CN108171831B - Bidirectional security authentication method based on NFC mobile phone and intelligent lock - Google Patents
Bidirectional security authentication method based on NFC mobile phone and intelligent lock Download PDFInfo
- Publication number
- CN108171831B CN108171831B CN201711398771.0A CN201711398771A CN108171831B CN 108171831 B CN108171831 B CN 108171831B CN 201711398771 A CN201711398771 A CN 201711398771A CN 108171831 B CN108171831 B CN 108171831B
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- nfc mobile
- nfc
- intelligent lock
- value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00412—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
- G07C2009/00841—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed by a portable device
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a bidirectional security authentication method based on an NFC (near field communication) mobile phone and an intelligent lock, which is realized based on the NFC mobile phone and the intelligent lock, wherein encryption algorithm modules 1 are arranged in the NFC mobile phone and the intelligent lock, and the method comprises the following steps: the NFC mobile phone is used for unlocking the intelligent lock, the unlocking password of the intelligent lock is generated after random numbers are operated for many times when the intelligent lock is unlocked every time, the MAC values are different when the intelligent lock is unlocked every time, meanwhile, the random numbers are respectively derived from the intelligent lock and the NFC mobile phone, the process of unlocking safely for one time comprises authentication of the NFC mobile phone on the intelligent lock and authentication of the intelligent lock on the NFC mobile phone, and malicious copying attack can be effectively prevented. Based on the security authentication method, malicious attackers can be prevented from monitoring communication between the intelligent lock and the NFC mobile phone, so that the security is better.
Description
Technical Field
The invention relates to an unlocking method of an intelligent lock, in particular to a bidirectional security authentication method based on an NFC mobile phone and the intelligent lock.
Background
The intelligent lock is different from a traditional mechanical lock, and is a lock which is more intelligent in the aspects of user identification, safety and manageability. Using a non-mechanical key as a user identification such as: techniques such as fingerprint and iris recognition are highly safe but inconvenient to configure, and are expensive and difficult to popularize. With the wide application of mobile phones, many use the bluetooth or NFC function of mobile phones to realize unlocking, but this has certain requirements on smart phones used by users, the operation process is complex, and the technical requirements on users are high. Especially, in an environment with many family members, a plurality of mobile phones are required to open the intelligent lock, and the existing communication mode of the mobile phones and the intelligent lock does not have the function of adding and managing mobile phone users, so that the market demand cannot be met.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a bidirectional security authentication method based on an NFC mobile phone and an intelligent lock, which does not need to carry a physical key, can prevent malicious attacks and monitor, and has better security.
In order to solve the technical problems, the invention adopts the following technical scheme.
A bidirectional security authentication method based on an NFC mobile phone and an intelligent lock is realized based on the NFC mobile phone and the intelligent lock, an encryption algorithm module1 is built in both the NFC mobile phone and the intelligent lock, and the method comprises the following steps: step S1, after the NFC mobile phone is connected with the intelligent lock, the NFC mobile phone sends an authentication instruction to the intelligent lock; step S2, after receiving the authentication command, the smart lock returns a group of random numbers Rng1 to the NFC mobile phone; step S3, the intelligent lock calls an encryption algorithm module1 to calculate the MAC value of the random number Rng1 to obtain a value Enc 1; step S4, after receiving the random number Rng1, the NFC mobile phone calls an encryption algorithm module1 to calculate the MAC value of the random number Rng1, and a value Enc2 is obtained; step S5, the NFC mobile phone generates a random number Rng2, sends the random number Rng2 and a value Enc2 to the intelligent lock, calls an encryption algorithm module1 at the same time, and calculates the MAC value of the random number Rng2 to obtain a value Enc 3; step S6, the intelligent lock judges whether the value Enc2 is the same as the value Enc1, if not, the authentication is ended, if yes, an encryption algorithm module1 is called, and the MAC value of the random number Rng2 is calculated to obtain a value Enc 4; step S7, the intelligent lock sends the value Enc4 to the NFC mobile phone, and simultaneously calls an encryption algorithm module1 to calculate MAC values of the random number Rng1 and the random number Rng2 to obtain a value Enc 5; step S8, the NFC mobile phone judges whether the value Enc4 is the same as the value Enc3, if not, the authentication is ended, if yes, an encryption algorithm module1 is called to calculate the MAC values of the random number Rng1 and the random number Rng2 to obtain a value Enc6, and the value Enc6 is sent to the intelligent lock; and step S9, the intelligent lock judges whether the value Enc6 and the value Enc5 are the same, if not, the authentication is ended, if so, the authentication is successful, and the intelligent lock opens the lock body.
Preferably, cell-phone APP is installed to the NFC cell-phone, cell-phone APP is equipped with the button of unblanking, through clicking unblank the button and make the NFC cell-phone is connected with the smart lock establishment.
Preferably, when the unlock button is clicked, the NFC mobile phone sends an REQA frame conforming to an ISO14443type a protocol to the smart lock, and if the NFC mobile phone receives an answer from the smart lock, the NFC mobile phone sends a card selection frame to the smart lock, and if the NFC mobile phone does not receive an answer from the smart lock to the REQA frame, the NFC mobile phone retransmits the REQA frame to the smart lock.
Preferably, the number of re qa frames that the NFC handset retransmits to the smart lock does not exceed 5 times.
Preferably, the number of the NFC mobile phones is multiple, one of the multiple NFC mobile phones is an administrator mobile phone, and the administrator mobile phone has administrator authority and is provided with an administrator key KmainThe administrator mobile phone utilizes an administrator key KmainCommunication is established with the smart lock.
Preferably, the administrator mobile phone adds the ID of the NFC mobile phone used for unlocking the smart lock to the smart lock, and sets a sub-key K for each NFC mobile phoneAPPThen, the ID of the NFC mobile phone and the corresponding sub-secret key K are usedAPPWriting into the intelligent lock, and simultaneously writing the sub-secret key KAPPAnd storing the data in the NFC mobile phone.
Preferably, in step S6 and step S9, when the authentication is finished, the smart lock sends an error flag to the NFC mobile phone, and the NFC mobile phone displays unlocking failure information according to the error flag.
Preferably, in step S8, when the authentication is finished, the NFC mobile phone displays unlocking failure information.
Preferably, when the authentication is finished or is successful, the NFC mobile phone and the smart lock clear the MAC value and the random number generated in the authentication process.
Preferably, if the execution of the steps S1 to S9 exceeds a preset time, the authentication is ended.
In the bidirectional security authentication method based on the NFC mobile phone and the intelligent lock, when the NFC mobile phone is used for unlocking the intelligent lock, the unlocking password of the intelligent lock is generated by random numbers during unlocking for many times, MAC values during unlocking for each time are different, the random numbers are respectively from the intelligent lock and the NFC mobile phone, and the process of one-time security unlocking comprises authentication of the NFC mobile phone on the intelligent lock and authentication of the intelligent lock on the NFC mobile phone, so that malicious copying attack can be effectively prevented. Based on the security authentication method, the security of the communication process is ensured, and a malicious attacker can be prevented from monitoring the communication between the intelligent lock and the NFC mobile phone, so that the security is better.
Drawings
FIG. 1 is a flow chart of a bidirectional security authentication method according to the present invention.
Detailed Description
The invention is described in more detail below with reference to the figures and examples.
The invention discloses a bidirectional security authentication method based on an NFC (near field communication) mobile phone and an intelligent lock, which is realized based on the NFC mobile phone and the intelligent lock, wherein encryption algorithm modules 1 are arranged in the NFC mobile phone and the intelligent lock, the encryption algorithm modules 1 are used for calculating Message Authentication Code (MAC) values of random numbers Rng1, and the method comprises the following steps:
step S1, after the NFC mobile phone is connected with the intelligent lock, the NFC mobile phone sends an authentication instruction to the intelligent lock;
step S2, after receiving the authentication command, the smart lock returns a group of random numbers Rng1 to the NFC mobile phone;
step S3, the intelligent lock calls an encryption algorithm module1 to calculate the MAC value of the random number Rng1 to obtain a value Enc 1;
step S4, after receiving the random number Rng1, the NFC mobile phone calls an encryption algorithm module1 to calculate the MAC value of the random number Rng1, and a value Enc2 is obtained;
step S5, the NFC mobile phone generates a random number Rng2, sends the random number Rng2 and a value Enc2 to the intelligent lock, calls an encryption algorithm module1 at the same time, and calculates the MAC value of the random number Rng2 to obtain a value Enc 3;
step S6, the intelligent lock judges whether the value Enc2 is the same as the value Enc1, if not, the authentication is ended, if yes, an encryption algorithm module1 is called, and the MAC value of the random number Rng2 is calculated to obtain a value Enc 4;
step S7, the intelligent lock sends the value Enc4 to the NFC mobile phone, and simultaneously calls an encryption algorithm module1 to calculate MAC values of the random number Rng1 and the random number Rng2 to obtain a value Enc 5;
step S8, the NFC mobile phone judges whether the value Enc4 is the same as the value Enc3, if not, the authentication is ended, if yes, an encryption algorithm module1 is called to calculate the MAC values of the random number Rng1 and the random number Rng2 to obtain a value Enc6, and the value Enc6 is sent to the intelligent lock;
and step S9, the intelligent lock judges whether the value Enc6 and the value Enc5 are the same, if not, the authentication is ended, if so, the authentication is successful, and the intelligent lock opens the lock body.
According to the bidirectional security authentication method, when the NFC mobile phone is used for unlocking the intelligent lock, the unlocking password of the intelligent lock is generated after random numbers generated during unlocking each time are subjected to multiple operations, the MAC values generated during unlocking each time are different, the random numbers are respectively derived from the intelligent lock and the NFC mobile phone, the process of unlocking the intelligent lock safely for one time comprises authentication of the NFC mobile phone on the intelligent lock and authentication of the intelligent lock on the NFC mobile phone, and malicious copying attack can be effectively prevented. Based on the security authentication method, the security of the communication process is ensured, and a malicious attacker can be prevented from monitoring the communication between the intelligent lock and the NFC mobile phone, so that the security is better.
As an optimal mode, cell-phone APP is installed to the NFC cell-phone, cell-phone APP is equipped with the button of unblanking, through clicking unblank button and order the NFC cell-phone is connected with the smart lock establishment. Further, when the unlock button is clicked, the NFC mobile phone sends an REQA frame conforming to an ISO14443type a protocol to the smart lock, if the NFC mobile phone receives a response of the smart lock, the NFC mobile phone sends a card selection frame to the smart lock, and if the NFC mobile phone does not receive a response of the smart lock to the REQA frame, the NFC mobile phone retransmits the REQA frame to the smart lock. Wherein the number of REQA frames retransmitted to the smart lock by the NFC handset does not exceed 5 times.
When an unlocking button on a mobile phone APP is clicked, the NFC mobile phone issues an REQA frame and a card selection frame which accord with an ISO14443TypeA protocol, connection is established with the intelligent lock, after the NFC mobile phone is connected with the intelligent lock, the NFC mobile phone issues an instruction frame with mobile phone ID information to the intelligent lock, the intelligent lock returns a random number Rng1 to the NFC mobile phone after receiving the instruction frame, and the intelligent lock utilizes K corresponding to the mobile phone IDUIDThe random number Rng1 calls the encryption algorithm module1 to generate the value Enc 1.
The values Enc1, Enc2, Enc3, Enc4, Enc5 and Enc6 generated in the above process are as follows: calling an encryption algorithm module1 to generate random number, ID and KUID/KAPPThe encrypted MAC value of (3) extracts a value of a certain bit from the MAC value as a value Enc1, a value Enc2, a value Enc3, a value Enc4, a value Enc5, and a value Enc 6.
In this embodiment, the number of the NFC phones is multiple, one of the multiple NFC phones is an administrator phone, and the administrator phone has administrator authority and is provided with an administrator key KmainThe administrator mobile phone utilizes an administrator key KmainCommunication is established with the smart lock.
Further, the administrator mobile phone adds the ID of the NFC mobile phone for opening the intelligent lock to the intelligent lock, and sets a sub-secret key K for each NFC mobile phoneAPPThen, the ID of the NFC mobile phone and the corresponding sub-secret key K are usedAPPWriting into the intelligent lock, and simultaneously writing the sub-secret key KAPPAnd storing the data in the NFC mobile phone.
This embodiment regards NFC cell-phone as the NFC read head, and the intelligence lock regards as the NFC Tag end, and the NFC cell-phone prestores has the key K that is used for unblanking, can realize that a plurality of NFC cell-phones open the function of same intelligence lock. One of the multiple NFC mobile phones capable of opening the same intelligent lock has administrator authority and an administrator key KmainBy means of the administrator key KmainCommunicating with the intelligent lock, adding the IDs of other NFC mobile phones capable of opening the intelligent lock, and setting a sub-secret key K for each NFC mobile phone capable of opening the intelligent lockAPPAnd the ID of the NFC mobile phone and the corresponding secret key K are usedAPPWriting into the intelligent lock and simultaneously writing the sub-secret key KAPPAnd also saving to the currently added NFC handset.
In this embodiment, in order to implement the status indication, when the authentication is finished in step S6 and step S9, the smart lock sends an error identifier to the NFC mobile phone, and the NFC mobile phone displays unlocking failure information according to the error identifier. In step S8, when the authentication is finished, the NFC mobile phone displays unlocking failure information.
Regarding resetting and data clearing, in this embodiment, when the authentication is finished or is successful, the NFC handset and the smart lock clear the MAC value and the random number generated in the authentication process. The embodiment further includes a time limitation condition, specifically, if the execution process of the steps S1 to S9 exceeds a preset time, the authentication is ended.
The encryption algorithm module1 of the present embodiment adopts algorithms including, but not limited to, DES, 3DES, AES-128, AES-196, AES-256, SM4, SHA-1, SHA-256, SM3, RSA1024, RSA2048, ECC192, ECC256, and SM 2.
In the bidirectional security authentication method based on the NFC mobile phone and the intelligent lock, the key K used by the intelligent lockUIDThe intelligent lock is written in by an NFC mobile phone with administrator authority, communication between the intelligent lock and the NFC mobile phone uses a key management mechanism for wireless transmission, an unlocking password of the intelligent lock is generated by random numbers when the intelligent lock is unlocked every time in the mode, numerical values when the intelligent lock is unlocked every time are different, the random numbers are respectively derived from the intelligent lock and the NFC mobile phone, one-time safe unlocking flow needs to finish authentication of the NFC mobile phone to the intelligent lock and authentication of the intelligent lock to the NFC mobile phone, copying attack can be effectively prevented, the intelligent lock is suitable for popularization and application in the technical field of the intelligent lock, and the intelligent lock has a good application prospect.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents or improvements made within the technical scope of the present invention should be included in the scope of the present invention.
Claims (10)
1. A bidirectional security authentication method based on an NFC mobile phone and an intelligent lock is characterized in that the method is realized based on the NFC mobile phone and the intelligent lock, encryption algorithm modules 1 are arranged in the NFC mobile phone and the intelligent lock, and the method comprises the following steps:
step S1, after the NFC mobile phone is connected with the intelligent lock, the NFC mobile phone sends an authentication instruction to the intelligent lock;
step S2, after receiving the authentication command, the smart lock returns a group of random numbers Rng1 to the NFC mobile phone;
step S3, the intelligent lock calls an encryption algorithm module1 to calculate the MAC value of the random number Rng1 to obtain a value Enc 1;
step S4, after receiving the random number Rng1, the NFC mobile phone calls an encryption algorithm module1 to calculate the MAC value of the random number Rng1, and a value Enc2 is obtained;
step S5, the NFC mobile phone generates a random number Rng2, sends the random number Rng2 and a value Enc2 to the intelligent lock, calls an encryption algorithm module1 at the same time, and calculates the MAC value of the random number Rng2 to obtain a value Enc 3;
step S6, the intelligent lock judges whether the value Enc2 is the same as the value Enc1, if not, the authentication is ended, if yes, an encryption algorithm module1 is called, and the MAC value of the random number Rng2 is calculated to obtain a value Enc 4;
step S7, the intelligent lock sends the value Enc4 to the NFC mobile phone, and simultaneously calls an encryption algorithm module1 to calculate MAC values of the random number Rng1 and the random number Rng2 to obtain a value Enc 5;
step S8, the NFC mobile phone judges whether the value Enc4 is the same as the value Enc3, if not, the authentication is ended, if yes, an encryption algorithm module1 is called to calculate the MAC values of the random number Rng1 and the random number Rng2 to obtain a value Enc6, and the value Enc6 is sent to the intelligent lock;
and step S9, the intelligent lock judges whether the value Enc6 and the value Enc5 are the same, if not, the authentication is ended, if so, the authentication is successful, and the intelligent lock opens the lock body.
2. The NFC-mobile-and-smart-lock-based bidirectional security authentication method as claimed in claim 1, wherein the NFC mobile phone is provided with a mobile phone APP, the mobile phone APP is provided with an unlocking button, and the NFC mobile phone is connected with the smart lock by clicking the unlocking button.
3. The bidirectional security authentication method based on the NFC mobile phone and the smart lock according to claim 2, wherein when the unlock button is clicked, the NFC mobile phone sends an REQA frame conforming to an ISO14443type a protocol to the smart lock, if the NFC mobile phone receives a response from the smart lock, the NFC mobile phone sends a card selection frame to the smart lock, and if the NFC mobile phone does not receive a response from the smart lock to the REQA frame, the NFC mobile phone retransmits the REQA frame to the smart lock.
4. A method as claimed in claim 3, wherein the NFC handset retransmits no more than 5 REQA frames to the smart lock.
5. The NFC-handset and smart lock-based bidirectional security authentication method of claim 1, wherein the number of the NFC handsets is plural, one of the plural NFC handsets is an administrator handset, the administrator handset has administrator authority and is provided with an administrator key KmainThe administrator mobile phone utilizes an administrator key KmainCommunication is established with the smart lock.
6. The NFC-handset and smart lock-based bidirectional security authentication method of claim 5, wherein the administrator handset adds an ID of the NFC handset used to open the smart lock to the smart lock and sets a sub-key K for each NFC handsetAPPThen, the ID of the NFC mobile phone and the corresponding sub-secret key K are usedAPPWriting into the intelligent lock, and simultaneously writing the sub-secret key KAPPAnd storing the data in the NFC mobile phone.
7. The bidirectional security authentication method based on the NFC mobile phone and the smart lock as claimed in claim 1, wherein in steps S6 and S9, when the authentication is completed, the smart lock sends an error flag to the NFC mobile phone, and the NFC mobile phone displays unlocking failure information according to the error flag.
8. The bidirectional security authentication method based on the NFC mobile phone and the smart lock according to claim 1, wherein in step S8, when the authentication is finished, the NFC mobile phone displays unlocking failure information.
9. The bidirectional security authentication method based on the NFC mobile phone and the smart lock according to claim 1, wherein when the authentication is completed or is successful, the NFC mobile phone and the smart lock clear a MAC value and a random number generated in the authentication process.
10. The NFC-handset and smart lock-based bidirectional secure authentication method as claimed in claim 1, wherein the authentication is ended if the execution of the steps S1 to S9 exceeds a preset time.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711398771.0A CN108171831B (en) | 2017-12-22 | 2017-12-22 | Bidirectional security authentication method based on NFC mobile phone and intelligent lock |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711398771.0A CN108171831B (en) | 2017-12-22 | 2017-12-22 | Bidirectional security authentication method based on NFC mobile phone and intelligent lock |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108171831A CN108171831A (en) | 2018-06-15 |
CN108171831B true CN108171831B (en) | 2020-08-21 |
Family
ID=62523422
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711398771.0A Active CN108171831B (en) | 2017-12-22 | 2017-12-22 | Bidirectional security authentication method based on NFC mobile phone and intelligent lock |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108171831B (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109326018B (en) * | 2018-08-08 | 2020-09-22 | 珠海优特电力科技股份有限公司 | Authentication method, device and system for preventing lock from being copied and electronic key |
CN109741067B (en) * | 2018-12-19 | 2023-05-30 | 广州羊城通有限公司 | Data processing method and device based on IC card unlocking |
CN111401086A (en) * | 2018-12-29 | 2020-07-10 | 天津朗波微电子有限公司 | NFC mobile phone terminal anti-counterfeiting traceability system with bidirectional encryption authentication |
CN112152963B (en) * | 2019-06-26 | 2024-04-09 | 国民技术股份有限公司 | Intelligent lock, security platform and authentication method thereof |
CN110365847A (en) * | 2019-07-25 | 2019-10-22 | 成都驰通数码系统有限公司 | A kind of power control system based on NFC, control method and electronic product |
CN111047744A (en) * | 2019-12-28 | 2020-04-21 | 北京深思数盾科技股份有限公司 | Digital unlocking method and device, electronic door lock and storage medium |
CN112330857A (en) * | 2020-11-04 | 2021-02-05 | 天津大学 | NFC-based Internet of things intelligent lock security authentication method |
CN113079494B (en) * | 2021-03-31 | 2022-07-01 | 北京骑胜科技有限公司 | Method, device, equipment and storage medium for communicating with shared object |
CN114743296B (en) * | 2022-04-20 | 2024-06-25 | 曾科岩 | Control method and control system of intelligent door lock |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103971426A (en) * | 2013-01-31 | 2014-08-06 | 北京同方微电子有限公司 | PSAM safety control-based access control system and safe access control method using the same |
CN104637117A (en) * | 2013-11-07 | 2015-05-20 | 国家电网公司 | Intelligent lock pin realization method, key realization method, intelligent lock pin, lock and key |
CN106921663A (en) * | 2017-03-03 | 2017-07-04 | 杭州智贝信息科技有限公司 | Identity based on intelligent terminal software/intelligent terminal continues Verification System and method |
EP3193486A1 (en) * | 2016-01-15 | 2017-07-19 | Fujitsu Limited | Mutual authentication method, authentication apparatus, and authentication program |
CN106971441A (en) * | 2017-04-28 | 2017-07-21 | 深圳星普森信息技术有限公司 | A kind of method for unlocking, door lock, key and lockset |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101624884B (en) * | 2009-07-31 | 2012-05-23 | 王成全 | Control method of wireless remote-control lock system |
US9054874B2 (en) * | 2011-12-01 | 2015-06-09 | Htc Corporation | System and method for data authentication among processors |
CN102800141B (en) * | 2012-07-24 | 2015-10-28 | 东信和平科技股份有限公司 | A kind of access control method based on two-way authentication and system |
CN103593892A (en) * | 2013-11-06 | 2014-02-19 | 天津大学 | Challenge response and symmetrical encryption based electronic lock unlocking method |
CN105069864A (en) * | 2015-07-10 | 2015-11-18 | 西安电子科技大学 | Door lock control secure communication scheme based on NFC (near field communication) function of smart phone |
CN205722038U (en) * | 2016-04-20 | 2016-11-23 | 东莞市中控电子技术有限公司 | A kind of gate control system realizing Bluetooth communication |
-
2017
- 2017-12-22 CN CN201711398771.0A patent/CN108171831B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103971426A (en) * | 2013-01-31 | 2014-08-06 | 北京同方微电子有限公司 | PSAM safety control-based access control system and safe access control method using the same |
CN104637117A (en) * | 2013-11-07 | 2015-05-20 | 国家电网公司 | Intelligent lock pin realization method, key realization method, intelligent lock pin, lock and key |
EP3193486A1 (en) * | 2016-01-15 | 2017-07-19 | Fujitsu Limited | Mutual authentication method, authentication apparatus, and authentication program |
CN106921663A (en) * | 2017-03-03 | 2017-07-04 | 杭州智贝信息科技有限公司 | Identity based on intelligent terminal software/intelligent terminal continues Verification System and method |
CN106971441A (en) * | 2017-04-28 | 2017-07-21 | 深圳星普森信息技术有限公司 | A kind of method for unlocking, door lock, key and lockset |
Non-Patent Citations (1)
Title |
---|
一种适用于NFC移动设备的双向认证安全方案;张呈钰; 王让定; 姚灵; 傅松寅; 左富强;《电信科学》;20170820(第8期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN108171831A (en) | 2018-06-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108171831B (en) | Bidirectional security authentication method based on NFC mobile phone and intelligent lock | |
CN108055235B (en) | Control method of intelligent lock, related equipment and system | |
CN106161032B (en) | A kind of identity authentication method and device | |
JP5506810B2 (en) | Support for multiple pre-shared keys at the access point | |
CN102936980B (en) | Method and device for controlling electronic lock | |
CN108173822A (en) | Intelligent door lock management-control method, intelligent door lock and computer readable storage medium | |
CN104299300B (en) | The unblanking and close locking method of safety intelligent lock system based on NFC | |
WO2006083125A1 (en) | Wireless network system and communication method for external device to temporarily access wireless network | |
CN106846573B (en) | The method of opening electronic lock and corresponding electronic lock in no linking Internet | |
CN101319586A (en) | System and method for remotely controlling automobile controlling lock by Bluetooth mobile phone | |
WO2018119623A1 (en) | Method of unlocking electronic lock device, and client and electronic lock device thereof | |
CN1268157C (en) | A handset used for dynamic identity authentication | |
CN110366175B (en) | Security negotiation method, terminal equipment and network equipment | |
CN105325021B (en) | Method and apparatus for remote portable wireless device authentication | |
CN104753886B (en) | It is a kind of to the locking method of remote user, unlocking method and device | |
US7409550B2 (en) | Method for binding networked devices | |
CN110738764A (en) | Security control system and method based on intelligent lock | |
Xu et al. | Pairing and authentication security technologies in low-power Bluetooth | |
CN112102524A (en) | Unlocking method and unlocking system | |
US10181951B2 (en) | Protected encryption key recovery | |
WO2020140929A1 (en) | Key generation method, ue, and network device | |
CN111563980B (en) | Bluetooth lock key generation and authentication method | |
CN106815907A (en) | A kind of method and intelligent access control system based on picture password management intelligent entrance guard | |
CN111489462B (en) | Personal Bluetooth key system | |
CN105072084B (en) | The method for building up of mobile terminal and external equipment data connection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address | ||
CP03 | Change of name, title or address |
Address after: 430000 building 01, building 15, optical valley wisdom Park, No.7, financial port 1st Road, Donghu New Technology Development Zone, Wuhan City, Hubei Province Patentee after: Wuhan ruinajie Semiconductor Co.,Ltd. Address before: 430073 building 01, building 15, optical valley wisdom Park, No.7, financial port 1st Road, Donghu New Technology Development Zone, Wuhan City, Hubei Province Patentee before: WUHAN RUINAJIE ELECTRONIC TECHNOLOGY Co.,Ltd. |