CN109035509A - A method of intelligent door lock is opened and closed by block chain - Google Patents

A method of intelligent door lock is opened and closed by block chain Download PDF

Info

Publication number
CN109035509A
CN109035509A CN201810762711.0A CN201810762711A CN109035509A CN 109035509 A CN109035509 A CN 109035509A CN 201810762711 A CN201810762711 A CN 201810762711A CN 109035509 A CN109035509 A CN 109035509A
Authority
CN
China
Prior art keywords
door lock
access
mobile terminal
code
processor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810762711.0A
Other languages
Chinese (zh)
Inventor
刘祎
马克西姆·马修斯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Foshan Ys Jusen Technology Co Ltd
Original Assignee
Foshan Ys Jusen Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Foshan Ys Jusen Technology Co Ltd filed Critical Foshan Ys Jusen Technology Co Ltd
Priority to CN201810762711.0A priority Critical patent/CN109035509A/en
Publication of CN109035509A publication Critical patent/CN109035509A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present invention provides a kind of methods for opening and closing intelligent door lock by block chain, generate fetcher code and private key associated with the fetcher code by the processor of computing system, the fetcher code is used to obtain the access to the intelligent door lock;Processor hashes access code to obtain hash access code;Processor hashes access code using public key encryption to create digital signature, wherein hash access code and digital signature are stored in block chain on block;Processor response in from intelligent mobile terminal access intelligent door lock request and authentication intelligent mobile terminal;Private key and digital signature is sent to by processor the intelligent mobile terminal of certification;Authentication intelligent mobile terminal decrypts digital signature using private key to obtain hash access code, and hash access code is sent to computing system;In response to receiving hash access code from intelligent mobile terminal, processor controls intelligent door lock and is unlocked or locked.

Description

A method of intelligent door lock is opened and closed by block chain
Technical field
The present invention relates to block chain application fields, in particular to a kind of side for opening and closing intelligent door lock by block chain Method.
Background technique
Intelligent door lock is widely used at present, but the leakage of the password of door lock causes dangerous, and frequent Change Password is non- It is often not convenient.And block chain is advantageous in terms of encryption.Block chain is Distributed Storage, point-to-point transmission, common recognition The new application mode of the computer technologies such as mechanism, Encryption Algorithm.So-called common recognition mechanism is that different sections are realized in block catenary system The mathematical algorithm for trusting, obtaining equity is established between point.It is, in general, that block catenary system by data Layer, network layer, common recognition layer, Excitation layer, contract layer and application layer composition.Wherein, data Layer encapsulate bottom data block and relevant data encryption and when Between stab etc. basic datas and rudimentary algorithm;Network layer then includes distributed networking mechanism, data dissemination mechanism and data verification machine System etc.;All kinds of common recognition algorithms of common recognition layer predominant package network node;Economic factor is integrated into block chain technology body by excitation layer System, main issuing mechanism and distribution mechanism etc. including economic incentives;All kinds of scripts of contract layer predominant package, algorithm and intelligence Energy contract, is the basis of block chain programmable features;Application layer then encapsulates the various application scenarios and case of block chain.The mould In type, the common recognition mechanism of chain type block structure, distributed node based on timestamp, the economic incentives and spirit that power is calculated based on common recognition Programmable intelligent contract living is the most representative innovative point of block chain technology.Due to using distributed accounting and storage, no There are the hardware of centralization or management organization, the rights and duties of arbitrary node be all it is impartial, the data block in system is by whole There is the node of maintenance function to safeguard in a system jointly.System be it is open, the private information in addition to Trading parties is added Close outer, the data of block chain disclose owner, anyone can pass through disclosed interface polls block chain data and exploitation Related application, therefore whole system information highly transparent.Block chain uses (such as a set of based on consensus specification and agreement Open and clear algorithm) enable all nodes in whole system going the free safe exchange data of the environment trusted, So that being changed to the trust to machine to the trust of " people ", any artificial intervention does not work.Once information is by verifying simultaneously Be added to block chain, permanent will store, unless can control simultaneously be more than in system 51% node, it is otherwise single It is invalid to the modification of database on a node, therefore the data stability of block chain and reliability are high.Due to node it Between exchange follow fixed algorithm, without trusting, (rules of order in block chain can voluntarily judge to live for data interaction It is dynamic whether effective), therefore counterparty need not allow other side to generate trust to oneself by way of public identity, tire out to credit Product is very helpful.
Block chain as future generation computer system, the practical problem urgently handled in practical application there are also it is many not It is proposed specific solution.
Summary of the invention
The invention proposes a kind of method for opening and closing intelligent door lock by block chain, the lock core controllers of the intelligent door lock One computing system of communication connection, further include: by computing system processor generate fetcher code and with the fetcher code phase Associated private key, the fetcher code are used to obtain the access to the intelligent door lock;Processor to access code hashed with Obtain hash access code;Processor hashes access code using public key encryption to create digital signature, wherein hash access code sum number Word signature is stored in block chain on block;Processor response in the access intelligent door lock from intelligent mobile terminal request and authenticate Intelligent mobile terminal;Private key and digital signature is sent to by processor the intelligent mobile terminal of certification;Authentication intelligent is mobile eventually Digital signature is decrypted using private key to obtain hash access code in end, and hash access code is sent to computing system;In response to from Intelligent mobile terminal receives hash access code, and processor controls intelligent door lock and unlocked or locked.The intelligence Mobile terminal can be smart phone, IPAD, laptop, wearable intelligently equipment etc. of user.
Further, wherein being coupled to one or more input mechanisms of the computing system in the pre- of the intelligent door lock Define the presence of the detection intelligent mobile terminal in the degree of approach, wherein enter in response to the intelligent mobile terminal and send The private key.
Further, the intelligent door lock can access in finite time, and work as the finite time past tense, described Private key is no longer valid to obtain the access to intelligent door lock and generate new fetcher code.
It further, further include generating the intelligent mobile terminal on the block chain to obtain to the intelligent door lock The affairs of access, and the block chain prevents the computing system from sending more than one private key.
Specific embodiment
In order to enable the objectives, technical solutions, and advantages of the present invention are more clearly understood, below in conjunction with embodiment, to this Invention is further elaborated;It should be appreciated that described herein, the specific embodiments are only for explaining the present invention, and does not have to It is of the invention in limiting.To those skilled in the art, after access is described in detail below, other systems of the present embodiment System, method and/or feature will become obvious.All such additional systems, method, feature and advantage are intended to be included in It in this specification, is included within the scope of the invention, and by the protection of the appended claims.In description described in detail below The other feature of the disclosed embodiments, and these characteristic roots will be apparent according to described in detail below.
Embodiment one.
The present embodiment explains a kind of method for opening and closing intelligent door lock by block chain, the lock core controller of the intelligent door lock One computing system of communication connection, which comprises by computing system processor generate fetcher code and with the access generation The associated private key of code, the fetcher code are used to obtain the access to the intelligent door lock;Processor carries out access code scattered Column are to obtain hash access code;Processor hashes access code to create digital signature, wherein hashing access code using public key encryption Block chain on block is stored in digital signature;Processor response in from intelligent mobile terminal access intelligent door lock request and Authentication intelligent mobile terminal;Private key and digital signature is sent to by processor the intelligent mobile terminal of certification;Authentication intelligent moves Dynamic terminal decrypts digital signature using private key to obtain hash access code, and hash access code is sent to computing system;Response In receiving hash access code from intelligent mobile terminal, processor controls intelligent door lock and is unlocked or locked.
Further, wherein being coupled to one or more input mechanisms of the computing system in the pre- of the intelligent door lock Define the presence of the detection intelligent mobile terminal in the degree of approach, wherein enter in response to the intelligent mobile terminal and send The private key.
Further, the intelligent door lock can access in finite time, and work as the finite time past tense, described Private key is no longer valid to obtain the access to intelligent door lock and generate new fetcher code.
It further, further include generating the intelligent mobile terminal on the block chain to obtain to the intelligent door lock The affairs of access, and the block chain prevents the computing system from sending more than one private key.
Embodiment two.
For design of the invention is explained further, it is explained further here based on the computer system, computer system packet It includes: processor;At least one is coupled to the input mechanism of the processor;It is coupled to the memory devices of the processor;With It is coupled to the computer readable storage devices of processor, wherein storage equipment includes program code, which can be by handling Device is executed via memory devices to realize the method for controlling the access to intelligent door lock, this method comprises: being by calculating The processor of system generates, and fetcher code and private key associated with fetcher code, fetcher code is for obtaining to intelligent door lock Access;By processor hash fetcher code to obtain hash fetcher code;By processor encryption public key hash access code to create Digital signature is built, wherein hash access code and digital signature are stored on the block of block chain;By processor response in from reception Reception device is verified in the request of device.Obtain the access to intelligent door lock;Private key and digital signature is sent to by processor Certified intelligent mobile terminal;Digital signature is decrypted using private key by processor indicating intelligent mobile terminal to visit to obtain hash It asks code, and sends computing system for hash access code;In response to receiving hash access code, processor from intelligent mobile terminal Intelligent door lock, such as intelligent door lock is locked or unlocked.Intelligent door lock can be existing intelligent cipher lock, belong on the market Existing device device no longer just plays structure here and repeats.
Wherein it is coupled to one or more input mechanisms of the computing system in the predefined close of the intelligent door lock The presence of the detection intelligent mobile terminal in degree, wherein send the private key in response to the intelligent mobile terminal.And institute Stating intelligent door lock can access in finite time, and work as the finite time past tense, and the private key is no longer valid to obtain To intelligent door lock access and generate new fetcher code.Wherein the fetcher code keeps the intelligent mobile terminal It is unknown.It further include the affairs that the access that the intelligent mobile terminal is obtained to the lock space is generated on the block chain, And the block chain prevents the computing system from sending more than one private key.
Embodiment three.
The present embodiment provides a kind of opening and closing intelligent door lock method comprising intelligent door lock is arranged on various portals, then By block chain control express delivery intelligent door lock access, access include: by computing system processor generate fetcher code and with The associated private key of fetcher code, the fetcher code are used to obtain the access to the intelligent door lock;Processor is to visit Ask that code is hashed to obtain hash access code;Processor hashes access code using public key encryption to create digital signature, wherein Hash access code and digital signature are stored in block chain on block;Processor response is in the access intelligent door from intelligent mobile terminal The request of lock and authentication intelligent mobile terminal;Private key and digital signature is sent to by processor the intelligent mobile terminal of certification; Authentication intelligent mobile terminal decrypts digital signature using private key to obtain hash access code, and hash access code is sent to calculating System;In response to receiving hash access code from intelligent mobile terminal, processor intelligent door lock is controlled and unlocked or Locking.
Wherein it is coupled to one or more input mechanisms of the computing system in the predefined close of the intelligent door lock The presence of the detection intelligent mobile terminal in degree, wherein enter in response to the intelligent mobile terminal and send the private key. The intelligent door lock can access in finite time, and work as the finite time past tense, and the private key is no longer valid to obtain It obtains the access to intelligent door lock and generates new fetcher code.
It further include the thing that the access that the intelligent mobile terminal is obtained to the intelligent door lock is generated on the block chain Business, and the block chain prevents the computing system from sending more than one private key.
Example IV.
The method concept of the invention is configured to a kind of computer program product by the present embodiment, including storage computer can The computer-readable hardware storage device of reader code, the computer readable program code include when the meter by computing system The algorithm of the method for controlling the access to lock space is realized when calculation machine processor executes.It include: by computing system It manages device and generates fetcher code and private key associated with fetcher code, fetcher code is used to obtain the access to lock space;By Processor hashes fetcher code to obtain hash access code;By hash access code of the processor encryption with public key to create number Signature, wherein hash access code and digital signature are stored on the block of block chain;By processor auth response in from intelligent sliding The request intelligent mobile terminal of dynamic terminal is to obtain the access to lock space;Private key and digital signature is sent to by processor Authenticating step intelligent mobile terminal;Processor indicating intelligent mobile terminal decrypts digital signature using private key to obtain hash access Code, and hash access code is sent to computing system;In response to receiving hash access code, processor lock from intelligent mobile terminal Determine space.Wherein it is coupled to the predefined degree of approach of one or more input mechanisms in the lock space of the computing system The presence of the interior detection intelligent mobile terminal, wherein in response to the reception, send the private key.It is empty that equipment enters locking Between the predefined degree of approach.The lock space can access in finite time, and work as the finite time past tense, described Private key is no longer valid to obtain the access to lock space and generate new fetcher code.
And the transaction for the access that the intelligent mobile terminal is obtained to the lock space is generated on the block chain. The block chain prevents the computing system from sending more than one private key.
Although describing the present invention by reference to various embodiments above, but it is to be understood that of the invention not departing from In the case where range, many changes and modifications can be carried out.Therefore, be intended to foregoing detailed description be considered as it is illustrative and It is unrestricted, and it is to be understood that following following claims (including all equivalents) is intended to limit spirit and model of the invention It encloses.The above embodiment is interpreted as being merely to illustrate the present invention rather than limit the scope of the invention.It is reading After the content of record of the invention, technical staff can be made various changes or modifications the present invention, these equivalence changes and Modification equally falls into the scope of the claims in the present invention.

Claims (5)

1. the lock core controller communication connection one of a kind of method for opening and closing intelligent door lock by block chain, the intelligent door lock calculates System, which is characterized in that the described method includes: by the computing system processor generate fetcher code and with the access generation The associated private key of code, the fetcher code are used to obtain the access to the intelligent door lock;Processor carries out access code scattered Column are to obtain hash access code;Processor hashes access code to create digital signature, wherein hashing access code using public key encryption Block chain on block is stored in digital signature;Processor response in from intelligent mobile terminal access intelligent door lock request and Authentication intelligent mobile terminal;Private key and digital signature is sent to by processor the intelligent mobile terminal of certification;Authentication intelligent moves Dynamic terminal decrypts digital signature using private key to obtain hash access code, and hash access code is sent to computing system;Response In receiving hash access code from intelligent mobile terminal, processor controls intelligent door lock and is unlocked or locked.
2. the method according to claim 1, wherein the one or more for being wherein coupled to the computing system is defeated Enter the presence that mechanism detects the intelligent mobile terminal in the predefined degree of approach of the intelligent door lock, wherein in response to institute Intelligent mobile terminal is stated to enter and send the private key.
3. method according to claim 2, which is characterized in that the intelligent door lock can access in finite time, and work as The finite time past tense, the private key are no longer valid to obtain the access to intelligent door lock and generate new access generation Code.
4. method as claimed in claim 3, which is characterized in that further include generating the intelligent mobile end on the block chain End obtains the affairs of the access to the intelligent door lock, and the block chain prevents the computing system from sending more than one private Key.
5. method as claimed in claim 4, which is characterized in that the intelligent mobile terminal can be user smart phone, One of IPAD, laptop, wearable intelligence equipment etc..
CN201810762711.0A 2018-07-12 2018-07-12 A method of intelligent door lock is opened and closed by block chain Withdrawn CN109035509A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810762711.0A CN109035509A (en) 2018-07-12 2018-07-12 A method of intelligent door lock is opened and closed by block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810762711.0A CN109035509A (en) 2018-07-12 2018-07-12 A method of intelligent door lock is opened and closed by block chain

Publications (1)

Publication Number Publication Date
CN109035509A true CN109035509A (en) 2018-12-18

Family

ID=64640920

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810762711.0A Withdrawn CN109035509A (en) 2018-07-12 2018-07-12 A method of intelligent door lock is opened and closed by block chain

Country Status (1)

Country Link
CN (1) CN109035509A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110415406A (en) * 2019-07-24 2019-11-05 上海征晨信息科技有限公司 A kind of double nets are mutual to monitor security intelligent door lock system for speech recognition
CN112233282A (en) * 2020-10-14 2021-01-15 重庆创敏科技集团有限责任公司 Block chain type artificial intelligent safety intelligent door lock system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101490687A (en) * 2006-07-07 2009-07-22 桑迪士克股份有限公司 Control system and method using identity objects
CN104851159A (en) * 2014-12-01 2015-08-19 讯美电子科技有限公司 Network-type door access control system
CN105847276A (en) * 2016-04-28 2016-08-10 乐视控股(北京)有限公司 Access control method and device
US20170270721A1 (en) * 2016-03-18 2017-09-21 Dangerous Things LLC. In vivo identity and security application implant and method
CN107978047A (en) * 2017-12-04 2018-05-01 北京深思数盾科技股份有限公司 Use the methods, devices and systems of password unlocking
CN108009878A (en) * 2017-11-24 2018-05-08 深圳市轱辘车联数据技术有限公司 A kind of information processing method and its device
US20180167394A1 (en) * 2016-12-14 2018-06-14 Wal-Mart Stores, Inc. Controlling access to a locked space using cryptographic keys stored on a blockchain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101490687A (en) * 2006-07-07 2009-07-22 桑迪士克股份有限公司 Control system and method using identity objects
CN104851159A (en) * 2014-12-01 2015-08-19 讯美电子科技有限公司 Network-type door access control system
US20170270721A1 (en) * 2016-03-18 2017-09-21 Dangerous Things LLC. In vivo identity and security application implant and method
CN105847276A (en) * 2016-04-28 2016-08-10 乐视控股(北京)有限公司 Access control method and device
US20180167394A1 (en) * 2016-12-14 2018-06-14 Wal-Mart Stores, Inc. Controlling access to a locked space using cryptographic keys stored on a blockchain
CN108009878A (en) * 2017-11-24 2018-05-08 深圳市轱辘车联数据技术有限公司 A kind of information processing method and its device
CN107978047A (en) * 2017-12-04 2018-05-01 北京深思数盾科技股份有限公司 Use the methods, devices and systems of password unlocking

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110415406A (en) * 2019-07-24 2019-11-05 上海征晨信息科技有限公司 A kind of double nets are mutual to monitor security intelligent door lock system for speech recognition
CN112233282A (en) * 2020-10-14 2021-01-15 重庆创敏科技集团有限责任公司 Block chain type artificial intelligent safety intelligent door lock system

Similar Documents

Publication Publication Date Title
Hou et al. A survey on internet of things security from data perspectives
Li et al. Data security and privacy in wireless body area networks
CN103391192B (en) A kind of based on secret protection across security domain access control system and control method thereof
Yang et al. EdgeShare: A blockchain-based edge data-sharing framework for Industrial Internet of Things
Liu et al. The security of blockchain-based medical systems: Research challenges and opportunities
CN110474921B (en) Perception layer data fidelity method for local area Internet of things
Nadiya et al. Blockchain-based secure data storage for door lock system
CN112260275B (en) Non-invasive load decomposition method and system based on blockchain technology
Song Security in Internet of Things
Yang et al. A Hybrid Blockchain-Based Authentication Scheme for Smart Home
CN109035510A (en) A method of controlling the access of express delivery smart lock by block chain
CN109035509A (en) A method of intelligent door lock is opened and closed by block chain
Prada-Delgado et al. A blockchain-based crypto-anchor platform for interoperable product authentication
Makina et al. Survey on security and privacy in Internet of Things‐based eHealth applications: Challenges, architectures, and future directions
CN110189440A (en) A kind of smart lock monitoring equipment and its method based on block chain
Luo et al. Accountable data sharing scheme based on blockchain and SGX
Zou et al. Information Security Transmission Technology in Internet of Things Control System.
KR102388280B1 (en) Server of artificial intelligence personal privacy data security system
Saad et al. Securing Smart City Services in Cyber-Physical Systems using the computation annealed selection process
KR102249758B1 (en) Artificial intelligence personal privacy data security system applying case based reasoning technology and block chain method and server thereof
Abou El Houda et al. Towards a Secure and Scalable Access Control System Using Blockchain
Rababah et al. A novel smart home lightweight authentication protocol using iot applications
Han et al. Offline authentication scheme based on blockchain technology for smart lock
Wang [Retracted] Internet of Things Device Identification Algorithm considering User Privacy
CN108958898A (en) A method of for issuing anonymous orientation affairs to block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20181218

WW01 Invention patent application withdrawn after publication