CN108447154A - Safe unlocking method and device, encryption and decryption method and device, lock and server - Google Patents

Safe unlocking method and device, encryption and decryption method and device, lock and server Download PDF

Info

Publication number
CN108447154A
CN108447154A CN201810175759.1A CN201810175759A CN108447154A CN 108447154 A CN108447154 A CN 108447154A CN 201810175759 A CN201810175759 A CN 201810175759A CN 108447154 A CN108447154 A CN 108447154A
Authority
CN
China
Prior art keywords
lock
terminal device
clear
server
unlock
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810175759.1A
Other languages
Chinese (zh)
Inventor
吴赛男
柳春娜
陈昂
隋欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Institute of Water Resources and Hydropower Research
Original Assignee
China Institute of Water Resources and Hydropower Research
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Institute of Water Resources and Hydropower Research filed Critical China Institute of Water Resources and Hydropower Research
Priority to CN201810175759.1A priority Critical patent/CN108447154A/en
Publication of CN108447154A publication Critical patent/CN108447154A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00412Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted

Abstract

The present invention relates to Internet technical fields, and in particular to a kind of safe unlocking method and device, encryption and decryption method and device, lock and server.The method unlocked safely includes the unlock clear-text passwords and Personal Unlocking Key that receiving terminal apparatus is sent, and then purpose clear-text passwords is obtained according to the pre-stored ciphertext of the Personal Unlocking Key of acquisition decryption, and then the purpose clear-text passwords is matched with the unlock clear-text passwords of acquisition, if matching is consistent, unlock.It can be seen that, the password of the lock is the ciphertext being encrypted in advance, when user is unlocked, obtains Personal Unlocking Key from server in real time and the ciphertext is decrypted to obtain purpose clear-text passwords, and when the purpose clear-text passwords matches consistent with unlock clear-text passwords, execute unlocking operation.Even if terminal device is intercepted when obtaining Personal Unlocking Key and unlock clear-text passwords from server, other users can not unlock according to the data of interception, and then ensure that the safety of unlocking, ensure platform interests.

Description

Safe unlocking method and device, encryption and decryption method and device, lock and server
Technical field
The present invention relates to Internet technical fields, in particular to a kind of safe unlocking method, device, encryption and decryption side Method and device, lock and server.
Background technology
It is universal with shared bicycle, ordinary circumstance very common the mode being unlocked to vehicle by way of barcode scanning Be down user by mobile phone scan setting in the Quick Response Code on shared bicycle to obtain password from server, and connected by bluetooth The password of acquisition is sent in lock by the mode connect, which is then unlocked according to obtained password. Due to more saving expense by way of transmitting information bluetooth, realize that the information between lock and mobile phone passes by bluetooth The mode passed gradually is popularized, and is locked and be fitted without 2G or 3G communication modules, can only cannot directly and server communication be passed through The mode of bluetooth carries out the transmission of password using mobile phone as medium with server indirectly.In the process, the mobile phone of user may quilt Steal data, and the lock password that is cracked, even if server every time more new password but also vehicle in the case of unauthorized It may be unlocked, compromise platform interests.
Invention content
The purpose of the present invention is to provide a kind of safe unlocking method and devices, to realize to being set to being locked on vehicle Row is safely opened.
Another object of the present invention is to provide a kind of encryption and decryption method and devices, to realize the lock to being set on vehicle It is safely opened.
Another object of the present invention is to provide a kind of locks, to realize the operation being safely opened.
Another object of the present invention is to provide a kind of servers, to realize that carrying out safety to the lock being set on vehicle beats It opens.
To achieve the goals above, technical solution used in the embodiment of the present invention is as follows:
In a first aspect, an embodiment of the present invention provides a kind of safe unlocking method, be applied to lock, the lock by bluetooth with Terminal equipment in communication, the terminal device are connect by network with server, the method includes:Receive the terminal device hair The unlock clear-text passwords and Personal Unlocking Key sent, the unlock clear-text passwords and Personal Unlocking Key are by the terminal device from described It is obtained in server;According to the decryption of the Personal Unlocking Key of acquisition, pre-stored ciphertext obtains purpose clear-text passwords;By the mesh Clear-text passwords matched with the unlock clear-text passwords of acquisition, if matching is consistent, controls lock and open.
Second aspect, the embodiment of the present invention additionally provide a kind of encipher-decipher method, are applied to server, and the server is logical Network to be crossed to connect with terminal device, the terminal device is connected by bluetooth and lock, the method includes:It receives by the terminal The unlocking request that equipment is sent;Responding the unlocking request will lead to corresponding to the unlock clear-text passwords and Personal Unlocking Key of the lock It crosses the terminal device and is sent to the lock, in order to which the lock is decrypted pre-stored ciphertext according to the Personal Unlocking Key Purpose clear-text passwords is obtained, and is unlocked when the purpose clear-text passwords is consistent with unlock clear-text passwords matching.
The third aspect, the embodiment of the present invention additionally provide a kind of safe tripper, are applied to lock, and the lock passes through bluetooth With terminal equipment in communication, the terminal device is connect by network with server, and described device includes:First receiving module is used In the unlock clear-text passwords and Personal Unlocking Key that receive the terminal device transmission, the unlock clear-text passwords and Personal Unlocking Key It is obtained from the server by the terminal device;Deciphering module, for being prestored according to the decryption of the Personal Unlocking Key of acquisition The ciphertext of storage obtains purpose clear-text passwords;Matching module is used for the unlock of the purpose clear-text passwords and acquisition in plain text Password is matched, if matching is consistent, is controlled lock and is opened.
Fourth aspect, an embodiment of the present invention provides a kind of ciphering and deciphering devices, are applied to server, and the server passes through Network is connect with terminal device, and the terminal device is connected by bluetooth and lock, and described device includes:Signal receiving module is used It is asked by the unlocking that the terminal device is sent in receiving;Second sending module will correspond to for responding the unlocking request The unlock clear-text passwords and Personal Unlocking Key of the lock are sent to the lock by the terminal device, in order to the lock according to The Personal Unlocking Key is decrypted to obtain purpose clear-text passwords to pre-stored ciphertext, and in the purpose clear-text passwords and unlock Clear-text passwords matching is unlocked when consistent.
5th aspect, an embodiment of the present invention provides a kind of lock, described lock is equipped with bluetooth, it is described lock by bluetooth with Terminal equipment in communication, the terminal device are connect by network with server, and the lock includes first memory and the first processing Device, the first memory are stored in described first for storing computer program code, the first processor for executing Computer program code in memory is to realize the safe unlocking method.
6th aspect, an embodiment of the present invention provides a kind of server, the server is connected by network and terminal device It connects, the terminal device is connected by bluetooth and lock, which is characterized in that the server includes second memory and second processing Device, the second memory are stored in described second for storing computer program code, the second processor for executing Computer program code in memory is to realize the encipher-decipher method.
A kind of safe unlocking method provided in an embodiment of the present invention and device, encryption and decryption method and device, lock and server, The method unlocked safely is applied to lock, which passes through network and service by bluetooth and terminal equipment in communication, the terminal device Device connects.The method unlocked safely includes the unlock clear-text passwords and Personal Unlocking Key that receiving terminal apparatus is sent, Jin Ergen According to the pre-stored ciphertext of the Personal Unlocking Key decryption of acquisition obtain purpose clear-text passwords, so by the purpose clear-text passwords with obtain Unlock clear-text passwords is matched, if matching is consistent, is unlocked.It can be seen that in the present solution, the password of the lock is thing The ciphertext being first encrypted when user is unlocked, obtains Personal Unlocking Key from server in real time and the ciphertext is decrypted Purpose clear-text passwords is obtained, and when the purpose clear-text passwords matches consistent with unlock clear-text passwords, executes unlocking operation.Even if Terminal device is intercepted when obtaining Personal Unlocking Key and unlock clear-text passwords from server, and other users can not be according to interception Data are unlocked, and then ensure that the safety of unlocking, have ensured platform interests.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, preferred embodiment cited below particularly, and coordinate Appended attached drawing, is described in detail below.
Description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 shows a kind of schematic diagram of application environment provided in an embodiment of the present invention.
Fig. 2 shows a kind of structural schematic diagrams of lock provided in an embodiment of the present invention.
Fig. 3 shows a kind of flow diagram of safe unlocking method provided in an embodiment of the present invention.
Fig. 4 shows a kind of structural schematic diagram of server provided in an embodiment of the present invention.
Fig. 5 shows a kind of flow diagram of encipher-decipher method provided in an embodiment of the present invention.
Fig. 6 shows a kind of structural schematic diagram of safe tripper provided in an embodiment of the present invention.
Fig. 7 shows a kind of high-level schematic functional block diagram of ciphering and deciphering device provided in an embodiment of the present invention.
Diagram:100- locks;200- terminal devices;300- servers;The safe trippers of 110-;120- first memories; 130- first processors;310- ciphering and deciphering devices;320- second memories;330- second processors;The first receiving modules of 111-; 112- deciphering modules;113- matching modules;The first sending modules of 114-;115- memory modules;311- signal receiving modules;312- Second sending module;The second receiving modules of 313-;314- generation modules;315- encrypting modules;316- update modules.
Specific implementation mode
Below in conjunction with attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete Ground describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Usually exist The component of the embodiment of the present invention described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause This, the detailed description of the embodiment of the present invention to providing in the accompanying drawings is not intended to limit claimed invention below Range, but it is merely representative of the selected embodiment of the present invention.Based on the embodiment of the present invention, those skilled in the art are not doing The every other embodiment obtained under the premise of going out creative work, shall fall within the protection scope of the present invention.
It should be noted that:Similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined, then it further need not be defined and explained in subsequent attached drawing in a attached drawing.Meanwhile the present invention's In description, term " first ", " second " etc. are only used for distinguishing description, are not understood to indicate or imply relative importance.
Fig. 1 is please referred to, is a kind of schematic diagram of application environment provided in an embodiment of the present invention, it is provided in an embodiment of the present invention A kind of safe unlocking method is applied to lock 100, which is the electronic lock or mechanical lock being set on shared bicycle.The lock 100 Bluetooth is installed on upper or shared bicycle, which is communicated by bluetooth with terminal device 200, which can be with It is, but is not limited to, the intelligent electronic devices such as mobile phone, tablet computer, the terminal device 200 passes through wireless network or 2/3/4G networks It is connect with server 300.Also i other words, lock 100 and terminal device 200 between by bluetooth transmit data, terminal device 200 with Data are transmitted by network between server 300.Why lock 100 and terminal device 200 between by bluetooth transmit data, It is because the mode according to network transmits data, then necessarily to have flow consumption in order to reduce the cost of shared bicycle, need to prop up Pay operator corresponding expense.
Fig. 2 is please referred to, is a kind of structural schematic diagram of lock 100 provided in an embodiment of the present invention, which includes that safety solves Locking device 110, first memory 120 and first processor 130.
The first memory 120,130 each element of first processor are directly or indirectly electrically connected between each other, with reality The transmission or interaction of existing data.For example, these elements can be realized between each other by one or more communication bus or signal wire It is electrically connected.The safe tripper 110 can be stored in including at least one in the form of software or firmware (firmware) In first memory 120 or be solidificated in lock 100 operating system (operating system, OS) in software function module. First processor 130 is used to execute the executable module stored in first memory 120, such as safe tripper 110 includes Software function module and computer program etc..
Wherein, first memory 120 may be, but not limited to, random access memory (Random Access Memory, RAM), read-only memory (Read Only Memory, ROM), programmable read only memory (Programmable Read-Only Memory, PROM), erasable read-only memory (Erasable Programmable Read-Only Memory, EPROM), electricallyerasable ROM (EEROM) (Electric Erasable Programmable Read-Only Memory, EEPROM) etc..Wherein, first memory 120 is for storing program, and first processor 130 is executed instruction receiving Afterwards, described program is executed.
Fig. 3 is please referred to, is a kind of flow diagram of safe unlocking method provided in an embodiment of the present invention, this is unlocked safely Method is applied to lock 100, and this method includes:
Step S110 receives unlock clear-text passwords and Personal Unlocking Key that the terminal device is sent, and the unlock is in plain text Password and Personal Unlocking Key are obtained by the terminal device from the server.
Also i other words, when being unlocked, 200 scan setting of user's using terminal equipment obtains vehicle in the Quick Response Code on vehicle Essential information, which includes the number of vehicle.And then the terminal device 200 will be according to the essential information from server The unlock clear-text passwords and Personal Unlocking Key corresponding to the vehicle are obtained at 300, and lock 100 is transferred to by way of bluetooth In.It should be noted that being pre-stored in the lock 100 by encrypted ciphertext, which need to first decode the ciphertext, and verify Unlocking operation could be executed after password.The unlock clear-text passwords is the clear-text passwords corresponding to ciphertext in lock 100, is also the lock Password after ciphertext is decrypted in 100, the lock 100 by verify the unlock clear-text passwords whether the password for decoding out with ciphertext Matching, to determine whether to unlock.
Step S120, according to the decryption of the Personal Unlocking Key of acquisition, pre-stored ciphertext obtains purpose clear-text passwords.
I other words after the lock 100 obtains Personal Unlocking Key, pre-stored ciphertext is decrypted according to the Personal Unlocking Key of acquisition, into And obtain purpose clear-text passwords.It should be noted that the ciphertext being pre-stored in the lock 100 is when shutting by terminal device 200 It is obtained from server 300.
Step S130 matches the purpose clear-text passwords with the unlock clear-text passwords of acquisition, if matching one It causes, then controls lock and open.
Specifically, the lock 100 obtains the purpose clear-text passwords decoded out with by terminal device 200 from server 300 The unlock clear-text passwords taken is compared, if than more consistent, is verified, and then is controlled lock 100 and opened.
Step S140, the operation that shuts for responding user shut signal to terminal device transmission.
After user has used vehicle, execution is shut operation by user, and then the lock 100 shuts operation by respond user Signal is shut to the transmission of terminal device 200.
Step S150, receives and stores the new ciphertext that the terminal device is sent, and the ciphertext is rung for the server Answer what the terminal device sent to shut the new key and new password that signal generates at random, than by new close of new key pair Code is encrypted to obtain.
I other words the terminal device 200 receives and this is shut signal after shutting signal is sent to server 300, service Device 300 will generate new key and new password at random again, and is encrypted using the new password of the new key pair To new ciphertext.And then the new ciphertext is sent to lock 100 by server 300 by terminal device 200.100 pairs of receptions of the lock To ciphertext stored, to replace history ciphertext, when another user need unlock when, then need again from server 300 It obtains and corresponds to after the key pair of the new ciphertext ciphertext is unlocked and verifies, can unlock.
It can be seen that in the present solution, ciphertext in the lock 100 is generated simultaneously by server 300 after shutting every time at random It is sent in lock 100, it is emphasized that, key and password in the ciphertext are newly-generated, and server 300 is first to send out It send ciphertext to store into lock 100, and then just sends clear-text passwords and key when user asks, even and if then some process quilt It intercepts, other users can not unlock, and then improve safety.
Fig. 4 is please referred to, is a kind of structural schematic diagram for server 300 that inventive embodiments provide, which includes Ciphering and deciphering device 310, second memory 320 and second processor 330.
The second memory 320,330 each element of second processor are directly or indirectly electrically connected between each other, with reality The transmission or interaction of existing data.For example, these elements can be realized between each other by one or more communication bus or signal wire It is electrically connected.The ciphering and deciphering device 310 includes at least one the being stored in the form of software or firmware (firmware) In two memories 320 or the software function mould that is solidificated in the operating system (operating system, OS) of server 300 Block.Second processor 330 is used to execute the executable module stored in second memory 320, such as ciphering and deciphering device 310 includes Software function module and computer program etc..
Wherein, second memory 320 may be, but not limited to, random access memory (Random Access Memory, RAM), read-only memory (Read Only Memory, ROM), programmable read only memory (Programmable Read-Only Memory, PROM), erasable read-only memory (Erasable Programmable Read-Only Memory, EPROM), electricallyerasable ROM (EEROM) (Electric Erasable Programmable Read-Only Memory, EEPROM) etc..Wherein, second memory 320 is for storing program, and second processor 330 is executed instruction receiving Afterwards, described program is executed.
Fig. 5 is please referred to, is a kind of flow diagram of encipher-decipher method provided in an embodiment of the present invention, the encipher-decipher method Applied to server 300, this method includes:
Step S210 is received and is asked by the unlocking that the terminal device is sent.
I other words user by 200 scan setting of terminal device in the Quick Response Code on vehicle, to be sent out to server 300 Act request of unlocking.
Step S220, responding the unlocking request will pass through corresponding to the unlock clear-text passwords and Personal Unlocking Key of the lock The terminal device is sent to the lock, in order to which the lock is decrypted pre-stored ciphertext according to the Personal Unlocking Key To purpose clear-text passwords, and unlock when the purpose clear-text passwords is consistent with unlock clear-text passwords matching.
The server 300 responds the unlocking request that terminal device 200 is initiated, and will lock 100 unlock clear-text passwords and solution Lock key is sent to by terminal device 200 in lock 100.The lock 100 will carry out pre-stored ciphertext according to the Personal Unlocking Key Decryption obtains purpose clear-text passwords, and the purpose clear-text passwords is compared with unlock clear-text passwords, and when than more consistent, Execute unlocking operation.
Step S230, receives the signal that shuts of the terminal device transmission, and the signal that shuts is sent to institute by the lock State terminal device.
When user is finished vehicle, when needing to carry out shutting operation to vehicle, which will be by bluetooth to terminal device 200 Transmission shuts signal, and then this is shut signal and is sent to server 300 by the terminal device 200.
Step S240 shuts signal described in response and generates new key and new password at random.
And then the server 300 will respond this and shut signal and generates new key and new key at random, need to illustrate It is that the encryption method that the server 300 uses is symmetric cryptography or asymmetric encryption.Also i other words, which can lead to It crosses the method for symmetric cryptography and is encrypted to obtain ciphertext using the new password that identical key pair generates, when subsequent decryption, then It is sent to lock 100 using the identical password as Personal Unlocking Key, the ciphertext for being sent to lock 100 in advance to be decrypted.Or it should Server 300 uses the mode of asymmetric encryption, i other words, which is encrypted life using public key to new password At ciphertext, and then private key is subsequently sent to lock 100 so that ciphertext to be decrypted.
Step S250 is encrypted to obtain new ciphertext using the new password of new key pair.
I other words after each vehicle shuts 100, which will all regenerate new key and new password, And obtain new ciphertext after being encrypted by the new password of the new key pair.
New ciphertext is sent to by the terminal device in the lock, with to the history in the lock by step S260 Ciphertext is updated.
I.e. after server 300 generates new ciphertext, which is sent to by terminal device 200 in lock 100, History ciphertext in lock 100 is updated, and then lock 100 to grasp the unlocking of user according to new ciphertext in subsequent authentication It is verified, to improve the safety unlocked.
Fig. 6 is please referred to, is a kind of structural schematic diagram of originally safe tripper 110 provided in an embodiment of the present invention, the dress It sets including the first receiving module 111, deciphering module 112, matching module 113, the first sending module 114 and memory module 115.
First receiving module 111, the unlock clear-text passwords and Personal Unlocking Key sent for receiving the terminal device, institute It states unlock clear-text passwords and Personal Unlocking Key is obtained by the terminal device from the server.
In embodiments of the present invention, step S110 can be executed by the first receiving module 111.
Deciphering module 112, it is close in plain text for obtaining purpose according to the pre-stored ciphertext of the Personal Unlocking Key of acquisition decryption Code.
In embodiments of the present invention, step S120 can be executed by deciphering module 112.
Matching module 113, for the purpose clear-text passwords to be matched with the unlock clear-text passwords of acquisition, if Matching is consistent, then controls lock and open.
In embodiments of the present invention, step S130 can be executed by matching module 113.
First sending module 114, the operation that shuts for responding user shut signal to terminal device transmission.
In embodiments of the present invention, step S140 can be executed by the first sending module 114.
Memory module 115, the new ciphertext sent for receiving and storing the terminal device, the ciphertext are the clothes Business device responds the signal that shuts that the terminal device is sent and generates new key and new password at random, and new by new key pair Password be encrypted to obtain.
In embodiments of the present invention, step S150 can be executed by memory module 115.
Due to being had been described in safe unlocking method part, details are not described herein.
Fig. 7 is please referred to, is a kind of high-level schematic functional block diagram of ciphering and deciphering device 310 provided in an embodiment of the present invention, the dress It sets including signal receiving module 311, the second sending module 312, the second receiving module 313, generation module 314, encrypting module 315 And update module 316.
Signal receiving module 311, for receiving the unlocking request sent by the terminal device.
In embodiments of the present invention, step S210 can be executed by signal receiving module 311.
Second sending module 312, for respond unlocking request by corresponding to the unlock clear-text passwords of the lock and Personal Unlocking Key is sent to the lock by the terminal device, in order to which the lock is close to what is be pre-stored according to the Personal Unlocking Key Text is decrypted to obtain purpose clear-text passwords, and is opened when the purpose clear-text passwords is consistent with unlock clear-text passwords matching Lock.
In embodiments of the present invention, step S220 can be executed by the second sending module 312.
Second receiving module 313 shuts signal for receive that the terminal device sends, and the signal that shuts is by described Lock is sent to the terminal device.
In embodiments of the present invention, step S230 can be executed by the second receiving module 313.
Generation module 314 described shut signal and generates new key and new password at random for responding.
In embodiments of the present invention, step S240 can be executed by generation module 314.
Encrypting module 315, for being encrypted to obtain new ciphertext using the new password of new key pair.
In inventive embodiments, step S250 can be executed by encrypting module 315.
Update module 316, for new ciphertext to be sent to by the terminal device in the lock, in the lock History ciphertext be updated.
In embodiments of the present invention, step S260 can be executed by update module 316.
Due to being had been described in encipher-decipher method part, details are not described herein.
In conclusion a kind of safe unlocking method provided in an embodiment of the present invention and device, encryption and decryption method and device, lock And server, the method unlocked safely are applied to lock, which passes through net by bluetooth and terminal equipment in communication, the terminal device Network is connect with server.The method unlocked safely includes that the unlock clear-text passwords that receiving terminal apparatus is sent and unlock are close Key, and then purpose clear-text passwords is obtained according to the pre-stored ciphertext of the Personal Unlocking Key of acquisition decryption, so that the purpose is close in plain text Code is matched with the unlock clear-text passwords obtained, if matching is consistent, is unlocked.It can be seen that in the present solution, the lock Password be the ciphertext being encrypted in advance, when user is unlocked, in real time from server obtain Personal Unlocking Key it is close to this Text is decrypted to obtain purpose clear-text passwords, and when the purpose clear-text passwords matches consistent with unlock clear-text passwords, execution is opened Lock operation.Even if terminal device is intercepted when obtaining Personal Unlocking Key and unlock clear-text passwords from server, other users are not yet It can unlock according to the data of interception, and then ensure that the safety of unlocking, ensure platform interests.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through Other modes are realized.The apparatus embodiments described above are merely exemplary, for example, the flow chart in attached drawing and block diagram Show the device of multiple embodiments according to the present invention, the architectural framework in the cards of method and computer program product, Function and operation.In this regard, each box in flowchart or block diagram can represent the one of a module, section or code Part, a part for the module, section or code, which includes that one or more is for implementing the specified logical function, to be held Row instruction.It should also be noted that at some as in the realization method replaced, the function of being marked in box can also be to be different from The sequence marked in attached drawing occurs.For example, two continuous boxes can essentially be basically executed in parallel, they are sometimes It can execute in the opposite order, this is depended on the functions involved.It is also noted that every in block diagram and or flow chart The combination of box in a box and block diagram and or flow chart can use function or the dedicated base of action as defined in executing It realizes, or can be realized using a combination of dedicated hardware and computer instructions in the system of hardware.
In addition, each function module in each embodiment of the present invention can integrate to form an independent portion Point, can also be modules individualism, can also two or more modules be integrated to form an independent part.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module It is stored in a computer read/write memory medium.Based on this understanding, technical scheme of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be expressed in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention. And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic disc or CD.It needs Illustrate, herein, relational terms such as first and second and the like be used merely to by an entity or operation with Another entity or operation distinguish, and without necessarily requiring or implying between these entities or operation, there are any this realities The relationship or sequence on border.Moreover, the terms "include", "comprise" or its any other variant are intended to the packet of nonexcludability Contain, so that the process, method, article or equipment including a series of elements includes not only those elements, but also includes Other elements that are not explicitly listed, or further include for elements inherent to such a process, method, article, or device. In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including the element Process, method, article or equipment in there is also other identical elements.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, any made by repair Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.It should be noted that:Similar label and letter exist Similar terms are indicated in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, are then not required in subsequent attached drawing It is further defined and is explained.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain Lid is within protection scope of the present invention.Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. a kind of safe unlocking method is applied to lock, by bluetooth and terminal equipment in communication, the terminal device passes through the lock Network is connect with server, which is characterized in that the method includes:
Unlock clear-text passwords and Personal Unlocking Key that the terminal device is sent are received, the unlock clear-text passwords and unlock are close Key is obtained by the terminal device from the server;
According to the decryption of the Personal Unlocking Key of acquisition, pre-stored ciphertext obtains purpose clear-text passwords;
The purpose clear-text passwords is matched with the unlock clear-text passwords of acquisition, if matching is consistent, lock is controlled and beats It opens.
2. the method as described in claim 1, which is characterized in that the method further includes:
The operation that shuts of response user shuts signal to terminal device transmission;
The new ciphertext that the terminal device is sent is received and stored, the ciphertext is that the server responds the terminal device The signal that shuts sent generates new key and new password at random, and is encrypted to obtain by the new password of new key pair.
3. a kind of encipher-decipher method is applied to server, the server is connect by network with terminal device, and the terminal is set It is standby to be connected by bluetooth and lock, which is characterized in that the method includes:
It receives and is asked by the unlocking that the terminal device is sent;
The terminal device will be passed through corresponding to the unlock clear-text passwords of the lock and Personal Unlocking Key by responding the unlocking request Be sent to the lock, in order to the lock according to the Personal Unlocking Key pre-stored ciphertext is decrypted to obtain purpose it is close in plain text Code, and unlock when the purpose clear-text passwords is consistent with unlock clear-text passwords matching.
4. method as claimed in claim 3, which is characterized in that the method further includes:
The signal that shuts of the terminal device transmission is received, the signal that shuts is sent to the terminal device by the lock;
Signal is shut described in response generates new key and new password at random;
It is encrypted to obtain new ciphertext using the new password of new key pair;
New ciphertext is sent to by the terminal device in the lock, to be updated to the history ciphertext in the lock.
5. a kind of safe tripper is applied to lock, by bluetooth and terminal equipment in communication, the terminal device passes through the lock Network is connect with server, which is characterized in that described device includes:
First receiving module, the unlock clear-text passwords and Personal Unlocking Key sent for receiving the terminal device, the unlock Clear-text passwords and Personal Unlocking Key are obtained by the terminal device from the server;
Deciphering module, for obtaining purpose clear-text passwords according to the pre-stored ciphertext of the Personal Unlocking Key of acquisition decryption;
Matching module, for matching the purpose clear-text passwords with the unlock clear-text passwords of acquisition, if matching one It causes, then controls lock and open.
6. device as claimed in claim 5, which is characterized in that described device further includes:
First sending module, the operation that shuts for responding user shut signal to terminal device transmission;
Memory module, the new ciphertext sent for receiving and storing the terminal device, the ciphertext are rung for the server The signal that shuts that the terminal device is sent is answered to generate new key and new password at random, and by the new password of new key pair It is encrypted to obtain.
7. a kind of ciphering and deciphering device is applied to server, the server is connect by network with terminal device, and the terminal is set The standby bluetooth that passes through is connected with lock, which is characterized in that described device includes:
Signal receiving module, for receiving the unlocking request sent by the terminal device;
Second sending module, will be corresponding to the unlock clear-text passwords and Personal Unlocking Key of the lock for responding the unlocking request It is sent to the lock by the terminal device, in order to which the lock solves pre-stored ciphertext according to the Personal Unlocking Key It is close to obtain purpose clear-text passwords, and unlock when the purpose clear-text passwords is consistent with unlock clear-text passwords matching.
8. device as claimed in claim 7, which is characterized in that described device further includes:
Second receiving module shuts signal for receive that the terminal device sends, and the signal that shuts is sent by the lock To the terminal device;
Generation module described shut signal and generates new key and new password at random for responding;
Encrypting module, for being encrypted to obtain new ciphertext using the new password of new key pair;
Update module, for new ciphertext to be sent to by the terminal device in the lock, with to the history in the lock Ciphertext is updated.
9. a kind of lock, described lock is equipped with bluetooth, and by bluetooth and terminal equipment in communication, the terminal device passes through the lock Network is connect with server, which is characterized in that the lock includes first memory and first processor, and the first memory is used In storage computer program code, the first processor is for executing the computer program being stored in the first memory Code is to realize the safe unlocking method as described in any one of claims 1 or 2.
10. a kind of server, the server is connect by network with terminal device, and the terminal device is connected by bluetooth and lock It connects, which is characterized in that the server includes second memory and second processor, and the second memory is calculated for storing Machine program code, the second processor is for executing the computer program code being stored in the second memory to realize Encipher-decipher method as described in any one of claim 3 or 4.
CN201810175759.1A 2018-03-02 2018-03-02 Safe unlocking method and device, encryption and decryption method and device, lock and server Pending CN108447154A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810175759.1A CN108447154A (en) 2018-03-02 2018-03-02 Safe unlocking method and device, encryption and decryption method and device, lock and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810175759.1A CN108447154A (en) 2018-03-02 2018-03-02 Safe unlocking method and device, encryption and decryption method and device, lock and server

Publications (1)

Publication Number Publication Date
CN108447154A true CN108447154A (en) 2018-08-24

Family

ID=63193091

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810175759.1A Pending CN108447154A (en) 2018-03-02 2018-03-02 Safe unlocking method and device, encryption and decryption method and device, lock and server

Country Status (1)

Country Link
CN (1) CN108447154A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109168162A (en) * 2018-11-20 2019-01-08 北京千丁互联科技有限公司 Bluetooth communication encryption method, device and intelligent security guard equipment
CN109285252A (en) * 2018-09-29 2019-01-29 百度在线网络技术(北京)有限公司 Lock control method and device
CN109410375A (en) * 2018-08-29 2019-03-01 安芯锁(北京)信息技术有限公司 The switch locking method and its system of the passive electronic lock core of built-in security chip
CN109872423A (en) * 2019-01-17 2019-06-11 深圳旦倍科技有限公司 A kind of intelligent door lock system
CN109933481A (en) * 2019-03-13 2019-06-25 珠海市一微半导体有限公司 A kind of system for unlocking and JTAG solution lock control method of jtag interface
WO2020147150A1 (en) * 2019-01-18 2020-07-23 深圳市沃特沃德股份有限公司 Unlocking password generation method and password unlocking method, apparatus and unlocking system
CN113345139A (en) * 2021-06-03 2021-09-03 珠海优特物联科技有限公司 Unlocking method, intelligent lock cylinder and intelligent lock system
CN115050140A (en) * 2022-06-08 2022-09-13 杭州野乐科技有限公司 Unlocking method, device and equipment of shared bicycle and storage medium
CN115331330A (en) * 2021-04-26 2022-11-11 华为技术有限公司 Unlocking method, key resetting method, device, terminal, lock and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2743868A1 (en) * 2012-12-14 2014-06-18 Seven Principles AG Virtual vehicle key
CN103886659A (en) * 2014-02-25 2014-06-25 苏州美高立电气有限公司 Electronic security device and control method thereof
CN104732626A (en) * 2015-01-22 2015-06-24 西安酷派软件科技有限公司 Entrance guard authorization management method and entrance guard authorization management system
CN205140035U (en) * 2015-10-22 2016-04-06 深圳优方网络技术有限公司 Mobile terminal and intelligent communication system who locks
CN107067249A (en) * 2017-04-17 2017-08-18 北京工业大学 A kind of encryption method for being applied to intelligently lock leasing system
CN107301697A (en) * 2017-05-09 2017-10-27 南昌大学 The dynamic encryption and localization method of a kind of electronic lock

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2743868A1 (en) * 2012-12-14 2014-06-18 Seven Principles AG Virtual vehicle key
CN103886659A (en) * 2014-02-25 2014-06-25 苏州美高立电气有限公司 Electronic security device and control method thereof
CN104732626A (en) * 2015-01-22 2015-06-24 西安酷派软件科技有限公司 Entrance guard authorization management method and entrance guard authorization management system
CN205140035U (en) * 2015-10-22 2016-04-06 深圳优方网络技术有限公司 Mobile terminal and intelligent communication system who locks
CN107067249A (en) * 2017-04-17 2017-08-18 北京工业大学 A kind of encryption method for being applied to intelligently lock leasing system
CN107301697A (en) * 2017-05-09 2017-10-27 南昌大学 The dynamic encryption and localization method of a kind of electronic lock

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109410375A (en) * 2018-08-29 2019-03-01 安芯锁(北京)信息技术有限公司 The switch locking method and its system of the passive electronic lock core of built-in security chip
CN109285252A (en) * 2018-09-29 2019-01-29 百度在线网络技术(北京)有限公司 Lock control method and device
CN109285252B (en) * 2018-09-29 2021-08-10 百度在线网络技术(北京)有限公司 Vehicle lock control method and device
CN109168162A (en) * 2018-11-20 2019-01-08 北京千丁互联科技有限公司 Bluetooth communication encryption method, device and intelligent security guard equipment
CN109168162B (en) * 2018-11-20 2021-09-21 北京千丁互联科技有限公司 Bluetooth communication encryption method and device and intelligent security equipment
CN109872423A (en) * 2019-01-17 2019-06-11 深圳旦倍科技有限公司 A kind of intelligent door lock system
WO2020147150A1 (en) * 2019-01-18 2020-07-23 深圳市沃特沃德股份有限公司 Unlocking password generation method and password unlocking method, apparatus and unlocking system
CN109933481A (en) * 2019-03-13 2019-06-25 珠海市一微半导体有限公司 A kind of system for unlocking and JTAG solution lock control method of jtag interface
CN109933481B (en) * 2019-03-13 2022-08-09 珠海一微半导体股份有限公司 JTAG interface unlocking system and JTAG unlocking control method
CN115331330A (en) * 2021-04-26 2022-11-11 华为技术有限公司 Unlocking method, key resetting method, device, terminal, lock and system
CN113345139A (en) * 2021-06-03 2021-09-03 珠海优特物联科技有限公司 Unlocking method, intelligent lock cylinder and intelligent lock system
CN115050140A (en) * 2022-06-08 2022-09-13 杭州野乐科技有限公司 Unlocking method, device and equipment of shared bicycle and storage medium

Similar Documents

Publication Publication Date Title
CN108447154A (en) Safe unlocking method and device, encryption and decryption method and device, lock and server
US20210350013A1 (en) Security systems and methods for continuous authorized access to restricted access locations
US9350548B2 (en) Two factor authentication using a protected pin-like passcode
CN105141584B (en) A kind of equipment authentication method and device of smart home system
CN105337977B (en) A kind of the safety moving communication system and its implementation of dynamic bidirectional certification
CN101742499B (en) Account number protection system for mobile communication equipment terminal and application method thereof
CN103929306B (en) The approaches to IM of intelligent cipher key equipment and intelligent cipher key equipment
AU2024200833A1 (en) First factor contactless card authentication system and method
US20160205098A1 (en) Identity verifying method, apparatus and system, and related devices
CN105282179B (en) A method of family's Internet of Things security control based on CPK
CN103929307A (en) Password input method, intelligent secret key device and client device
US20170085561A1 (en) Key storage device and method for using same
EP2894891B1 (en) Mobile token
WO2015034384A1 (en) Apparatus and method for authenticating a user via multiple user devices
CN106789024B (en) A kind of remote de-locking method, device and system
CN1910531B (en) Method and system used for key control of data resource, related network
US20180212957A1 (en) Apparatus and method for authentication, and computer program and recording medium applied to the same
CN103905400A (en) Service authentication method, apparatus and system
CN108768941B (en) Method and device for remotely unlocking safety equipment
CN101944216A (en) Two-factor online transaction safety authentication method and system
TW201544983A (en) Data communication method and system, client terminal and server
KR101358375B1 (en) Prevention security system and method for smishing
CN111008400A (en) Data processing method, device and system
CN103596175A (en) Mobile intelligent terminal certification system and method based on near field communication technology
CN109639418A (en) A kind of authentication method of configuration information, device and rent-a-car

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180824

RJ01 Rejection of invention patent application after publication