CN109035509A - A method of intelligent door lock is opened and closed by block chain - Google Patents
A method of intelligent door lock is opened and closed by block chain Download PDFInfo
- Publication number
- CN109035509A CN109035509A CN201810762711.0A CN201810762711A CN109035509A CN 109035509 A CN109035509 A CN 109035509A CN 201810762711 A CN201810762711 A CN 201810762711A CN 109035509 A CN109035509 A CN 109035509A
- Authority
- CN
- China
- Prior art keywords
- door lock
- access
- mobile terminal
- code
- processor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Lock And Its Accessories (AREA)
Abstract
The present invention provides a kind of methods for opening and closing intelligent door lock by block chain, generate fetcher code and private key associated with the fetcher code by the processor of computing system, the fetcher code is used to obtain the access to the intelligent door lock;Processor hashes access code to obtain hash access code;Processor hashes access code using public key encryption to create digital signature, wherein hash access code and digital signature are stored in block chain on block;Processor response in from intelligent mobile terminal access intelligent door lock request and authentication intelligent mobile terminal;Private key and digital signature is sent to by processor the intelligent mobile terminal of certification;Authentication intelligent mobile terminal decrypts digital signature using private key to obtain hash access code, and hash access code is sent to computing system;In response to receiving hash access code from intelligent mobile terminal, processor controls intelligent door lock and is unlocked or locked.
Description
Technical field
The present invention relates to block chain application fields, in particular to a kind of side for opening and closing intelligent door lock by block chain
Method.
Background technique
Intelligent door lock is widely used at present, but the leakage of the password of door lock causes dangerous, and frequent Change Password is non-
It is often not convenient.And block chain is advantageous in terms of encryption.Block chain is Distributed Storage, point-to-point transmission, common recognition
The new application mode of the computer technologies such as mechanism, Encryption Algorithm.So-called common recognition mechanism is that different sections are realized in block catenary system
The mathematical algorithm for trusting, obtaining equity is established between point.It is, in general, that block catenary system by data Layer, network layer, common recognition layer,
Excitation layer, contract layer and application layer composition.Wherein, data Layer encapsulate bottom data block and relevant data encryption and when
Between stab etc. basic datas and rudimentary algorithm;Network layer then includes distributed networking mechanism, data dissemination mechanism and data verification machine
System etc.;All kinds of common recognition algorithms of common recognition layer predominant package network node;Economic factor is integrated into block chain technology body by excitation layer
System, main issuing mechanism and distribution mechanism etc. including economic incentives;All kinds of scripts of contract layer predominant package, algorithm and intelligence
Energy contract, is the basis of block chain programmable features;Application layer then encapsulates the various application scenarios and case of block chain.The mould
In type, the common recognition mechanism of chain type block structure, distributed node based on timestamp, the economic incentives and spirit that power is calculated based on common recognition
Programmable intelligent contract living is the most representative innovative point of block chain technology.Due to using distributed accounting and storage, no
There are the hardware of centralization or management organization, the rights and duties of arbitrary node be all it is impartial, the data block in system is by whole
There is the node of maintenance function to safeguard in a system jointly.System be it is open, the private information in addition to Trading parties is added
Close outer, the data of block chain disclose owner, anyone can pass through disclosed interface polls block chain data and exploitation
Related application, therefore whole system information highly transparent.Block chain uses (such as a set of based on consensus specification and agreement
Open and clear algorithm) enable all nodes in whole system going the free safe exchange data of the environment trusted,
So that being changed to the trust to machine to the trust of " people ", any artificial intervention does not work.Once information is by verifying simultaneously
Be added to block chain, permanent will store, unless can control simultaneously be more than in system 51% node, it is otherwise single
It is invalid to the modification of database on a node, therefore the data stability of block chain and reliability are high.Due to node it
Between exchange follow fixed algorithm, without trusting, (rules of order in block chain can voluntarily judge to live for data interaction
It is dynamic whether effective), therefore counterparty need not allow other side to generate trust to oneself by way of public identity, tire out to credit
Product is very helpful.
Block chain as future generation computer system, the practical problem urgently handled in practical application there are also it is many not
It is proposed specific solution.
Summary of the invention
The invention proposes a kind of method for opening and closing intelligent door lock by block chain, the lock core controllers of the intelligent door lock
One computing system of communication connection, further include: by computing system processor generate fetcher code and with the fetcher code phase
Associated private key, the fetcher code are used to obtain the access to the intelligent door lock;Processor to access code hashed with
Obtain hash access code;Processor hashes access code using public key encryption to create digital signature, wherein hash access code sum number
Word signature is stored in block chain on block;Processor response in the access intelligent door lock from intelligent mobile terminal request and authenticate
Intelligent mobile terminal;Private key and digital signature is sent to by processor the intelligent mobile terminal of certification;Authentication intelligent is mobile eventually
Digital signature is decrypted using private key to obtain hash access code in end, and hash access code is sent to computing system;In response to from
Intelligent mobile terminal receives hash access code, and processor controls intelligent door lock and unlocked or locked.The intelligence
Mobile terminal can be smart phone, IPAD, laptop, wearable intelligently equipment etc. of user.
Further, wherein being coupled to one or more input mechanisms of the computing system in the pre- of the intelligent door lock
Define the presence of the detection intelligent mobile terminal in the degree of approach, wherein enter in response to the intelligent mobile terminal and send
The private key.
Further, the intelligent door lock can access in finite time, and work as the finite time past tense, described
Private key is no longer valid to obtain the access to intelligent door lock and generate new fetcher code.
It further, further include generating the intelligent mobile terminal on the block chain to obtain to the intelligent door lock
The affairs of access, and the block chain prevents the computing system from sending more than one private key.
Specific embodiment
In order to enable the objectives, technical solutions, and advantages of the present invention are more clearly understood, below in conjunction with embodiment, to this
Invention is further elaborated;It should be appreciated that described herein, the specific embodiments are only for explaining the present invention, and does not have to
It is of the invention in limiting.To those skilled in the art, after access is described in detail below, other systems of the present embodiment
System, method and/or feature will become obvious.All such additional systems, method, feature and advantage are intended to be included in
It in this specification, is included within the scope of the invention, and by the protection of the appended claims.In description described in detail below
The other feature of the disclosed embodiments, and these characteristic roots will be apparent according to described in detail below.
Embodiment one.
The present embodiment explains a kind of method for opening and closing intelligent door lock by block chain, the lock core controller of the intelligent door lock
One computing system of communication connection, which comprises by computing system processor generate fetcher code and with the access generation
The associated private key of code, the fetcher code are used to obtain the access to the intelligent door lock;Processor carries out access code scattered
Column are to obtain hash access code;Processor hashes access code to create digital signature, wherein hashing access code using public key encryption
Block chain on block is stored in digital signature;Processor response in from intelligent mobile terminal access intelligent door lock request and
Authentication intelligent mobile terminal;Private key and digital signature is sent to by processor the intelligent mobile terminal of certification;Authentication intelligent moves
Dynamic terminal decrypts digital signature using private key to obtain hash access code, and hash access code is sent to computing system;Response
In receiving hash access code from intelligent mobile terminal, processor controls intelligent door lock and is unlocked or locked.
Further, wherein being coupled to one or more input mechanisms of the computing system in the pre- of the intelligent door lock
Define the presence of the detection intelligent mobile terminal in the degree of approach, wherein enter in response to the intelligent mobile terminal and send
The private key.
Further, the intelligent door lock can access in finite time, and work as the finite time past tense, described
Private key is no longer valid to obtain the access to intelligent door lock and generate new fetcher code.
It further, further include generating the intelligent mobile terminal on the block chain to obtain to the intelligent door lock
The affairs of access, and the block chain prevents the computing system from sending more than one private key.
Embodiment two.
For design of the invention is explained further, it is explained further here based on the computer system, computer system packet
It includes: processor;At least one is coupled to the input mechanism of the processor;It is coupled to the memory devices of the processor;With
It is coupled to the computer readable storage devices of processor, wherein storage equipment includes program code, which can be by handling
Device is executed via memory devices to realize the method for controlling the access to intelligent door lock, this method comprises: being by calculating
The processor of system generates, and fetcher code and private key associated with fetcher code, fetcher code is for obtaining to intelligent door lock
Access;By processor hash fetcher code to obtain hash fetcher code;By processor encryption public key hash access code to create
Digital signature is built, wherein hash access code and digital signature are stored on the block of block chain;By processor response in from reception
Reception device is verified in the request of device.Obtain the access to intelligent door lock;Private key and digital signature is sent to by processor
Certified intelligent mobile terminal;Digital signature is decrypted using private key by processor indicating intelligent mobile terminal to visit to obtain hash
It asks code, and sends computing system for hash access code;In response to receiving hash access code, processor from intelligent mobile terminal
Intelligent door lock, such as intelligent door lock is locked or unlocked.Intelligent door lock can be existing intelligent cipher lock, belong on the market
Existing device device no longer just plays structure here and repeats.
Wherein it is coupled to one or more input mechanisms of the computing system in the predefined close of the intelligent door lock
The presence of the detection intelligent mobile terminal in degree, wherein send the private key in response to the intelligent mobile terminal.And institute
Stating intelligent door lock can access in finite time, and work as the finite time past tense, and the private key is no longer valid to obtain
To intelligent door lock access and generate new fetcher code.Wherein the fetcher code keeps the intelligent mobile terminal
It is unknown.It further include the affairs that the access that the intelligent mobile terminal is obtained to the lock space is generated on the block chain,
And the block chain prevents the computing system from sending more than one private key.
Embodiment three.
The present embodiment provides a kind of opening and closing intelligent door lock method comprising intelligent door lock is arranged on various portals, then
By block chain control express delivery intelligent door lock access, access include: by computing system processor generate fetcher code and with
The associated private key of fetcher code, the fetcher code are used to obtain the access to the intelligent door lock;Processor is to visit
Ask that code is hashed to obtain hash access code;Processor hashes access code using public key encryption to create digital signature, wherein
Hash access code and digital signature are stored in block chain on block;Processor response is in the access intelligent door from intelligent mobile terminal
The request of lock and authentication intelligent mobile terminal;Private key and digital signature is sent to by processor the intelligent mobile terminal of certification;
Authentication intelligent mobile terminal decrypts digital signature using private key to obtain hash access code, and hash access code is sent to calculating
System;In response to receiving hash access code from intelligent mobile terminal, processor intelligent door lock is controlled and unlocked or
Locking.
Wherein it is coupled to one or more input mechanisms of the computing system in the predefined close of the intelligent door lock
The presence of the detection intelligent mobile terminal in degree, wherein enter in response to the intelligent mobile terminal and send the private key.
The intelligent door lock can access in finite time, and work as the finite time past tense, and the private key is no longer valid to obtain
It obtains the access to intelligent door lock and generates new fetcher code.
It further include the thing that the access that the intelligent mobile terminal is obtained to the intelligent door lock is generated on the block chain
Business, and the block chain prevents the computing system from sending more than one private key.
Example IV.
The method concept of the invention is configured to a kind of computer program product by the present embodiment, including storage computer can
The computer-readable hardware storage device of reader code, the computer readable program code include when the meter by computing system
The algorithm of the method for controlling the access to lock space is realized when calculation machine processor executes.It include: by computing system
It manages device and generates fetcher code and private key associated with fetcher code, fetcher code is used to obtain the access to lock space;By
Processor hashes fetcher code to obtain hash access code;By hash access code of the processor encryption with public key to create number
Signature, wherein hash access code and digital signature are stored on the block of block chain;By processor auth response in from intelligent sliding
The request intelligent mobile terminal of dynamic terminal is to obtain the access to lock space;Private key and digital signature is sent to by processor
Authenticating step intelligent mobile terminal;Processor indicating intelligent mobile terminal decrypts digital signature using private key to obtain hash access
Code, and hash access code is sent to computing system;In response to receiving hash access code, processor lock from intelligent mobile terminal
Determine space.Wherein it is coupled to the predefined degree of approach of one or more input mechanisms in the lock space of the computing system
The presence of the interior detection intelligent mobile terminal, wherein in response to the reception, send the private key.It is empty that equipment enters locking
Between the predefined degree of approach.The lock space can access in finite time, and work as the finite time past tense, described
Private key is no longer valid to obtain the access to lock space and generate new fetcher code.
And the transaction for the access that the intelligent mobile terminal is obtained to the lock space is generated on the block chain.
The block chain prevents the computing system from sending more than one private key.
Although describing the present invention by reference to various embodiments above, but it is to be understood that of the invention not departing from
In the case where range, many changes and modifications can be carried out.Therefore, be intended to foregoing detailed description be considered as it is illustrative and
It is unrestricted, and it is to be understood that following following claims (including all equivalents) is intended to limit spirit and model of the invention
It encloses.The above embodiment is interpreted as being merely to illustrate the present invention rather than limit the scope of the invention.It is reading
After the content of record of the invention, technical staff can be made various changes or modifications the present invention, these equivalence changes and
Modification equally falls into the scope of the claims in the present invention.
Claims (5)
1. the lock core controller communication connection one of a kind of method for opening and closing intelligent door lock by block chain, the intelligent door lock calculates
System, which is characterized in that the described method includes: by the computing system processor generate fetcher code and with the access generation
The associated private key of code, the fetcher code are used to obtain the access to the intelligent door lock;Processor carries out access code scattered
Column are to obtain hash access code;Processor hashes access code to create digital signature, wherein hashing access code using public key encryption
Block chain on block is stored in digital signature;Processor response in from intelligent mobile terminal access intelligent door lock request and
Authentication intelligent mobile terminal;Private key and digital signature is sent to by processor the intelligent mobile terminal of certification;Authentication intelligent moves
Dynamic terminal decrypts digital signature using private key to obtain hash access code, and hash access code is sent to computing system;Response
In receiving hash access code from intelligent mobile terminal, processor controls intelligent door lock and is unlocked or locked.
2. the method according to claim 1, wherein the one or more for being wherein coupled to the computing system is defeated
Enter the presence that mechanism detects the intelligent mobile terminal in the predefined degree of approach of the intelligent door lock, wherein in response to institute
Intelligent mobile terminal is stated to enter and send the private key.
3. method according to claim 2, which is characterized in that the intelligent door lock can access in finite time, and work as
The finite time past tense, the private key are no longer valid to obtain the access to intelligent door lock and generate new access generation
Code.
4. method as claimed in claim 3, which is characterized in that further include generating the intelligent mobile end on the block chain
End obtains the affairs of the access to the intelligent door lock, and the block chain prevents the computing system from sending more than one private
Key.
5. method as claimed in claim 4, which is characterized in that the intelligent mobile terminal can be user smart phone,
One of IPAD, laptop, wearable intelligence equipment etc..
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810762711.0A CN109035509A (en) | 2018-07-12 | 2018-07-12 | A method of intelligent door lock is opened and closed by block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810762711.0A CN109035509A (en) | 2018-07-12 | 2018-07-12 | A method of intelligent door lock is opened and closed by block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109035509A true CN109035509A (en) | 2018-12-18 |
Family
ID=64640920
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810762711.0A Withdrawn CN109035509A (en) | 2018-07-12 | 2018-07-12 | A method of intelligent door lock is opened and closed by block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109035509A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110415406A (en) * | 2019-07-24 | 2019-11-05 | 上海征晨信息科技有限公司 | A kind of double nets are mutual to monitor security intelligent door lock system for speech recognition |
CN112233282A (en) * | 2020-10-14 | 2021-01-15 | 重庆创敏科技集团有限责任公司 | Block chain type artificial intelligent safety intelligent door lock system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101490687A (en) * | 2006-07-07 | 2009-07-22 | 桑迪士克股份有限公司 | Control system and method using identity objects |
CN104851159A (en) * | 2014-12-01 | 2015-08-19 | 讯美电子科技有限公司 | Network-type door access control system |
CN105847276A (en) * | 2016-04-28 | 2016-08-10 | 乐视控股(北京)有限公司 | Access control method and device |
US20170270721A1 (en) * | 2016-03-18 | 2017-09-21 | Dangerous Things LLC. | In vivo identity and security application implant and method |
CN107978047A (en) * | 2017-12-04 | 2018-05-01 | 北京深思数盾科技股份有限公司 | Use the methods, devices and systems of password unlocking |
CN108009878A (en) * | 2017-11-24 | 2018-05-08 | 深圳市轱辘车联数据技术有限公司 | A kind of information processing method and its device |
US20180167394A1 (en) * | 2016-12-14 | 2018-06-14 | Wal-Mart Stores, Inc. | Controlling access to a locked space using cryptographic keys stored on a blockchain |
-
2018
- 2018-07-12 CN CN201810762711.0A patent/CN109035509A/en not_active Withdrawn
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101490687A (en) * | 2006-07-07 | 2009-07-22 | 桑迪士克股份有限公司 | Control system and method using identity objects |
CN104851159A (en) * | 2014-12-01 | 2015-08-19 | 讯美电子科技有限公司 | Network-type door access control system |
US20170270721A1 (en) * | 2016-03-18 | 2017-09-21 | Dangerous Things LLC. | In vivo identity and security application implant and method |
CN105847276A (en) * | 2016-04-28 | 2016-08-10 | 乐视控股(北京)有限公司 | Access control method and device |
US20180167394A1 (en) * | 2016-12-14 | 2018-06-14 | Wal-Mart Stores, Inc. | Controlling access to a locked space using cryptographic keys stored on a blockchain |
CN108009878A (en) * | 2017-11-24 | 2018-05-08 | 深圳市轱辘车联数据技术有限公司 | A kind of information processing method and its device |
CN107978047A (en) * | 2017-12-04 | 2018-05-01 | 北京深思数盾科技股份有限公司 | Use the methods, devices and systems of password unlocking |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110415406A (en) * | 2019-07-24 | 2019-11-05 | 上海征晨信息科技有限公司 | A kind of double nets are mutual to monitor security intelligent door lock system for speech recognition |
CN112233282A (en) * | 2020-10-14 | 2021-01-15 | 重庆创敏科技集团有限责任公司 | Block chain type artificial intelligent safety intelligent door lock system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hou et al. | A survey on internet of things security from data perspectives | |
Li et al. | Data security and privacy in wireless body area networks | |
CN103391192B (en) | A kind of based on secret protection across security domain access control system and control method thereof | |
Yang et al. | EdgeShare: A blockchain-based edge data-sharing framework for Industrial Internet of Things | |
Liu et al. | The security of blockchain-based medical systems: Research challenges and opportunities | |
CN110474921B (en) | Perception layer data fidelity method for local area Internet of things | |
Nadiya et al. | Blockchain-based secure data storage for door lock system | |
CN112260275B (en) | Non-invasive load decomposition method and system based on blockchain technology | |
Song | Security in Internet of Things | |
Yang et al. | A Hybrid Blockchain-Based Authentication Scheme for Smart Home | |
CN109035510A (en) | A method of controlling the access of express delivery smart lock by block chain | |
CN109035509A (en) | A method of intelligent door lock is opened and closed by block chain | |
Prada-Delgado et al. | A blockchain-based crypto-anchor platform for interoperable product authentication | |
Makina et al. | Survey on security and privacy in Internet of Things‐based eHealth applications: Challenges, architectures, and future directions | |
CN110189440A (en) | A kind of smart lock monitoring equipment and its method based on block chain | |
Luo et al. | Accountable data sharing scheme based on blockchain and SGX | |
Zou et al. | Information Security Transmission Technology in Internet of Things Control System. | |
KR102388280B1 (en) | Server of artificial intelligence personal privacy data security system | |
Saad et al. | Securing Smart City Services in Cyber-Physical Systems using the computation annealed selection process | |
KR102249758B1 (en) | Artificial intelligence personal privacy data security system applying case based reasoning technology and block chain method and server thereof | |
Abou El Houda et al. | Towards a Secure and Scalable Access Control System Using Blockchain | |
Rababah et al. | A novel smart home lightweight authentication protocol using iot applications | |
Han et al. | Offline authentication scheme based on blockchain technology for smart lock | |
Wang | [Retracted] Internet of Things Device Identification Algorithm considering User Privacy | |
CN108958898A (en) | A method of for issuing anonymous orientation affairs to block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20181218 |
|
WW01 | Invention patent application withdrawn after publication |