CN110086864A - A method of it is managed offline using lockset dual key - Google Patents

A method of it is managed offline using lockset dual key Download PDF

Info

Publication number
CN110086864A
CN110086864A CN201910329496.XA CN201910329496A CN110086864A CN 110086864 A CN110086864 A CN 110086864A CN 201910329496 A CN201910329496 A CN 201910329496A CN 110086864 A CN110086864 A CN 110086864A
Authority
CN
China
Prior art keywords
lockset
mobile terminal
terminal app
unlocking device
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910329496.XA
Other languages
Chinese (zh)
Other versions
CN110086864B (en
Inventor
吴玲敏
庞振泽
王伟鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Zhongrui Power Technology Co Ltd
Original Assignee
Xiamen Zhongrui Power Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Zhongrui Power Technology Co Ltd filed Critical Xiamen Zhongrui Power Technology Co Ltd
Priority to CN201910329496.XA priority Critical patent/CN110086864B/en
Publication of CN110086864A publication Critical patent/CN110086864A/en
Application granted granted Critical
Publication of CN110086864B publication Critical patent/CN110086864B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present invention relates to a kind of methods managed offline using lockset dual key, it include the registration of lockset, the off-line operation authorization of user, lockset three parts of off-line operation, wherein, the registration of lockset uses RSA asymmetric encryption techniques, it ensure that reliable, the safety of key agreement, meanwhile, the different locksets level-one AES key that server issues in registration is different, the uniqueness that ensure that lockset communication encryption strengthens the reliability of entire lockset communication.The off-line operation of lockset is not connected in mobile terminal APP and server, and user is with the unlock or lock operation carried out under the premise of off-line operation authorization, in the off-line operation of lockset, mobile terminal APP user need to obtain off-line operation authorization from server, and server is the authorization for carrying out permission controlled range to mobile terminal APP user using second level AES key, if in the case where the second level AES key leakage of mobile terminal APP user, the removing that level-one AES key carries out second level AES key can be used in server, to guarantee the safe and reliable of lock system.

Description

A method of it is managed offline using lockset dual key
Technical field
The present invention relates to locksets to manage field, and in particular to a method of it is managed offline using lockset dual key.
Background technique
As people increasingly increase the intelligence of lockset, information-based demand, current lockset is generally intelligent lock. But the encryption method of current lockset is fairly simple, once the key of lockset will be cracked, it is most likely that influence entire lock system Safety.
In view of this, the designer's deep design for the existing problems of current lockset control and defect, in turn Develop the present invention.
Summary of the invention
In view of the above-mentioned problems, the purpose of the present invention is to provide a kind of sides managed offline using lockset dual key Method can improve the safety of lock system.
To achieve the above object, the technical solution adopted by the present invention is that:
A method of it is managed offline using lockset dual key, based on by server, mobile terminal APP, unlocking device and lock The lock system of tool composition realizes that the server and mobile terminal APP are communicated to connect, and mobile terminal APP and unlocking device communicate to connect, And unlocking device is communicatively coupled with lockset, it is characterised in that: the method specifically includes the following steps:
The registration of step 1, lockset
Step 1.1, when unlocking device contacts with lockset communication, lockset judges whether it has registered in the server, if lockset is not It is registered, lockset will generate 128 public and private keys of RSA at random, while corresponding with the lockset to unlocking device transmission lockset ID RSA public key;
After step 1.2, unlocking device receive lockset ID and corresponding RSA public key, judge whether it connects with mobile terminal APP It connects, if the two is not connected, unlocking device registers mistake to lockset response;If the two has been established communication connection, unlocking device is to shifting Moved end APP sends unlocking device ID and received lockset ID and RSA public key;
After step 1.3, mobile terminal APP receive unlocking device ID, lockset ID and RSA public key, its whether online (i.e. judgement movement is judged Whether end APP connect with server communication), if not online, mobile terminal APP registers mistake to lockset response by unlocking device;If Online, mobile terminal APP then sends User ID and its received unlocking device ID, lockset ID and RSA public key to server;
After step 1.4, server receive User ID, unlocking device ID, lockset ID and RSA public key, User ID and unlocking device are judged Whether ID is legal, if User ID or unlocking device ID are illegal, lockset registration failure;If User ID and unlocking device ID are legal, Server then generates 128 level-one AES keys at random, and is added using received RSA public key to level-one AES key It is close, encryption data is formed, then, server sends the encryption data to mobile terminal APP, and via mobile terminal APP and unlock The encryption data is sent to lockset by device;Lockset is decrypted using RSA private key pair encryption data, is obtained and is recorded level-one AES Key completes lockset registration;
Step 2, mobile terminal APP user obtain off-line operation permission
After the completion of lockset is registered in the server, user passes through mobile terminal APP to server application off-line operation permission, or Server actively assigns user's off-line operation permission, then server judges whether User ID, unlocking device ID legal, if User ID and Unlocking device ID is legal, and server then generates 128 second level AES keys at random, then using level-one AES key to second level AES Key and corresponding lockset ID are encrypted, and authorization ciphertext is formed;Server will authorize ciphertext, second level AES key and correspondence Lockset ID be sent to mobile terminal APP, mobile terminal APP receives and stores the authorization ciphertext, second level AES key and corresponding lockset ID completes the off-line operation authorization of user;
The off-line operation of step 3, lockset
Step 3.1 contacts unlocking device with lockset, and lockset judges whether it has registered in the server, if lockset is not servicing It is registered in device, then carries out the registration operation of lockset;If lockset is registered in the server, lockset sends lockset to unlocking device ID;
Step 3.2, unlocking device judge whether it connect with mobile terminal APP after receiving lockset ID, if the two is not connected, unlocking device To lockset response mistake;If the two has connected, unlocking device sends unlocking device ID and lockset ID to mobile terminal APP;
Step 3.3, mobile terminal APP judge whether it is online, if mobile terminal APP does not exist after receiving unlocking device ID and lockset ID Line then enters step 3.4;
Step 3.4, mobile terminal APP judge whether user has off-line operation permission, that is, judge whether the user has comprising awarding Ciphertext, second level AES key and corresponding lockset ID are weighed, when user has authorization ciphertext, then it is offline to be judged as that user has Operating right;Mobile terminal APP further judges whether it to corresponding lockset is transmitted across authorization ciphertext, if nothing, enters step 3.5;If so, then entering step 3.6;
Step 3.5, the unlocked device of mobile terminal APP send authorization ciphertext to lockset, and level-one AES when unlocking device is according to its registration is close Authorization ciphertext is decrypted in key, obtains second level AES key and is simultaneously temporarily stored, then via unlocking device to mobile terminal APP Response success, after mobile terminal APP receives the response of lockset, enters step 3.6;
Step 3.6, mobile terminal APP generate locking operation instruction according to user right, and are grasped using second level AES key to the lockset Make instruction to be encrypted, which is sent to unlocking device by formation operation ciphertext, mobile terminal APP, and unlocking device is then by the behaviour Lockset is sent to as ciphertext;
Step 3.7, lockset are parsed after receiving operation ciphertext using second level AES key, and corresponding locking operation instruction is obtained And the movement responded according to locking operation instruction execution, lockset monitoring operation is as a result, and via unlocking device to mobile terminal APP response Implementing result, mobile terminal APP receive and record relevant operating result, once mobile terminal APP and server are established and are communicated to connect, The operating result is just uploaded to server by mobile terminal APP;
Step 3.8 terminates.
After adopting the above scheme, the present invention includes the registration of lockset, the off-line operation authorization of user, the off-line operation of lockset Three parts, wherein the registration of lockset uses RSA asymmetric encryption techniques, ensure that reliable, the safety of key agreement, meanwhile, The different locksets level-one AES key that server issues in registration is different, ensure that the uniqueness of lockset communication encryption, even if a Other lockset AES key is cracked, and can still guarantee the safety of other locksets in lock system, strengthens entire lockset communication Reliability.
Before the off-line operation of lockset is not connected in mobile terminal APP and server, and user has off-line operation authorization Put the unlock or lock operation of progress;Under off-line operation, the operational order of lockset is close using second level AES in the APP of mobile terminal Key is encrypted, and is then transmitted to lockset from by unlocking device, executes unlock or lock operation after lockset decryption.In lockset Off-line operation in, mobile terminal APP user need to obtain off-line operation authorization from server, and server is using second level AES Key pair mobile terminal APP user carries out the authorization of permission controlled range, if what the second level AES key of mobile terminal APP user leaked In the case of, the removing that level-one AES key carries out second level AES key can be used in server, to guarantee that the safety of lock system can It leans on.
Detailed description of the invention
Fig. 1 is system flow chart of the invention;
Fig. 2 is lockset register flow path figure of the invention;
Fig. 3 is that level-one AES key when lockset of the present invention is registered negotiates functional block diagram;
Fig. 4 is the flow chart that mobile terminal APP user of the present invention obtains offline authorization operation;
Fig. 5 is the functional block diagram of mobile terminal APP user of the present invention authorization;
Fig. 6 is that second level AES key when mobile terminal APP user of the present invention authorizes negotiates flow chart;
Fig. 7 is lockset off-line operation flow chart of the invention;
Fig. 8 is the functional block diagram of the second level AES key coded communication of lockset off-line operation of the present invention.
Specific embodiment
As shown in Figures 1 to 7, present invention discloses a kind of method managed offline using lockset dual key, the party Method is realized based on the lock system being made of server, mobile terminal APP, unlocking device and lockset, wherein server and mobile terminal APP communication connection, mobile terminal APP and unlocking device communicate to connect, and unlocking device is communicatively coupled with lockset.The present invention manages offline The method of control is specific as follows:
The registration of step 1, lockset
Step 1.1, when unlocking device contacts with lockset communication, lockset judges whether it has registered in the server, if lockset is not It is registered, lockset will generate 128 public and private keys of RSA at random, while corresponding with the lockset to unlocking device transmission lockset ID RSA public key, wherein unique random lockset identification code lockset ID built-in when being produced for lockset.
After step 1.2, unlocking device receive lockset ID and corresponding RSA public key, judge its with mobile terminal APP whether Connection, if the two is not connected, unlocking device registers mistake to lockset response;If the two has been established communication connection, unlocking device to Mobile terminal APP sends unlocking device ID and received lockset ID and RSA public key.
After step 1.3, mobile terminal APP receive unlocking device ID, lockset ID and RSA public key, judge whether it (judges online Whether mobile terminal APP connect with server communication), if not online, mobile terminal APP is registered by unlocking device to lockset response wrong Accidentally;If online, mobile terminal APP sends User ID and its received unlocking device ID, lockset ID and RSA public key to server.
After step 1.4, server receive User ID, unlocking device ID, lockset ID and RSA public key, judge that User ID is conciliate Whether legal lock device ID, if User ID or unlocking device ID are illegal, lockset registration failure;If User ID and unlocking device ID are closed Method, server then generate 128 AES keys (level-one AES key) at random, and using received RSA public key to level-one AES Key is encrypted, and encryption data is formed, and then, server sends the encryption data to mobile terminal APP, and via mobile terminal The encryption data is sent to lockset by APP and unlocking device;Lockset is decrypted using RSA private key pair encryption data, is obtained and is remembered Level-one AES key is recorded, lockset registration is completed.
At this point, establishing a common AES key between lockset and server, the negotiation of key, lockset and clothes are completed AES key progress can be used in subsequent communications between business device.
Lockset uses RSA asymmetric encryption techniques when server end is registered, and ensure that reliable, the peace of key agreement Entirely.Meanwhile the AES key of different locksets is different, even if there is the case where individual lockset AES keys are cracked, can still protect Demonstrate,prove the safety of entire lock system.
Step 2, mobile terminal APP user obtain off-line operation permission
After the completion of lockset is registered in the server, user passes through mobile terminal APP to server application off-line operation permission, or Server actively assigns user's off-line operation permission, then server judges whether User ID, unlocking device ID legal, if User ID and Unlocking device ID is legal, and server then generates 128 temporary Authorization codes (i.e. second level AES key) at random, then uses level-one AES Key pair second level AES key and corresponding lockset ID are encrypted, and authorization ciphertext is formed;Server will authorize ciphertext, second level AES key and corresponding lockset ID are sent to mobile terminal APP, and it is close that mobile terminal APP receives and stores the authorization ciphertext, second level AES Key and corresponding lockset ID, that is, complete the off-line operation authorization of user.
The off-line operation of step 3, lockset
Step 3.1 contacts unlocking device with lockset, and lockset judges whether it has registered in the server, if lockset is not servicing It is registered in device, then carries out the registration operation of lockset;If lockset is registered in the server, lockset sends lockset to unlocking device ID。
Step 3.2, unlocking device judge whether it connect with mobile terminal APP after receiving lockset ID, if the two is not connected, solve Device is locked to lockset response mistake;If the two has connected, unlocking device sends unlocking device ID and lockset ID to mobile terminal APP.
Step 3.3, mobile terminal APP after receiving unlocking device ID and lockset ID, judge whether it online (i.e. whether with clothes Business device establishes communication connection), if mobile terminal APP is not online, enter step 3.4;
Step 3.4, mobile terminal APP judge whether user has off-line operation permission, that is, judge whether the user has comprising awarding Ciphertext, second level AES key and corresponding lockset ID are weighed, when user has authorization ciphertext, then it is offline to be judged as that user has Operating right;Mobile terminal APP further judges whether it to corresponding lockset is transmitted across authorization ciphertext, if nothing, enters step 3.5;If so, then entering step 3.6;
Step 3.5, the unlocked device of mobile terminal APP send authorization ciphertext to lockset, and level-one AES when unlocking device is according to its registration is close Authorization ciphertext is decrypted in key, obtains second level AES key and is simultaneously temporarily stored, then via unlocking device to mobile terminal APP Response success, after mobile terminal APP receives the response of lockset, enters step 3.6;
Step 3.6, mobile terminal APP generate locking operation instruction according to user right, and are grasped using second level AES key to the lockset Make instruction to be encrypted, which is sent to unlocking device by formation operation ciphertext, mobile terminal APP, and unlocking device is then by the behaviour Lockset is sent to as ciphertext.
Step 3.7, lockset are parsed after receiving operation ciphertext using second level AES key, and corresponding locking operation is obtained It instructs and (unlocks or be latched) according to the movement of locking operation instruction execution response, lockset monitoring operation is as a result, and via unlock Device receives and records relevant operating result to mobile terminal APP response implementing result, mobile terminal APP, once mobile terminal APP and clothes Business device establishes communication connection, which is just uploaded to server by mobile terminal APP.
Step 3.8 terminates.
It is of the invention it is critical that the present invention includes the registration of lockset, the off-line operation authorization of user, the operation three of lockset A part.Wherein, the registration of lockset uses RSA asymmetric encryption techniques, ensure that reliable, the safety of key agreement, meanwhile, no It is different with the lockset level-one AES key that server issues in registration, it ensure that the uniqueness of lockset communication encryption, even if individually Lockset AES key is cracked, and can still guarantee the safety of other locksets in lock system, and strengthen the communication of entire lockset can By property.Under the premise of the off-line operation of lockset is not connected in mobile terminal APP and server, and user has off-line operation authorization To unlock or lock operation that lockset carries out, under off-line operation, the operational order of lockset utilizes second level AES in the APP of mobile terminal Key is encrypted, and is then transmitted to lockset from by unlocking device, executes unlock or lock operation after lockset decryption.It is locking In the off-line operation of tool, mobile terminal APP user need to obtain off-line operation authorization from server, and server is using second level AES key carries out the authorization of permission controlled range to mobile terminal APP user, if the second level AES key of mobile terminal APP user leaks In the case where, server can be used level-one AES key and carry out the clear of second level AES key, to guarantee the safety of lock system Reliably.
The above is only the embodiment of the present invention, is not intended to limit the scope of the present invention, therefore all Any subtle modifications, equivalent variations and modifications to the above embodiments according to the technical essence of the invention still fall within this In the range of inventive technique scheme.

Claims (1)

1. a kind of method managed offline using lockset dual key, based on by server, mobile terminal APP, unlocking device and The lock system of lockset composition realizes that the server and mobile terminal APP are communicated to connect, mobile terminal APP and unlocking device communication link Connect, and unlocking device is communicatively coupled with lockset, it is characterised in that: the method specifically includes the following steps:
The registration of step 1, lockset
Step 1.1, when unlocking device contacts with lockset communication, lockset judges whether it has registered in the server, if lockset is not It is registered, lockset will generate 128 public and private keys of RSA at random, while corresponding with the lockset to unlocking device transmission lockset ID RSA public key;
After step 1.2, unlocking device receive lockset ID and corresponding RSA public key, judge whether it connects with mobile terminal APP It connects, if the two is not connected, unlocking device registers mistake to lockset response;If the two has been established communication connection, unlocking device is to shifting Moved end APP sends unlocking device ID and received lockset ID and RSA public key;
After step 1.3, mobile terminal APP receive unlocking device ID, lockset ID and RSA public key, its whether online (i.e. judgement movement is judged Whether end APP connect with server communication), if not online, mobile terminal APP registers mistake to lockset response by unlocking device;If Online, mobile terminal APP then sends User ID and its received unlocking device ID, lockset ID and RSA public key to server;
After step 1.4, server receive User ID, unlocking device ID, lockset ID and RSA public key, User ID and unlocking device are judged Whether ID is legal, if User ID or unlocking device ID are illegal, lockset registration failure;If User ID and unlocking device ID are legal, Server then generates 128 level-one AES keys at random, and is added using received RSA public key to level-one AES key It is close, encryption data is formed, then, server sends the encryption data to mobile terminal APP, and via mobile terminal APP and unlock The encryption data is sent to lockset by device;Lockset is decrypted using RSA private key pair encryption data, is obtained and is recorded level-one AES Key completes lockset registration;
Step 2, mobile terminal APP user obtain off-line operation permission
After the completion of lockset is registered in the server, user passes through mobile terminal APP to server application off-line operation permission, or Server actively assigns user's off-line operation permission, then server judges whether User ID, unlocking device ID legal, if User ID and Unlocking device ID is legal, and server then generates 128 second level AES keys at random, then using level-one AES key to second level AES Key and corresponding lockset ID are encrypted, and authorization ciphertext is formed;Server will authorize ciphertext, second level AES key and correspondence Lockset ID be sent to mobile terminal APP, mobile terminal APP receives and stores the authorization ciphertext, second level AES key and corresponding lockset ID completes the off-line operation authorization of user;
The off-line operation of step 3, lockset
Step 3.1 contacts unlocking device with lockset, and lockset judges whether it has registered in the server, if lockset is not servicing It is registered in device, then carries out the registration operation of lockset;If lockset is registered in the server, lockset sends lockset to unlocking device ID;
Step 3.2, unlocking device judge whether it connect with mobile terminal APP after receiving lockset ID, if the two is not connected, unlocking device To lockset response mistake;If the two has connected, unlocking device sends unlocking device ID and lockset ID to mobile terminal APP;
Step 3.3, mobile terminal APP judge whether it is online, if mobile terminal APP does not exist after receiving unlocking device ID and lockset ID Line then enters step 3.4;
Step 3.4, mobile terminal APP judge whether user has off-line operation permission, that is, judge whether the user has comprising awarding Ciphertext, second level AES key and corresponding lockset ID are weighed, when user has authorization ciphertext, then it is offline to be judged as that user has Operating right;Mobile terminal APP further judges whether it to corresponding lockset is transmitted across authorization ciphertext, if nothing, enters step 3.5;If so, then entering step 3.6;
Step 3.5, the unlocked device of mobile terminal APP send authorization ciphertext to lockset, and level-one AES when unlocking device is according to its registration is close Authorization ciphertext is decrypted in key, obtains second level AES key and is simultaneously temporarily stored, then via unlocking device to mobile terminal APP Response success, after mobile terminal APP receives the response of lockset, enters step 3.6;
Step 3.6, mobile terminal APP generate locking operation instruction according to user right, and are grasped using second level AES key to the lockset Make instruction to be encrypted, which is sent to unlocking device by formation operation ciphertext, mobile terminal APP, and unlocking device is then by the behaviour Lockset is sent to as ciphertext;
Step 3.7, lockset are parsed after receiving operation ciphertext using second level AES key, and corresponding locking operation instruction is obtained And the movement responded according to locking operation instruction execution, lockset monitoring operation is as a result, and via unlocking device to mobile terminal APP response Implementing result, mobile terminal APP receive and record relevant operating result, once mobile terminal APP and server are established and are communicated to connect, The operating result is just uploaded to server by mobile terminal APP;
Step 3.8 terminates.
CN201910329496.XA 2019-04-23 2019-04-23 Method for offline management and control by using double keys of lock Active CN110086864B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910329496.XA CN110086864B (en) 2019-04-23 2019-04-23 Method for offline management and control by using double keys of lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910329496.XA CN110086864B (en) 2019-04-23 2019-04-23 Method for offline management and control by using double keys of lock

Publications (2)

Publication Number Publication Date
CN110086864A true CN110086864A (en) 2019-08-02
CN110086864B CN110086864B (en) 2021-10-08

Family

ID=67416247

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910329496.XA Active CN110086864B (en) 2019-04-23 2019-04-23 Method for offline management and control by using double keys of lock

Country Status (1)

Country Link
CN (1) CN110086864B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110992524A (en) * 2019-10-29 2020-04-10 广东纬德信息科技有限公司 Intelligent lock control method and system based on USB
CN112565213A (en) * 2020-11-25 2021-03-26 青岛海尔科技有限公司 Authentication method and device, storage medium, and electronic device
CN113345130A (en) * 2020-02-18 2021-09-03 佛山市云米电器科技有限公司 Control method of intelligent door, intelligent door and computer readable storage medium
CN114826620A (en) * 2022-05-16 2022-07-29 深圳指芯物联技术有限公司 Method and system for safely binding intelligent door lock and intelligent door lock

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101793115A (en) * 2009-12-20 2010-08-04 姜君凯 Electronic lock and key and workflow control
CN203271358U (en) * 2013-04-09 2013-11-06 杨晓飞 Remote-authorization intelligent unlocking device
US20150040205A1 (en) * 2013-03-14 2015-02-05 Brivo Systems, Inc. System and Method for Physical Access Control
CN105321236A (en) * 2014-07-30 2016-02-10 许加庆 Bluetooth bidirectional communication intelligent lock
KR101648000B1 (en) * 2015-11-16 2016-08-12 (주)영신인포텍 Management system for document file in cabinet using smart panel
CN105931330A (en) * 2016-04-19 2016-09-07 北京奇虎科技有限公司 Intelligent unlocking method and intelligent lock
EP3096296A2 (en) * 2015-05-18 2016-11-23 Samsung Electronics Co., Ltd. Binding device with embedded smart key and method for controlling object using the same
CN109523665A (en) * 2018-11-02 2019-03-26 上海蓝芝麻智能科技有限公司 The intelligent door lock key hair fastener platform realized based on blue-tooth technology

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101793115A (en) * 2009-12-20 2010-08-04 姜君凯 Electronic lock and key and workflow control
US20150040205A1 (en) * 2013-03-14 2015-02-05 Brivo Systems, Inc. System and Method for Physical Access Control
CN203271358U (en) * 2013-04-09 2013-11-06 杨晓飞 Remote-authorization intelligent unlocking device
CN105321236A (en) * 2014-07-30 2016-02-10 许加庆 Bluetooth bidirectional communication intelligent lock
EP3096296A2 (en) * 2015-05-18 2016-11-23 Samsung Electronics Co., Ltd. Binding device with embedded smart key and method for controlling object using the same
KR101648000B1 (en) * 2015-11-16 2016-08-12 (주)영신인포텍 Management system for document file in cabinet using smart panel
CN105931330A (en) * 2016-04-19 2016-09-07 北京奇虎科技有限公司 Intelligent unlocking method and intelligent lock
CN109523665A (en) * 2018-11-02 2019-03-26 上海蓝芝麻智能科技有限公司 The intelligent door lock key hair fastener platform realized based on blue-tooth technology

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110992524A (en) * 2019-10-29 2020-04-10 广东纬德信息科技有限公司 Intelligent lock control method and system based on USB
CN113345130A (en) * 2020-02-18 2021-09-03 佛山市云米电器科技有限公司 Control method of intelligent door, intelligent door and computer readable storage medium
CN112565213A (en) * 2020-11-25 2021-03-26 青岛海尔科技有限公司 Authentication method and device, storage medium, and electronic device
CN114826620A (en) * 2022-05-16 2022-07-29 深圳指芯物联技术有限公司 Method and system for safely binding intelligent door lock and intelligent door lock
CN114826620B (en) * 2022-05-16 2024-02-06 深圳指芯物联技术有限公司 Safe method and system for binding intelligent door lock and intelligent door lock

Also Published As

Publication number Publication date
CN110086864B (en) 2021-10-08

Similar Documents

Publication Publication Date Title
CN110086864A (en) A method of it is managed offline using lockset dual key
CN104125226B (en) A kind of method, apparatus and system for locking and unlocking application
CN103227776B (en) Configuration method, configuration device, computer program product and control system
CN103748831B (en) Safety certification device and method in machine-to-machine communication between the device based on PUF
CN108055235A (en) A kind of control method of smart lock, relevant device and system
CN105871874A (en) Mobile Internet virtual key authorizing system and hardware door lock control method thereof
CN105279832A (en) Intelligent door lock system and control method thereof
US20080303630A1 (en) DigiKey and DigiLock
CN104680630A (en) Method and system for controlling door locks
CN108989318A (en) A kind of lightweight safety certification and key exchange method towards narrowband Internet of Things
CN105069864A (en) Door lock control secure communication scheme based on NFC (near field communication) function of smart phone
CN208335313U (en) The controllable permission blue-tooth intelligence door lock of cell phone application
CN104583028B (en) One-way key fob and vehicle pairing
CN103973437B (en) The method, apparatus and system of RSA key mandate are obtained when a kind of terminal locking
CN109840975A (en) Remote authorization unlocking system and method without networking
CN102903167A (en) Management system for renting and selling houses
CN107180464A (en) A kind of smart lock method for unlocking and the system using this method
CN104123768A (en) Safety intelligent lock system and unlocking and locking control method
CN105303651A (en) Bluetooth based two-way communication automatic locking system and method
CN104123769B (en) The unblanking of a kind of safety intelligent lock, close lock control method
CN107154847A (en) Towards the method for generating cipher code, verification method and its smart machine of offline environment
CN104052817A (en) Intelligent door and intelligent door control method and system
CN108961501A (en) A kind of intelligent door lock control method, relevant device and system
CN106789024A (en) A kind of remote de-locking method, device and system
CN109035515A (en) The control method and door-locking system of smart lock

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant