CN108171831B - Bidirectional security authentication method based on NFC mobile phone and intelligent lock - Google Patents

Bidirectional security authentication method based on NFC mobile phone and intelligent lock Download PDF

Info

Publication number
CN108171831B
CN108171831B CN201711398771.0A CN201711398771A CN108171831B CN 108171831 B CN108171831 B CN 108171831B CN 201711398771 A CN201711398771 A CN 201711398771A CN 108171831 B CN108171831 B CN 108171831B
Authority
CN
China
Prior art keywords
mobile phone
nfc mobile
nfc
intelligent lock
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711398771.0A
Other languages
Chinese (zh)
Other versions
CN108171831A (en
Inventor
龚明杨
张小龙
张明宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan ruinajie Semiconductor Co.,Ltd.
Original Assignee
Wuhan Ruinajie Electronic Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Ruinajie Electronic Technology Co ltd filed Critical Wuhan Ruinajie Electronic Technology Co ltd
Priority to CN201711398771.0A priority Critical patent/CN108171831B/en
Publication of CN108171831A publication Critical patent/CN108171831A/en
Application granted granted Critical
Publication of CN108171831B publication Critical patent/CN108171831B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00412Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00841Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed by a portable device

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a bidirectional security authentication method based on an NFC (near field communication) mobile phone and an intelligent lock, which is realized based on the NFC mobile phone and the intelligent lock, wherein encryption algorithm modules 1 are arranged in the NFC mobile phone and the intelligent lock, and the method comprises the following steps: the NFC mobile phone is used for unlocking the intelligent lock, the unlocking password of the intelligent lock is generated after random numbers are operated for many times when the intelligent lock is unlocked every time, the MAC values are different when the intelligent lock is unlocked every time, meanwhile, the random numbers are respectively derived from the intelligent lock and the NFC mobile phone, the process of unlocking safely for one time comprises authentication of the NFC mobile phone on the intelligent lock and authentication of the intelligent lock on the NFC mobile phone, and malicious copying attack can be effectively prevented. Based on the security authentication method, malicious attackers can be prevented from monitoring communication between the intelligent lock and the NFC mobile phone, so that the security is better.

Description

Bidirectional security authentication method based on NFC mobile phone and intelligent lock
Technical Field
The invention relates to an unlocking method of an intelligent lock, in particular to a bidirectional security authentication method based on an NFC mobile phone and the intelligent lock.
Background
The intelligent lock is different from a traditional mechanical lock, and is a lock which is more intelligent in the aspects of user identification, safety and manageability. Using a non-mechanical key as a user identification such as: techniques such as fingerprint and iris recognition are highly safe but inconvenient to configure, and are expensive and difficult to popularize. With the wide application of mobile phones, many use the bluetooth or NFC function of mobile phones to realize unlocking, but this has certain requirements on smart phones used by users, the operation process is complex, and the technical requirements on users are high. Especially, in an environment with many family members, a plurality of mobile phones are required to open the intelligent lock, and the existing communication mode of the mobile phones and the intelligent lock does not have the function of adding and managing mobile phone users, so that the market demand cannot be met.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a bidirectional security authentication method based on an NFC mobile phone and an intelligent lock, which does not need to carry a physical key, can prevent malicious attacks and monitor, and has better security.
In order to solve the technical problems, the invention adopts the following technical scheme.
A bidirectional security authentication method based on an NFC mobile phone and an intelligent lock is realized based on the NFC mobile phone and the intelligent lock, an encryption algorithm module1 is built in both the NFC mobile phone and the intelligent lock, and the method comprises the following steps: step S1, after the NFC mobile phone is connected with the intelligent lock, the NFC mobile phone sends an authentication instruction to the intelligent lock; step S2, after receiving the authentication command, the smart lock returns a group of random numbers Rng1 to the NFC mobile phone; step S3, the intelligent lock calls an encryption algorithm module1 to calculate the MAC value of the random number Rng1 to obtain a value Enc 1; step S4, after receiving the random number Rng1, the NFC mobile phone calls an encryption algorithm module1 to calculate the MAC value of the random number Rng1, and a value Enc2 is obtained; step S5, the NFC mobile phone generates a random number Rng2, sends the random number Rng2 and a value Enc2 to the intelligent lock, calls an encryption algorithm module1 at the same time, and calculates the MAC value of the random number Rng2 to obtain a value Enc 3; step S6, the intelligent lock judges whether the value Enc2 is the same as the value Enc1, if not, the authentication is ended, if yes, an encryption algorithm module1 is called, and the MAC value of the random number Rng2 is calculated to obtain a value Enc 4; step S7, the intelligent lock sends the value Enc4 to the NFC mobile phone, and simultaneously calls an encryption algorithm module1 to calculate MAC values of the random number Rng1 and the random number Rng2 to obtain a value Enc 5; step S8, the NFC mobile phone judges whether the value Enc4 is the same as the value Enc3, if not, the authentication is ended, if yes, an encryption algorithm module1 is called to calculate the MAC values of the random number Rng1 and the random number Rng2 to obtain a value Enc6, and the value Enc6 is sent to the intelligent lock; and step S9, the intelligent lock judges whether the value Enc6 and the value Enc5 are the same, if not, the authentication is ended, if so, the authentication is successful, and the intelligent lock opens the lock body.
Preferably, cell-phone APP is installed to the NFC cell-phone, cell-phone APP is equipped with the button of unblanking, through clicking unblank the button and make the NFC cell-phone is connected with the smart lock establishment.
Preferably, when the unlock button is clicked, the NFC mobile phone sends an REQA frame conforming to an ISO14443type a protocol to the smart lock, and if the NFC mobile phone receives an answer from the smart lock, the NFC mobile phone sends a card selection frame to the smart lock, and if the NFC mobile phone does not receive an answer from the smart lock to the REQA frame, the NFC mobile phone retransmits the REQA frame to the smart lock.
Preferably, the number of re qa frames that the NFC handset retransmits to the smart lock does not exceed 5 times.
Preferably, the number of the NFC mobile phones is multiple, one of the multiple NFC mobile phones is an administrator mobile phone, and the administrator mobile phone has administrator authority and is provided with an administrator key KmainThe administrator mobile phone utilizes an administrator key KmainCommunication is established with the smart lock.
Preferably, the administrator mobile phone adds the ID of the NFC mobile phone used for unlocking the smart lock to the smart lock, and sets a sub-key K for each NFC mobile phoneAPPThen, the ID of the NFC mobile phone and the corresponding sub-secret key K are usedAPPWriting into the intelligent lock, and simultaneously writing the sub-secret key KAPPAnd storing the data in the NFC mobile phone.
Preferably, in step S6 and step S9, when the authentication is finished, the smart lock sends an error flag to the NFC mobile phone, and the NFC mobile phone displays unlocking failure information according to the error flag.
Preferably, in step S8, when the authentication is finished, the NFC mobile phone displays unlocking failure information.
Preferably, when the authentication is finished or is successful, the NFC mobile phone and the smart lock clear the MAC value and the random number generated in the authentication process.
Preferably, if the execution of the steps S1 to S9 exceeds a preset time, the authentication is ended.
In the bidirectional security authentication method based on the NFC mobile phone and the intelligent lock, when the NFC mobile phone is used for unlocking the intelligent lock, the unlocking password of the intelligent lock is generated by random numbers during unlocking for many times, MAC values during unlocking for each time are different, the random numbers are respectively from the intelligent lock and the NFC mobile phone, and the process of one-time security unlocking comprises authentication of the NFC mobile phone on the intelligent lock and authentication of the intelligent lock on the NFC mobile phone, so that malicious copying attack can be effectively prevented. Based on the security authentication method, the security of the communication process is ensured, and a malicious attacker can be prevented from monitoring the communication between the intelligent lock and the NFC mobile phone, so that the security is better.
Drawings
FIG. 1 is a flow chart of a bidirectional security authentication method according to the present invention.
Detailed Description
The invention is described in more detail below with reference to the figures and examples.
The invention discloses a bidirectional security authentication method based on an NFC (near field communication) mobile phone and an intelligent lock, which is realized based on the NFC mobile phone and the intelligent lock, wherein encryption algorithm modules 1 are arranged in the NFC mobile phone and the intelligent lock, the encryption algorithm modules 1 are used for calculating Message Authentication Code (MAC) values of random numbers Rng1, and the method comprises the following steps:
step S1, after the NFC mobile phone is connected with the intelligent lock, the NFC mobile phone sends an authentication instruction to the intelligent lock;
step S2, after receiving the authentication command, the smart lock returns a group of random numbers Rng1 to the NFC mobile phone;
step S3, the intelligent lock calls an encryption algorithm module1 to calculate the MAC value of the random number Rng1 to obtain a value Enc 1;
step S4, after receiving the random number Rng1, the NFC mobile phone calls an encryption algorithm module1 to calculate the MAC value of the random number Rng1, and a value Enc2 is obtained;
step S5, the NFC mobile phone generates a random number Rng2, sends the random number Rng2 and a value Enc2 to the intelligent lock, calls an encryption algorithm module1 at the same time, and calculates the MAC value of the random number Rng2 to obtain a value Enc 3;
step S6, the intelligent lock judges whether the value Enc2 is the same as the value Enc1, if not, the authentication is ended, if yes, an encryption algorithm module1 is called, and the MAC value of the random number Rng2 is calculated to obtain a value Enc 4;
step S7, the intelligent lock sends the value Enc4 to the NFC mobile phone, and simultaneously calls an encryption algorithm module1 to calculate MAC values of the random number Rng1 and the random number Rng2 to obtain a value Enc 5;
step S8, the NFC mobile phone judges whether the value Enc4 is the same as the value Enc3, if not, the authentication is ended, if yes, an encryption algorithm module1 is called to calculate the MAC values of the random number Rng1 and the random number Rng2 to obtain a value Enc6, and the value Enc6 is sent to the intelligent lock;
and step S9, the intelligent lock judges whether the value Enc6 and the value Enc5 are the same, if not, the authentication is ended, if so, the authentication is successful, and the intelligent lock opens the lock body.
According to the bidirectional security authentication method, when the NFC mobile phone is used for unlocking the intelligent lock, the unlocking password of the intelligent lock is generated after random numbers generated during unlocking each time are subjected to multiple operations, the MAC values generated during unlocking each time are different, the random numbers are respectively derived from the intelligent lock and the NFC mobile phone, the process of unlocking the intelligent lock safely for one time comprises authentication of the NFC mobile phone on the intelligent lock and authentication of the intelligent lock on the NFC mobile phone, and malicious copying attack can be effectively prevented. Based on the security authentication method, the security of the communication process is ensured, and a malicious attacker can be prevented from monitoring the communication between the intelligent lock and the NFC mobile phone, so that the security is better.
As an optimal mode, cell-phone APP is installed to the NFC cell-phone, cell-phone APP is equipped with the button of unblanking, through clicking unblank button and order the NFC cell-phone is connected with the smart lock establishment. Further, when the unlock button is clicked, the NFC mobile phone sends an REQA frame conforming to an ISO14443type a protocol to the smart lock, if the NFC mobile phone receives a response of the smart lock, the NFC mobile phone sends a card selection frame to the smart lock, and if the NFC mobile phone does not receive a response of the smart lock to the REQA frame, the NFC mobile phone retransmits the REQA frame to the smart lock. Wherein the number of REQA frames retransmitted to the smart lock by the NFC handset does not exceed 5 times.
When an unlocking button on a mobile phone APP is clicked, the NFC mobile phone issues an REQA frame and a card selection frame which accord with an ISO14443TypeA protocol, connection is established with the intelligent lock, after the NFC mobile phone is connected with the intelligent lock, the NFC mobile phone issues an instruction frame with mobile phone ID information to the intelligent lock, the intelligent lock returns a random number Rng1 to the NFC mobile phone after receiving the instruction frame, and the intelligent lock utilizes K corresponding to the mobile phone IDUIDThe random number Rng1 calls the encryption algorithm module1 to generate the value Enc 1.
The values Enc1, Enc2, Enc3, Enc4, Enc5 and Enc6 generated in the above process are as follows: calling an encryption algorithm module1 to generate random number, ID and KUID/KAPPThe encrypted MAC value of (3) extracts a value of a certain bit from the MAC value as a value Enc1, a value Enc2, a value Enc3, a value Enc4, a value Enc5, and a value Enc 6.
In this embodiment, the number of the NFC phones is multiple, one of the multiple NFC phones is an administrator phone, and the administrator phone has administrator authority and is provided with an administrator key KmainThe administrator mobile phone utilizes an administrator key KmainCommunication is established with the smart lock.
Further, the administrator mobile phone adds the ID of the NFC mobile phone for opening the intelligent lock to the intelligent lock, and sets a sub-secret key K for each NFC mobile phoneAPPThen, the ID of the NFC mobile phone and the corresponding sub-secret key K are usedAPPWriting into the intelligent lock, and simultaneously writing the sub-secret key KAPPAnd storing the data in the NFC mobile phone.
This embodiment regards NFC cell-phone as the NFC read head, and the intelligence lock regards as the NFC Tag end, and the NFC cell-phone prestores has the key K that is used for unblanking, can realize that a plurality of NFC cell-phones open the function of same intelligence lock. One of the multiple NFC mobile phones capable of opening the same intelligent lock has administrator authority and an administrator key KmainBy means of the administrator key KmainCommunicating with the intelligent lock, adding the IDs of other NFC mobile phones capable of opening the intelligent lock, and setting a sub-secret key K for each NFC mobile phone capable of opening the intelligent lockAPPAnd the ID of the NFC mobile phone and the corresponding secret key K are usedAPPWriting into the intelligent lock and simultaneously writing the sub-secret key KAPPAnd also saving to the currently added NFC handset.
In this embodiment, in order to implement the status indication, when the authentication is finished in step S6 and step S9, the smart lock sends an error identifier to the NFC mobile phone, and the NFC mobile phone displays unlocking failure information according to the error identifier. In step S8, when the authentication is finished, the NFC mobile phone displays unlocking failure information.
Regarding resetting and data clearing, in this embodiment, when the authentication is finished or is successful, the NFC handset and the smart lock clear the MAC value and the random number generated in the authentication process. The embodiment further includes a time limitation condition, specifically, if the execution process of the steps S1 to S9 exceeds a preset time, the authentication is ended.
The encryption algorithm module1 of the present embodiment adopts algorithms including, but not limited to, DES, 3DES, AES-128, AES-196, AES-256, SM4, SHA-1, SHA-256, SM3, RSA1024, RSA2048, ECC192, ECC256, and SM 2.
In the bidirectional security authentication method based on the NFC mobile phone and the intelligent lock, the key K used by the intelligent lockUIDThe intelligent lock is written in by an NFC mobile phone with administrator authority, communication between the intelligent lock and the NFC mobile phone uses a key management mechanism for wireless transmission, an unlocking password of the intelligent lock is generated by random numbers when the intelligent lock is unlocked every time in the mode, numerical values when the intelligent lock is unlocked every time are different, the random numbers are respectively derived from the intelligent lock and the NFC mobile phone, one-time safe unlocking flow needs to finish authentication of the NFC mobile phone to the intelligent lock and authentication of the intelligent lock to the NFC mobile phone, copying attack can be effectively prevented, the intelligent lock is suitable for popularization and application in the technical field of the intelligent lock, and the intelligent lock has a good application prospect.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents or improvements made within the technical scope of the present invention should be included in the scope of the present invention.

Claims (10)

1. A bidirectional security authentication method based on an NFC mobile phone and an intelligent lock is characterized in that the method is realized based on the NFC mobile phone and the intelligent lock, encryption algorithm modules 1 are arranged in the NFC mobile phone and the intelligent lock, and the method comprises the following steps:
step S1, after the NFC mobile phone is connected with the intelligent lock, the NFC mobile phone sends an authentication instruction to the intelligent lock;
step S2, after receiving the authentication command, the smart lock returns a group of random numbers Rng1 to the NFC mobile phone;
step S3, the intelligent lock calls an encryption algorithm module1 to calculate the MAC value of the random number Rng1 to obtain a value Enc 1;
step S4, after receiving the random number Rng1, the NFC mobile phone calls an encryption algorithm module1 to calculate the MAC value of the random number Rng1, and a value Enc2 is obtained;
step S5, the NFC mobile phone generates a random number Rng2, sends the random number Rng2 and a value Enc2 to the intelligent lock, calls an encryption algorithm module1 at the same time, and calculates the MAC value of the random number Rng2 to obtain a value Enc 3;
step S6, the intelligent lock judges whether the value Enc2 is the same as the value Enc1, if not, the authentication is ended, if yes, an encryption algorithm module1 is called, and the MAC value of the random number Rng2 is calculated to obtain a value Enc 4;
step S7, the intelligent lock sends the value Enc4 to the NFC mobile phone, and simultaneously calls an encryption algorithm module1 to calculate MAC values of the random number Rng1 and the random number Rng2 to obtain a value Enc 5;
step S8, the NFC mobile phone judges whether the value Enc4 is the same as the value Enc3, if not, the authentication is ended, if yes, an encryption algorithm module1 is called to calculate the MAC values of the random number Rng1 and the random number Rng2 to obtain a value Enc6, and the value Enc6 is sent to the intelligent lock;
and step S9, the intelligent lock judges whether the value Enc6 and the value Enc5 are the same, if not, the authentication is ended, if so, the authentication is successful, and the intelligent lock opens the lock body.
2. The NFC-mobile-and-smart-lock-based bidirectional security authentication method as claimed in claim 1, wherein the NFC mobile phone is provided with a mobile phone APP, the mobile phone APP is provided with an unlocking button, and the NFC mobile phone is connected with the smart lock by clicking the unlocking button.
3. The bidirectional security authentication method based on the NFC mobile phone and the smart lock according to claim 2, wherein when the unlock button is clicked, the NFC mobile phone sends an REQA frame conforming to an ISO14443type a protocol to the smart lock, if the NFC mobile phone receives a response from the smart lock, the NFC mobile phone sends a card selection frame to the smart lock, and if the NFC mobile phone does not receive a response from the smart lock to the REQA frame, the NFC mobile phone retransmits the REQA frame to the smart lock.
4. A method as claimed in claim 3, wherein the NFC handset retransmits no more than 5 REQA frames to the smart lock.
5. The NFC-handset and smart lock-based bidirectional security authentication method of claim 1, wherein the number of the NFC handsets is plural, one of the plural NFC handsets is an administrator handset, the administrator handset has administrator authority and is provided with an administrator key KmainThe administrator mobile phone utilizes an administrator key KmainCommunication is established with the smart lock.
6. The NFC-handset and smart lock-based bidirectional security authentication method of claim 5, wherein the administrator handset adds an ID of the NFC handset used to open the smart lock to the smart lock and sets a sub-key K for each NFC handsetAPPThen, the ID of the NFC mobile phone and the corresponding sub-secret key K are usedAPPWriting into the intelligent lock, and simultaneously writing the sub-secret key KAPPAnd storing the data in the NFC mobile phone.
7. The bidirectional security authentication method based on the NFC mobile phone and the smart lock as claimed in claim 1, wherein in steps S6 and S9, when the authentication is completed, the smart lock sends an error flag to the NFC mobile phone, and the NFC mobile phone displays unlocking failure information according to the error flag.
8. The bidirectional security authentication method based on the NFC mobile phone and the smart lock according to claim 1, wherein in step S8, when the authentication is finished, the NFC mobile phone displays unlocking failure information.
9. The bidirectional security authentication method based on the NFC mobile phone and the smart lock according to claim 1, wherein when the authentication is completed or is successful, the NFC mobile phone and the smart lock clear a MAC value and a random number generated in the authentication process.
10. The NFC-handset and smart lock-based bidirectional secure authentication method as claimed in claim 1, wherein the authentication is ended if the execution of the steps S1 to S9 exceeds a preset time.
CN201711398771.0A 2017-12-22 2017-12-22 Bidirectional security authentication method based on NFC mobile phone and intelligent lock Active CN108171831B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711398771.0A CN108171831B (en) 2017-12-22 2017-12-22 Bidirectional security authentication method based on NFC mobile phone and intelligent lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711398771.0A CN108171831B (en) 2017-12-22 2017-12-22 Bidirectional security authentication method based on NFC mobile phone and intelligent lock

Publications (2)

Publication Number Publication Date
CN108171831A CN108171831A (en) 2018-06-15
CN108171831B true CN108171831B (en) 2020-08-21

Family

ID=62523422

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711398771.0A Active CN108171831B (en) 2017-12-22 2017-12-22 Bidirectional security authentication method based on NFC mobile phone and intelligent lock

Country Status (1)

Country Link
CN (1) CN108171831B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109326018B (en) * 2018-08-08 2020-09-22 珠海优特电力科技股份有限公司 Authentication method, device and system for preventing lock from being copied and electronic key
CN109741067B (en) * 2018-12-19 2023-05-30 广州羊城通有限公司 Data processing method and device based on IC card unlocking
CN111401086A (en) * 2018-12-29 2020-07-10 天津朗波微电子有限公司 NFC mobile phone terminal anti-counterfeiting traceability system with bidirectional encryption authentication
CN112152963B (en) * 2019-06-26 2024-04-09 国民技术股份有限公司 Intelligent lock, security platform and authentication method thereof
CN110365847A (en) * 2019-07-25 2019-10-22 成都驰通数码系统有限公司 A kind of power control system based on NFC, control method and electronic product
CN111047744A (en) * 2019-12-28 2020-04-21 北京深思数盾科技股份有限公司 Digital unlocking method and device, electronic door lock and storage medium
CN112330857A (en) * 2020-11-04 2021-02-05 天津大学 NFC-based Internet of things intelligent lock security authentication method
CN113079494B (en) * 2021-03-31 2022-07-01 北京骑胜科技有限公司 Method, device, equipment and storage medium for communicating with shared object
CN114743296B (en) * 2022-04-20 2024-06-25 曾科岩 Control method and control system of intelligent door lock

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103971426A (en) * 2013-01-31 2014-08-06 北京同方微电子有限公司 PSAM safety control-based access control system and safe access control method using the same
CN104637117A (en) * 2013-11-07 2015-05-20 国家电网公司 Intelligent lock pin realization method, key realization method, intelligent lock pin, lock and key
CN106921663A (en) * 2017-03-03 2017-07-04 杭州智贝信息科技有限公司 Identity based on intelligent terminal software/intelligent terminal continues Verification System and method
EP3193486A1 (en) * 2016-01-15 2017-07-19 Fujitsu Limited Mutual authentication method, authentication apparatus, and authentication program
CN106971441A (en) * 2017-04-28 2017-07-21 深圳星普森信息技术有限公司 A kind of method for unlocking, door lock, key and lockset

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101624884B (en) * 2009-07-31 2012-05-23 王成全 Control method of wireless remote-control lock system
US9054874B2 (en) * 2011-12-01 2015-06-09 Htc Corporation System and method for data authentication among processors
CN102800141B (en) * 2012-07-24 2015-10-28 东信和平科技股份有限公司 A kind of access control method based on two-way authentication and system
CN103593892A (en) * 2013-11-06 2014-02-19 天津大学 Challenge response and symmetrical encryption based electronic lock unlocking method
CN105069864A (en) * 2015-07-10 2015-11-18 西安电子科技大学 Door lock control secure communication scheme based on NFC (near field communication) function of smart phone
CN205722038U (en) * 2016-04-20 2016-11-23 东莞市中控电子技术有限公司 A kind of gate control system realizing Bluetooth communication

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103971426A (en) * 2013-01-31 2014-08-06 北京同方微电子有限公司 PSAM safety control-based access control system and safe access control method using the same
CN104637117A (en) * 2013-11-07 2015-05-20 国家电网公司 Intelligent lock pin realization method, key realization method, intelligent lock pin, lock and key
EP3193486A1 (en) * 2016-01-15 2017-07-19 Fujitsu Limited Mutual authentication method, authentication apparatus, and authentication program
CN106921663A (en) * 2017-03-03 2017-07-04 杭州智贝信息科技有限公司 Identity based on intelligent terminal software/intelligent terminal continues Verification System and method
CN106971441A (en) * 2017-04-28 2017-07-21 深圳星普森信息技术有限公司 A kind of method for unlocking, door lock, key and lockset

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
一种适用于NFC移动设备的双向认证安全方案;张呈钰; 王让定; 姚灵; 傅松寅; 左富强;《电信科学》;20170820(第8期);全文 *

Also Published As

Publication number Publication date
CN108171831A (en) 2018-06-15

Similar Documents

Publication Publication Date Title
CN108171831B (en) Bidirectional security authentication method based on NFC mobile phone and intelligent lock
CN108055235B (en) Control method of intelligent lock, related equipment and system
CN106161032B (en) A kind of identity authentication method and device
JP5506810B2 (en) Support for multiple pre-shared keys at the access point
CN102936980B (en) Method and device for controlling electronic lock
CN108173822A (en) Intelligent door lock management-control method, intelligent door lock and computer readable storage medium
CN104299300B (en) The unblanking and close locking method of safety intelligent lock system based on NFC
WO2006083125A1 (en) Wireless network system and communication method for external device to temporarily access wireless network
CN106846573B (en) The method of opening electronic lock and corresponding electronic lock in no linking Internet
CN101319586A (en) System and method for remotely controlling automobile controlling lock by Bluetooth mobile phone
WO2018119623A1 (en) Method of unlocking electronic lock device, and client and electronic lock device thereof
CN1268157C (en) A handset used for dynamic identity authentication
CN110366175B (en) Security negotiation method, terminal equipment and network equipment
CN105325021B (en) Method and apparatus for remote portable wireless device authentication
CN104753886B (en) It is a kind of to the locking method of remote user, unlocking method and device
US7409550B2 (en) Method for binding networked devices
CN110738764A (en) Security control system and method based on intelligent lock
Xu et al. Pairing and authentication security technologies in low-power Bluetooth
CN112102524A (en) Unlocking method and unlocking system
US10181951B2 (en) Protected encryption key recovery
WO2020140929A1 (en) Key generation method, ue, and network device
CN111563980B (en) Bluetooth lock key generation and authentication method
CN106815907A (en) A kind of method and intelligent access control system based on picture password management intelligent entrance guard
CN111489462B (en) Personal Bluetooth key system
CN105072084B (en) The method for building up of mobile terminal and external equipment data connection

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: 430000 building 01, building 15, optical valley wisdom Park, No.7, financial port 1st Road, Donghu New Technology Development Zone, Wuhan City, Hubei Province

Patentee after: Wuhan ruinajie Semiconductor Co.,Ltd.

Address before: 430073 building 01, building 15, optical valley wisdom Park, No.7, financial port 1st Road, Donghu New Technology Development Zone, Wuhan City, Hubei Province

Patentee before: WUHAN RUINAJIE ELECTRONIC TECHNOLOGY Co.,Ltd.