIDWriting in during production and manufacturing, backing up one set at the cloud server side, and not storing K in the mobile terminalUID(ii) a Each mobile terminal has a UID2 and a subkey K at the time of user registrationAPPUID2 and corresponding KAPPA set of copies is also stored at the cloud server; k of mobile terminalAPPAnd in the stage of registering and using the APP by the user, the APP is issued by the cloud server. The communication between the three is encrypted by using a key management mechanism in the invention and then wireless transmission is carried out; the unlocking password of the intelligent lock is generated by the intelligent lock and the mobile terminal respectively and synchronously without wireless transmission, so that the problem that the unlocking password is wiretapped is solved.
The intelligent lock system comprises an intelligent lock, a mobile terminal and a cloud server, and the intelligent lock, the mobile terminal and the cloud server are in wireless interactive communication. The method described in the present invention describes a bidirectional authentication process of the smart lock and the mobile terminal, and the interactive communication mode between the smart lock and the mobile terminal may be a bluetooth, Zigbee, ISO14443, or other wireless mode.
The method described in the present invention describes a communication process between the cloud server and the mobile terminal, and the interactive communication mode between the cloud server and the mobile terminal may be a GPRS, 3G, 4G, 5G, Nb-iot, LoRA, or other wireless mode, and specifically, which wireless mode is adopted is not limited uniquely in the embodiments of the present invention.
The encryption algorithm adopted by the invention can be DES, 3DES, AES-128, AES-196, AES-256, SM4, SHA-1, SHA-256, SM3, RSA1024, RSA2048, ECC192, ECC256 and SM2, and the embodiment of the invention specifically adopts any wireless mode and is not limited uniquely.
In the embodiment of the invention, a secret key used for encryption and decryption of the mobile terminal and the cloud server is KAPP(ii) a The secret key used for encrypting and decrypting the mobile terminal and the intelligent lock is KUID(ii) a The secret key used in encryption and decryption of the cloud server side and the intelligent lock is KUID
Fig. 1 is a schematic flow chart of a control method of an intelligent lock according to an embodiment of the present invention, where the method shown in fig. 1 includes the following steps:
s1: the method comprises the steps that a mobile terminal obtains identification information of an intelligent lock and sends the identification information to a cloud server side, so that the cloud server side obtains first key information corresponding to the identification information;
optionally, the mobile terminal may obtain the identification information of the smart lock by scanning a two-dimensional code on the smart lock, or obtain the identification information of the smart lock from the internet by using the model of the smart lock, and the specific manner of the embodiment of the present invention is not limited uniquely.
S2: the mobile terminal receives first key information sent by the cloud server, and sends an authentication instruction to the intelligent lock, so that the intelligent lock sends a first random number to the mobile terminal after passing the authentication of the mobile terminal, and a first unlocking password is generated by the first random number, wherein the authentication instruction is used for verifying the legality of the mobile terminal;
s3: the mobile terminal generates a second unlocking password of the intelligent lock according to the identification information, the first key information and the first random number, so that the intelligent lock is unlocked through the second unlocking password, and the intelligent lock completes unlocking when the first unlocking password is matched with the second unlocking password.
As an optional implementation manner, after the mobile terminal scans the two-dimensional code of the intelligent lock to obtain the identification information of the intelligent lock, the identification information of the mobile terminal and the unlocking instruction can be sent to the cloud server, the cloud server sends the unlocking instruction to the intelligent lock to unlock, and meanwhile, the unlocking information is encrypted and then sent to the mobile terminal.
In the embodiment of the invention, the unlocking mode can be as follows: and the user manually inputs a second unlocking password in the intelligent lock, or the mobile terminal sends an unlocking instruction to the intelligent lock to automatically unlock the intelligent lock, and the like.
The method process that the mobile terminal sends the unlocking instruction to the intelligent lock to automatically unlock the intelligent lock is as follows:
and the mobile terminal obtains a new unlocking instruction by carrying out XOR on the first encryption value of the first random number and the unlocking instruction, generates an encryption value of the new unlocking instruction, and sends the encryption value of the new unlocking instruction to the intelligent lock so as to realize unlocking by the intelligent lock.
In the embodiment of the present invention, the generating, by the mobile terminal, the second unlocking password of the smart lock according to the identification information, the first key information, and the first random number includes:
the mobile terminal generates a first encryption value of the first random number according to the identification information, the first key information and the first random number, and extracts a plurality of bits from the first encryption value to be used as a second unlocking password of the intelligent lock.
In the embodiment of the invention, data to be transmitted between the mobile terminal and the cloud server terminal are encrypted through second key information and then transmitted, wherein the second key information is a key corresponding to the identification information of the mobile terminal; and the data to be transmitted between the mobile terminal and the intelligent lock is encrypted through the first key information and then transmitted.
In an embodiment of the present invention, the method further includes:
the mobile terminal receives a locked instruction sent by the intelligent lock, generates a second random number, generates a second encrypted value of the second random number, and simultaneously sends the second random number to the intelligent lock so as to generate a third encrypted value of the second random number by the intelligent lock;
and the mobile terminal receives the third encryption value sent by the intelligent lock, judges whether the third encryption value is matched with the second encryption value or not, outputs the locking success information if the third encryption value is matched with the second encryption value, and outputs the locking failure information if the third encryption value is not matched with the second encryption value.
As an optional implementation manner, the intelligent lock may further encrypt the locking information and send the encrypted locking information to the cloud server; and after the decryption by the cloud server, recording the locking information, encrypting the locking information and then sending the encrypted locking information to the mobile terminal.
In the embodiment of the invention, after unlocking or locking, the mobile terminal sends the locking and unlocking information to the cloud server, and the cloud server records the locking and unlocking information.
Fig. 2 is a schematic flow chart of another method for controlling an intelligent lock according to an embodiment of the present invention, where the method shown in fig. 2 includes the following steps:
a1: the intelligent lock receives an authentication instruction sent by the mobile terminal, and the validity of the mobile terminal is verified by the authentication instruction;
a2: if the mobile terminal is legal, generating a first random number by the intelligent lock, generating a first encryption value of the first random number, extracting a plurality of bits from the first encryption value as a first unlocking password of the intelligent lock, and simultaneously sending the first random number to the mobile terminal so as to generate a second unlocking password of the intelligent lock by the mobile terminal according to the first random number;
the intelligent lock receives the unlocking instruction, and completes unlocking operation when the second unlocking password is matched with the first unlocking password, wherein the unlocking instruction comprises the second unlocking password.
In an embodiment of the present invention, the method further includes:
after the intelligent lock detects the locking, a locked instruction is sent to the mobile terminal, so that the mobile terminal generates a second random number after receiving the locked instruction and generates a second encryption value of the second random number;
and the intelligent lock receives the second random number sent by the mobile terminal, generates a third encryption value of the second random number, and simultaneously sends the third encryption value to the mobile terminal, so that the mobile terminal judges the locking state according to the matching relation between the third encryption value and the second encryption value.
In another aspect of the present invention, there is provided a mobile terminal including:
the acquisition module is used for acquiring the identification information of the intelligent lock;
the first sending module is used for sending the identification information to the cloud server so that the cloud server can obtain first key information corresponding to the identification information;
the first receiving module is used for receiving first key information sent by the cloud server;
the second sending module is used for sending an authentication instruction to the intelligent lock so that the intelligent lock sends a first random number to the mobile terminal after the mobile terminal passes authentication, and a first unlocking password is generated by the first random number, wherein the authentication instruction is used for verifying the legality of the mobile terminal;
and the encryption module is used for generating a second unlocking password of the intelligent lock according to the identification information, the first key information and the first random number so as to carry out unlocking operation on the intelligent lock by the second unlocking password, and the intelligent lock completes the unlocking operation when the first unlocking password is matched with the second unlocking password.
In another aspect of the present invention, there is provided a smart lock, including:
the first receiving module is used for receiving an authentication instruction sent by the mobile terminal;
the verification module is used for verifying the validity of the mobile terminal by the authentication instruction;
the encryption module is used for generating a first random number when the mobile terminal is legal, generating a first encryption value of the first random number, and extracting a plurality of bits from the first encryption value to be used as a first unlocking password of the intelligent lock;
the sending module is used for sending the first random number to the mobile terminal so that the mobile terminal generates a second unlocking password of the intelligent lock according to the first random number;
the second receiving module is used for receiving an unlocking instruction, wherein the unlocking instruction comprises a second unlocking password;
and the unlocking module is used for completing unlocking operation when the second unlocking password is matched with the first unlocking password.
The present invention will be described in detail below with reference to the accompanying drawings and examples.
Fig. 3 is a schematic flow chart of a control method of an intelligent lock according to an embodiment of the present invention, relating to an unlocking method; the method specifically comprises the following steps:
1. when a user unlocks the lock, the mobile terminal is used for scanning the two-dimensional code on the intelligent lock to obtain the UID1 of the intelligent lock, and the mobile terminal encrypts the UID1 through the encryption and decryption module1 and then sends the encrypted UID1 to the cloud server; after the cloud server decrypts the key (K) corresponding to the UID1UID) The encrypted data is returned to the mobile terminal after being encrypted by the encryption and decryption module 1; kUIDThe UID1 information and the corresponding K are cleared after the mobile phone is restarted or locked after the mobile phone is placed in the memory of the mobile terminalUID
2. The mobile terminal sends an authentication instruction data frame to the intelligent lock through the interface, and the authentication instruction is a specific data code stream;
3. after receiving the authentication instruction, the intelligent lock returns a group of random numbers Rng1 to the mobile terminal; meanwhile, an encryption algorithm module2 is called, and a Message Authentication Code (MAC) value of Rng1 is calculated to obtain Mac 1; extracting partial data from Mac1 as an unlocking password Key1 of the intelligent lock;
4. after receiving the random number Rng1, the mobile terminal calls an encryption algorithm module2 to calculate the MAC value of Rng1 to obtain Mac2, extracts partial data from Mac2 to serve as the unlocking password Key2 of the intelligent lock, wherein Key2 is equal to Key1, and Key2 is used for unlocking the intelligent lock at this time, and the unlocking mode includes but is not limited to: the user unlocks after the unlocking password is displayed by the mobile phone and the Key2 is input or the mobile terminal sends an unlocking instruction to the intelligent lock to automatically unlock and the like;
the process that the mobile terminal automatically sends the unlocking instruction is as follows: XOR the MAC and the unlocking instruction in the step 4 to obtain a new unlocking instruction CCMDCalling the encryption module to generate CCMDCryptographic value (MAC)CMD) Of MACCMDSending the data to an intelligent lock to realize unlocking;
5. the mobile terminal encrypts the unlocking state and the UID1 corresponding to the intelligent lock and the UID2 of the mobile terminal through module1 and then sends the encrypted unlocking state and intelligent lock to the cloud server side, and the unlocking information is recorded;
fig. 4 is a schematic flow chart showing a locking mode in the control method of the intelligent lock according to the embodiment of the present invention; the method specifically comprises the following steps:
1. the intelligent lock is locked by a user manually;
2. the intelligent lock sends a lock closing instruction to the mobile terminal;
3. the mobile terminal sends a random number Rng2 to the intelligent lock; meanwhile, an encryption algorithm module2 is called, and the MAC value of Rng2 is calculated to obtain Mac 3;
4. after the intelligent lock receives the Rng2, calling an encryption algorithm module2, calculating the MAC value of the Rng2 to obtain a Mac4, and sending the Mac4 to the mobile terminal;
5. after receiving Mac4, the mobile terminal compares Mac4 with Mac3, if the Mac4 is different from the Mac3, the bidirectional authentication process is ended, and the mobile terminal gives a lock closing failure identifier; if the Mac4 is the same as the Mac3, the fact that the intelligent lock is successfully locked is displayed, and locking information and the corresponding UID are sent to the cloud server side.
Fig. 5 is a schematic structural diagram of a control system of an intelligent lock according to an embodiment of the present invention, including: the system comprises a mobile terminal, an intelligent lock and a cloud server side;
the mobile terminal is used for acquiring identification information of the intelligent lock and sending the identification information of the intelligent lock to the cloud server;
the cloud server side is used for receiving the identification information of the intelligent lock, acquiring first key information corresponding to the identification information of the intelligent lock, and sending the first key information to the mobile terminal;
the mobile terminal is also used for receiving the first key information and sending an authentication instruction to the intelligent lock;
the intelligent lock is used for receiving the authentication instruction, sending a first random number to the mobile terminal after the mobile terminal passes the authentication, and generating a first unlocking password by the first random number, wherein the authentication instruction is used for verifying the legality of the mobile terminal;
the mobile terminal is further used for generating a second unlocking password of the intelligent lock according to the identification information, the first secret key information and the first random number, so that the intelligent lock is unlocked through the second unlocking password;
the intelligent lock is also used for completing the unlocking operation when the first unlocking password is matched with the second unlocking password.
It will be understood by those skilled in the art that the foregoing is only a preferred embodiment of the present invention, and is not intended to limit the invention, and that any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (10)

1. A control method of an intelligent lock is characterized by comprising the following steps:
each intelligent lock has unique identification information UID1, and each UID1 corresponds to a group of secret keys KUIDThe UID1 and the key K are stored in the intelligent lockUIDSecret key K used in smart lockUIDWriting in during production and manufacturing, and backing up a set at a cloud server side;
the method comprises the steps that a mobile terminal obtains identification information of an intelligent lock and sends the identification information to a cloud server side, so that the cloud server side obtains first key information corresponding to the identification information;
the mobile terminal receives the first key information sent by the cloud server, and sends an authentication instruction to the intelligent lock, so that after the intelligent lock passes the authentication of the mobile terminal, a first random number is sent to the mobile terminal, and a first unlocking password is generated by the first random number, wherein the authentication instruction is used for verifying the legality of the mobile terminal;
the mobile terminal generates a second unlocking password of the intelligent lock according to the identification information, the first key information and the first random number, so that the intelligent lock is unlocked by the second unlocking password, and the intelligent lock completes unlocking operation when the first unlocking password is matched with the second unlocking password;
the unlocking mode is as follows: the user manually inputs a second unlocking password in the intelligent lock, or the mobile terminal sends an unlocking instruction to the intelligent lock to automatically unlock the intelligent lock;
and after locking, the mobile terminal clears the identification information and the first key information of the intelligent lock.
2. The method according to claim 1, wherein the data to be transmitted between the mobile terminal and the cloud server is encrypted by second key information and then transmitted, wherein the second key information is a key corresponding to the identification information of the mobile terminal;
and the data to be transmitted between the mobile terminal and the intelligent lock is encrypted through the first key information and then transmitted.
3. The method according to claim 1, wherein the generating, by the mobile terminal, a second unlocking password of the smart lock according to the identification information, the first key information, and the first random number comprises:
and the mobile terminal generates a first encryption value of the first random number according to the identification information, the first key information and the first random number, and extracts a plurality of bits from the first encryption value as a second unlocking password of the intelligent lock.
4. A method according to any one of claims 1 to 3, characterized in that the method further comprises:
the mobile terminal receives a locked instruction sent by the intelligent lock, generates a second random number, generates a second encryption value of the second random number, and simultaneously sends the second random number to the intelligent lock so as to generate a third encryption value of the second random number by the intelligent lock;
and the mobile terminal receives the third encrypted value sent by the intelligent lock, judges whether the third encrypted value is matched with the second encrypted value or not, outputs locking success information if the third encrypted value is matched with the second encrypted value, and outputs locking failure information if the third encrypted value is not matched with the second encrypted value.
5. A control method of an intelligent lock is characterized by comprising the following steps:
each intelligent lock has unique identification information UID1, and each UID1 corresponds to a group of secret keys KUIDThe UID1 and the key K are stored in the intelligent lockUIDSecret key K used in smart lockUIDWriting in during production and manufacturing, and backing up a set at a cloud server side;
the intelligent lock receives an authentication instruction sent by a mobile terminal, and the validity of the mobile terminal is verified by the authentication instruction;
if the mobile terminal is legal, generating a first random number by the intelligent lock, generating a first encryption value of the first random number, extracting a plurality of bits from the first encryption value as a first unlocking password of the intelligent lock, and simultaneously sending the first random number to the mobile terminal so as to generate a second unlocking password of the intelligent lock by the mobile terminal according to the first random number;
the intelligent lock receives an unlocking instruction, and completes unlocking operation when the second unlocking password is matched with the first unlocking password, wherein the unlocking instruction comprises the second unlocking password;
the unlocking mode is as follows: and the user manually inputs a second unlocking password in the intelligent lock, or the mobile terminal sends an unlocking instruction to the intelligent lock to automatically unlock the intelligent lock.
6. The method according to claim 5, wherein the data to be transmitted between the mobile terminal and the smart lock is transmitted after being encrypted by key information, wherein the key information is the key information corresponding to the identification information of the smart lock, which is acquired by the mobile terminal from a cloud server.
7. The method of claim 5 or 6, further comprising:
after the intelligent lock detects the locking, a locked instruction is sent to the mobile terminal, so that the mobile terminal generates a second random number after receiving the locked instruction and generates a second encryption value of the second random number;
and the intelligent lock receives the second random number sent by the mobile terminal, generates a third encryption value of the second random number, and simultaneously sends the third encryption value to the mobile terminal, so that the mobile terminal judges the locking state according to the matching relation between the third encryption value and the second encryption value.
8. A mobile terminal, comprising:
the acquisition module is used for acquiring the identification information of the intelligent lock;
the first sending module is used for sending the identification information to a cloud server so that the cloud server can obtain first key information corresponding to the identification information;
the first receiving module is used for receiving the first key information sent by the cloud server side;
the second sending module is used for sending an authentication instruction to the intelligent lock, so that the intelligent lock sends a first random number to the mobile terminal after passing the authentication of the mobile terminal, and a first unlocking password is generated by the first random number, wherein the authentication instruction is used for verifying the legality of the mobile terminal;
the encryption module is used for generating a second unlocking password of the intelligent lock according to the identification information, the first key information and the first random number, so that the intelligent lock is unlocked by the second unlocking password, and the intelligent lock completes unlocking operation when the first unlocking password is matched with the second unlocking password;
each intelligent lock has unique identification information UID1, and each UID1 corresponds to a group of secret keys KUIDThe UID1 and the key K are stored in the intelligent lockUIDSecret key K used in smart lockUIDWriting in during production and manufacturing, and backing up a set at a cloud server side;
the unlocking mode is as follows: and the user manually inputs a second unlocking password in the intelligent lock, or the mobile terminal sends an unlocking instruction to the intelligent lock to automatically unlock the intelligent lock.
9. An intelligent lock, comprising:
the first receiving module is used for receiving an authentication instruction sent by the mobile terminal;
the verification module is used for verifying the validity of the mobile terminal by the authentication instruction;
the encryption module is used for generating a first random number when the mobile terminal is legal, generating a first encryption value of the first random number, and extracting a plurality of bits from the first encryption value to be used as a first unlocking password of the intelligent lock;
the sending module is used for sending the first random number to the mobile terminal so that the mobile terminal generates a second unlocking password of the intelligent lock according to the first random number;
the second receiving module is used for receiving an unlocking instruction, wherein the unlocking instruction comprises the second unlocking password;
the unlocking module is used for completing unlocking operation when the second unlocking password is matched with the first unlocking password;
each intelligent lock has unique identification information UID1, and each UID1 corresponds to a group of secret keys KUIDThe UID1 and the key K are stored in the intelligent lockUIDSecret key K used in smart lockUIDWriting in during production and manufacturing, and backing up a set at a cloud server side;
the unlocking mode is as follows: and the user manually inputs a second unlocking password in the intelligent lock, or the mobile terminal sends an unlocking instruction to the intelligent lock to automatically unlock the intelligent lock.
10. A control system for an intelligent lock, comprising: the system comprises a mobile terminal, an intelligent lock and a cloud server side;
the mobile terminal is used for acquiring the identification information of the intelligent lock and sending the identification information of the intelligent lock to the cloud server;
the cloud server side is used for receiving the identification information of the intelligent lock, acquiring first key information corresponding to the identification information of the intelligent lock, and sending the first key information to the mobile terminal;
the mobile terminal is further used for receiving the first key information and sending an authentication instruction to the intelligent lock;
the intelligent lock is used for receiving the authentication instruction, sending a first random number to the mobile terminal after the mobile terminal passes the authentication, and generating a first unlocking password by the first random number, wherein the authentication instruction is used for verifying the legality of the mobile terminal;
the mobile terminal is further configured to generate a second unlocking password of the intelligent lock according to the identification information, the first key information and the first random number, so that the intelligent lock is unlocked by the second unlocking password;
the intelligent lock is also used for completing unlocking operation when the first unlocking password is matched with the second unlocking password;
each intelligent lock has unique identification information UID1, and each UID1 corresponds to a group of secret keys KUIDThe UID1 and the key K are stored in the intelligent lockUIDSecret key K used in smart lockUIDWriting in during production and manufacturing, and backing up a set at a cloud server side;
the unlocking mode is as follows: and the user manually inputs a second unlocking password in the intelligent lock, or the mobile terminal sends an unlocking instruction to the intelligent lock to automatically unlock the intelligent lock.
CN201711057311.1A 2017-11-01 2017-11-01 Control method of intelligent lock, related equipment and system Expired - Fee Related CN108055235B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711057311.1A CN108055235B (en) 2017-11-01 2017-11-01 Control method of intelligent lock, related equipment and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711057311.1A CN108055235B (en) 2017-11-01 2017-11-01 Control method of intelligent lock, related equipment and system

Publications (2)

Publication Number Publication Date
CN108055235A CN108055235A (en) 2018-05-18
CN108055235B true CN108055235B (en) 2020-09-18

Family

ID=62119816

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711057311.1A Expired - Fee Related CN108055235B (en) 2017-11-01 2017-11-01 Control method of intelligent lock, related equipment and system

Country Status (1)

Country Link
CN (1) CN108055235B (en)

Families Citing this family (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107978047B (en) * 2017-12-04 2019-05-07 北京深思数盾科技股份有限公司 Use the methods, devices and systems of password unlocking
CN109035500A (en) * 2018-07-02 2018-12-18 深圳市沃特沃德股份有限公司 Open the method and APP client of intelligent door lock
CN109243018B (en) * 2018-08-23 2021-12-28 杭州立为科技有限公司 Automatic encryption method between intelligent lock control system modules, intelligent lock and storage medium
WO2020088623A1 (en) * 2018-10-31 2020-05-07 云丁网络技术(北京)有限公司 Intelligent device control method and system
CN111277350A (en) * 2018-12-04 2020-06-12 李舒云 Clock management method, clock acquisition method, terminal and storage medium
CN111355680B (en) * 2018-12-04 2022-10-21 李舒云 Key distribution method, key receiving method, electronic terminal and storage medium
CN111275852A (en) * 2018-12-04 2020-06-12 李舒云 Lock terminal management method, system, shared object and storage medium
CN109448197A (en) * 2018-12-18 2019-03-08 杭州高锦科技有限公司 A kind of cloud intelligent lock system and key management method based on multi-enciphering mode
CN111401086A (en) * 2018-12-29 2020-07-10 天津朗波微电子有限公司 NFC mobile phone terminal anti-counterfeiting traceability system with bidirectional encryption authentication
CN109872436A (en) * 2019-03-20 2019-06-11 苏州迈瑞微电子有限公司 A kind of control method of smart lock, device, system and storage medium
CN110379057B (en) * 2019-07-17 2021-10-01 广东臣家智能科技股份有限公司 Intelligent lock initialization method, intelligent lock and initialization confirmation code generation method thereof
CN110766524B (en) * 2019-10-25 2022-09-06 浙江大华技术股份有限公司 Online booking self-service check-in method and storage device
CN111047744A (en) * 2019-12-28 2020-04-21 北京深思数盾科技股份有限公司 Digital unlocking method and device, electronic door lock and storage medium
CN111508108B (en) * 2020-03-20 2022-03-18 中能瑞通(北京)科技有限公司 Encryption system and decryption system for intelligent lock data communication
CN112348998B (en) * 2020-07-24 2024-03-12 深圳Tcl新技术有限公司 Method and device for generating one-time password, intelligent door lock and storage medium
CN112037382A (en) * 2020-09-08 2020-12-04 北京紫光安芯科技有限公司 Door lock control system and method and intelligent door lock
CN112053476A (en) * 2020-09-08 2020-12-08 四川铁集共联科技股份有限公司 Encryption method and system based on intelligent lock and mobile phone terminal
CN112466010B (en) * 2020-11-26 2022-06-17 汤泽金 Intelligent rescue door lock
CN112950817B (en) * 2021-01-28 2022-12-02 深圳市凯迪仕智能科技有限公司 Encryption communication method of split type intelligent lock and split type intelligent lock
CN113516811B (en) * 2021-04-23 2023-03-14 摩拜(北京)信息技术有限公司 Article using method and device
CN113282945B (en) * 2021-06-29 2023-03-24 珠海优特电力科技股份有限公司 Intelligent lock authority management method and device, electronic equipment and storage medium
CN113282944B (en) * 2021-06-29 2023-03-10 珠海优特电力科技股份有限公司 Intelligent lock unlocking method and device, electronic equipment and storage medium
CN113850938B (en) * 2021-09-28 2023-08-01 深圳Tcl新技术有限公司 Intelligent door lock control method and device, storage medium and electronic equipment
CN114267103A (en) * 2021-12-06 2022-04-01 深圳供电局有限公司 Management system and method for intelligent lock of power supply equipment
CN114244509A (en) * 2021-12-17 2022-03-25 北京国泰网信科技有限公司 Method for carrying out SM2 one-time pad bidirectional authentication unlocking by using mobile terminal
CN114299643B (en) * 2021-12-24 2023-11-14 北京纬百科技有限公司 Door lock management method and device, storage medium and electronic equipment
CN114299645A (en) * 2022-01-12 2022-04-08 初蓝物联科技(上海)有限公司 Encryption communication method for padlock of Internet of things
CN114448727B (en) * 2022-04-02 2022-06-21 中国信息通信研究院 Information processing method and system based on industrial internet identification analysis system
CN116543485A (en) * 2023-06-15 2023-08-04 智慧云联信息技术(北京)有限公司 Emergency help seeking method, system, electronic equipment and storage medium
CN116527258B (en) * 2023-06-30 2023-09-22 深圳市旭子科技有限公司 Unlocking method, device, equipment and storage medium of coded lock
CN116527409B (en) * 2023-07-05 2023-10-20 深圳市旭子科技有限公司 Internet of things lock-based network access identity recognition method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102392561A (en) * 2011-09-08 2012-03-28 珠海汇金科技有限公司 Wireless dynamic code lock and control method thereof
CN104282062A (en) * 2014-08-21 2015-01-14 厦门华数电力科技有限公司 Locking and unlocking method based on safe and intelligent lock system
CN104583028A (en) * 2012-08-30 2015-04-29 德克萨斯仪器股份有限公司 One-way key fob and vehicle pairing
CN105635089A (en) * 2014-11-28 2016-06-01 珠海汇金科技股份有限公司 Authentication method, unlocking method and unlocking system for dynamic password lock

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106780917A (en) * 2017-01-11 2017-05-31 上海共佰克智能科技有限公司 The control method and system of lock

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102392561A (en) * 2011-09-08 2012-03-28 珠海汇金科技有限公司 Wireless dynamic code lock and control method thereof
CN104583028A (en) * 2012-08-30 2015-04-29 德克萨斯仪器股份有限公司 One-way key fob and vehicle pairing
CN104282062A (en) * 2014-08-21 2015-01-14 厦门华数电力科技有限公司 Locking and unlocking method based on safe and intelligent lock system
CN105635089A (en) * 2014-11-28 2016-06-01 珠海汇金科技股份有限公司 Authentication method, unlocking method and unlocking system for dynamic password lock

Also Published As

Publication number Publication date
CN108055235A (en) 2018-05-18

Similar Documents

Publication Publication Date Title
CN108055235B (en) Control method of intelligent lock, related equipment and system
CN105050081B (en) Method, device and system for connecting network access device to wireless network access point
CN107978047B (en) Use the methods, devices and systems of password unlocking
CN106161032B (en) A kind of identity authentication method and device
CN110334498B (en) Method for unlocking one device by using the other device
JP4712871B2 (en) Method for comprehensive authentication and management of service provider, terminal and user identification module, and system and terminal apparatus using the method
KR100843072B1 (en) Wireless network system and communication method using wireless network system
US8930700B2 (en) Remote device secure data file storage system and method
CN101300808B (en) Method and arrangement for secure autentication
CN1939028B (en) Accessing protected data on network storage from multiple devices
CN103201998B (en) For the protection of the data processing of the local resource in mobile device
CN106603484A (en) Virtual key method and apparatus using the same, background system, and user terminal
CN106789024B (en) A kind of remote de-locking method, device and system
CN105828332A (en) Method of improving wireless local area authentication mechanism
CN101990201B (en) Method, system and device for generating general bootstrapping architecture (GBA) secret key
CN104521213A (en) Manipulation and restoration of authentication challenge parameters in network authentication procedures
CN109474419A (en) A kind of living body portrait photo encryption and decryption method and encrypting and deciphering system
CN101895881B (en) Method for realizing GBA secret key and pluggable equipment of terminal
CN110322600B (en) Control method of electronic lock and electronic lock
CN101888626B (en) Method and terminal equipment for realizing GBA key
CN101192927A (en) Authorization based on identity confidentiality and multiple authentication method
CN105827403B (en) Security method, security gate and server
CN106603486B (en) Method and system for security authorization of mobile terminal
KR101172876B1 (en) System and method for performing mutual authentication between user terminal and server
CN108965266A (en) A kind of User-to-User identity authorization system and method based on group key pond and Kerberos

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200918