CN111080847A - Encryption, decryption and authentication method for intelligent door lock in offline environment - Google Patents
Encryption, decryption and authentication method for intelligent door lock in offline environment Download PDFInfo
- Publication number
- CN111080847A CN111080847A CN201911165939.2A CN201911165939A CN111080847A CN 111080847 A CN111080847 A CN 111080847A CN 201911165939 A CN201911165939 A CN 201911165939A CN 111080847 A CN111080847 A CN 111080847A
- Authority
- CN
- China
- Prior art keywords
- password
- door lock
- intelligent door
- information
- authority
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 32
- 238000013510 password aging Methods 0.000 claims abstract description 21
- 238000004806 packaging method and process Methods 0.000 claims abstract description 4
- 230000001360 synchronised effect Effects 0.000 claims description 4
- 238000012795 verification Methods 0.000 claims description 4
- 238000000926 separation method Methods 0.000 claims description 3
- 230000032683 aging Effects 0.000 claims description 2
- 230000005540 biological transmission Effects 0.000 abstract 1
- 238000004140 cleaning Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
- G07C9/00904—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for hotels, motels, office buildings or the like
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00412—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention discloses an encryption, decryption and authentication method under an intelligent door lock offline environment, which ensures the security of ciphertext data in transmission by mixing intelligent door lock information, password aging information and password authority information and performing data packaging and algorithm encryption.
Description
Technical Field
The invention relates to the field of security protection of intelligent door locks, in particular to an encryption, decryption and authentication method for an intelligent door lock in an offline environment.
Background
At present, various intelligent door locks with internet access functions appear in the rapid development of unmanned hotels, and the intelligent door locks can be unlocked remotely only by a user through mobile phone application software or a PC (personal computer) terminal. In the prior art, most of intelligent door locks implement identity authentication in the following ways: the password generated remotely by the server is sent to the intelligent door lock through the network on one hand, and on the other hand, the password is simultaneously sent to the mobile phone or the PC end of the user. The intelligent door lock can realize the unlocking operation through identifying the password and passing the authentication. However, in the actual use process, the situation that the intelligent door lock is not connected to the network easily occurs, and once the intelligent device is not connected to the network, the authentication needs to be carried out through the offline password. The existing offline password is usually preset in the intelligent door lock device, and can be authenticated through the preset offline password when the device is not connected to a network, but the offline password can be used all the time in the validity period, so that the password is easily leaked when the device is used for a long time after being disconnected from the network, and the personal and property safety of a user is endangered. Particularly, when the password lock is applied to an unmanned hotel, a user can replace the password during a network break period without losing the password, and the user who has returned can open the door through the password, so that the password lock is extremely unsafe.
Disclosure of Invention
The invention aims to solve the problem that an offline password cannot be forbidden in a valid period in the prior art, and provides an encryption, decryption and authentication method of an intelligent door lock in an offline environment.
In order to achieve the above purpose, the invention provides the following technical scheme:
an encryption, decryption and authentication method for an intelligent door lock in an offline environment is used for generating a password (offline password) used by the intelligent door lock in a hotel system in the offline environment, and a randomly generated key and corresponding intelligent door lock information are synchronized into a system server when the intelligent door lock is connected with the system server last time;
when the intelligent door lock cannot be connected with the system server, namely the intelligent door lock is in an off-line state, firstly, the system server generates a password by using the encryption method and sends the password to a client or other users; then, the customer or the user inputs the password into the intelligent door lock, the intelligent door lock receives the password and decrypts the password by using the decryption method, and then the decrypted information is used for authentication through the authentication method, so that the intelligent door lock can also be unlocked through the password in an off-line state; wherein,
the encryption method comprises the following steps: and mixing the intelligent door lock information, the password aging information and the password authority information, then packaging the data, and carrying out algorithm encryption on the packaged data by combining a key to generate a password.
The decryption method comprises the following steps: after receiving the password, the intelligent door lock decrypts the password through the key, performs data unpacking and data separation on the password, and separates out intelligent door lock information, password aging information and password authority information.
The authentication method of the intelligent door lock comprises the following steps: the intelligent door lock firstly checks the intelligent door lock information, then checks the password aging information after the intelligent door lock information passes the password aging information, identifies the password authority information after the password authority information passes the password aging information, and if the authority of the password is higher than the authority of the password input last time, the authentication is passed and the password with low authority is forbidden.
Preferably, the password aging time information is used for setting the usage aging of the password.
Preferably, the intelligent door lock information is used for setting the intelligent door lock corresponding to the password.
Preferably, the password authority information is used for setting the authority of the password, and a plurality of passwords generated by the system server have different or the same authority.
Preferably, after the intelligent door lock firstly passes the verification of the intelligent door lock information and the verification of the password aging information, the password authority information is identified, and when the password with the same authority is input, the intelligent door lock passes the authentication; when the password with lower authority is input, the authentication of the intelligent door lock is not passed.
Compared with the prior art, the invention has the beneficial effects that:
in addition, by setting the authority of the offline password, after the intelligent door lock information and the password aging information are checked, the offline password with low authority can be forbidden to operate through the offline password with higher authority, the management of the offline password is enhanced, the condition that the offline password of a returned user is continuously used in an effective period is avoided, and the safety of the intelligent door lock is greatly improved.
Description of the drawings:
fig. 1 is a schematic flow chart of the encryption method of the present invention.
Fig. 2 is a schematic flow chart of the decryption method of the present invention.
Fig. 3 is a schematic view illustrating a flow of an authentication method of the intelligent door lock according to the present invention.
Detailed Description
The present invention will be described in further detail with reference to test examples and specific embodiments. It should be understood that the scope of the above-described subject matter is not limited to the following examples, and any techniques implemented based on the disclosure of the present invention are within the scope of the present invention.
An encryption, decryption and authentication method for an intelligent door lock in an offline environment is used for generating a password (offline password) used by the intelligent door lock in a hotel system in the offline environment, and a randomly generated key and corresponding intelligent door lock information are synchronized into a system server when the intelligent door lock is connected with the system server last time.
As shown in fig. 1, the encryption method specifically includes: and mixing the intelligent door lock information, the password aging information and the password authority information, then packaging the data, and carrying out algorithm encryption on the packaged data by combining a key to generate an offline password (the offline password is generated only when a user requests the offline password every time). The password time information is used for setting the use time of the offline password, the intelligent door lock information is used for setting the intelligent door lock corresponding to the offline password, the password authority information is used for setting the authority of the offline password, and the generated offline passwords have different or same authority.
As shown in fig. 2, the decryption method specifically includes: after the intelligent door lock receives the password, the off-line password is decrypted through the key, data unpacking and data separation are carried out on the off-line password, and intelligent door lock information, password aging information and password authority information are separated.
As shown in fig. 3, the authentication method of the intelligent door lock includes the following specific steps:
firstly, the intelligent door lock checks the intelligent door lock information, if the intelligent door lock information of the offline password is not matched with the intelligent door lock, the authentication fails, and if the intelligent door lock information of the offline password is matched with the intelligent door lock, the second step is carried out;
secondly, checking the password aging information, if the password aging does not exceed the service life, the authentication fails, and if the password aging does not exceed the service life, the third step is carried out;
thirdly, identifying password authority information, when an offline password with higher authority is input, the intelligent door lock passes authentication, and the offline password with lower authority is forbidden; when the offline password with the same authority is input, the intelligent door lock passes authentication; when the offline password with lower authority is input, the authentication of the intelligent door lock is failed, and the authentication is failed.
Example 1
And when the intelligent door lock is connected with the hotel server last time, the randomly generated key and the corresponding intelligent door lock information are synchronized into the system server.
When the intelligent door lock is in an offline state, the hotel system cannot be connected to the intelligent door lock, at the moment, a first user reserves a room corresponding to the intelligent door lock, and the hotel server sends a first offline password of the intelligent door lock to the first user. The first offline password received by the first user comprises time efficiency information, intelligent door lock information and authority information, and can only be used for authentication of the intelligent door lock in a time efficiency period.
After the first user returns from the hotel server, the hotel server allocates the room to the second user and sends a second offline password with higher authority of the intelligent door lock to the second user. And after the second user uses the second password to pass the authentication of the intelligent door lock, the first offline password is forbidden.
Example 2
After the first user transacts the check-out at the hotel server, the hotel server informs the cleaning staff to clean the room and sends a third offline password with the same authority of the intelligent door lock to the cleaning staff. After the cleaner is cleaned, the hotel server assigns the room to a second user and a second offline password with higher authority for the intelligent door lock. At this time, the first offline password and the third offline password are both low-authority and are disabled at the same time.
Claims (5)
1. An encryption, decryption and authentication method for an intelligent door lock in an offline environment is used for generating a password used by the intelligent door lock in a hotel system in the offline environment, and is characterized in that when the intelligent door lock is connected with a system server last time, a randomly generated key and corresponding intelligent door lock information are synchronized into the system server; when the intelligent door lock cannot be connected with the system server, the system server generates a password by using the encryption method, the intelligent door lock receives the password and decrypts the password by using the decryption method, and the decrypted information is used for authentication through the authentication method; wherein,
the encryption method comprises the following steps: and mixing the intelligent door lock information, the password aging information and the password authority information, then packaging the data, and carrying out algorithm encryption on the packaged data by combining a key to generate a password.
The decryption method comprises the following steps: after receiving the password, the intelligent door lock decrypts the password through the key, performs data unpacking and data separation on the password, and separates out intelligent door lock information, password aging information and password authority information.
The authentication method comprises the following steps: the intelligent door lock firstly checks the intelligent door lock information, then checks the password aging information after the intelligent door lock information passes the password aging information, identifies the password authority information after the password authority information passes the password aging information, and if the authority of the password is higher than the authority of the password input last time, the authentication is passed and the password with low authority is forbidden.
2. The encryption, decryption and authentication method for the intelligent door lock in the offline environment according to claim 1, wherein password aging time information is used for setting the usage aging of the password.
3. The encryption, decryption and authentication method for the intelligent door lock in the offline environment according to claim 1, wherein the intelligent door lock information is used for setting the intelligent door lock corresponding to the password.
4. The encryption, decryption and authentication method for the offline environment of the intelligent door lock as recited in claim 1, wherein the password authority information is used for setting the authority of the password, and a plurality of passwords generated by the system server have different or the same authority.
5. The encryption, decryption and authentication method of the intelligent door lock in the offline environment according to claim 1, wherein the intelligent door lock firstly identifies the password authority information after the verification of the intelligent door lock information and the verification of the password aging information pass, and the intelligent door lock passes the authentication when the password with the same authority is input; when the password with lower authority is input, the authentication of the intelligent door lock is not passed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911165939.2A CN111080847A (en) | 2019-11-25 | 2019-11-25 | Encryption, decryption and authentication method for intelligent door lock in offline environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911165939.2A CN111080847A (en) | 2019-11-25 | 2019-11-25 | Encryption, decryption and authentication method for intelligent door lock in offline environment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111080847A true CN111080847A (en) | 2020-04-28 |
Family
ID=70311544
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911165939.2A Pending CN111080847A (en) | 2019-11-25 | 2019-11-25 | Encryption, decryption and authentication method for intelligent door lock in offline environment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111080847A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112767576A (en) * | 2020-12-16 | 2021-05-07 | 珠海优特物联科技有限公司 | Lock authorization management method and lock authorization management system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101483708A (en) * | 2008-01-09 | 2009-07-15 | 富士施乐株式会社 | Right information managing device, information processing system, information processing method, and information processing program |
CN205541037U (en) * | 2016-04-12 | 2016-08-31 | 沈阳圣达金卡科技有限公司 | Multi -functional touch entrance guard's all -in -one |
CN107798757A (en) * | 2017-10-26 | 2018-03-13 | 厦门分享云科技有限公司 | A kind of method for unlocking of intelligent door lock |
CN107958513A (en) * | 2017-12-05 | 2018-04-24 | 广东亚太天能科技股份有限公司 | A kind of offline authorization method and system of electronic lock |
CN109272617A (en) * | 2018-08-31 | 2019-01-25 | 北京三快在线科技有限公司 | Unlocking verification method, server, door lock, electronic equipment and storage medium |
US20190172285A1 (en) * | 2017-08-14 | 2019-06-06 | Q & K International Group Limited | Application Method of Bluetooth Low-energy Electronic Lock Based on Built-in Offline Pairing Passwords, Interactive Unlocking Method of a Bluetooth Electronic Lock and Electronic Lock System |
-
2019
- 2019-11-25 CN CN201911165939.2A patent/CN111080847A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101483708A (en) * | 2008-01-09 | 2009-07-15 | 富士施乐株式会社 | Right information managing device, information processing system, information processing method, and information processing program |
CN205541037U (en) * | 2016-04-12 | 2016-08-31 | 沈阳圣达金卡科技有限公司 | Multi -functional touch entrance guard's all -in -one |
US20190172285A1 (en) * | 2017-08-14 | 2019-06-06 | Q & K International Group Limited | Application Method of Bluetooth Low-energy Electronic Lock Based on Built-in Offline Pairing Passwords, Interactive Unlocking Method of a Bluetooth Electronic Lock and Electronic Lock System |
CN107798757A (en) * | 2017-10-26 | 2018-03-13 | 厦门分享云科技有限公司 | A kind of method for unlocking of intelligent door lock |
CN107958513A (en) * | 2017-12-05 | 2018-04-24 | 广东亚太天能科技股份有限公司 | A kind of offline authorization method and system of electronic lock |
CN109272617A (en) * | 2018-08-31 | 2019-01-25 | 北京三快在线科技有限公司 | Unlocking verification method, server, door lock, electronic equipment and storage medium |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112767576A (en) * | 2020-12-16 | 2021-05-07 | 珠海优特物联科技有限公司 | Lock authorization management method and lock authorization management system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104735065B (en) | A kind of data processing method, electronic equipment and server | |
CN105103119B (en) | Data security service system | |
CN105743638B (en) | Method based on B/S architecture system client authorization certifications | |
US9053313B2 (en) | Method and system for providing continued access to authentication and encryption services | |
EP1833222A1 (en) | Access control protocol for embedded devices | |
CN105162764A (en) | Dual authentication method, system and device for SSH safe login | |
CN105656862B (en) | Authentication method and device | |
CN105721159A (en) | Operation system identity authentication method and operation system identity authentication system | |
CN109831463B (en) | Intelligent terminal safety protection system for login verification of operating system | |
CN102307099A (en) | Authentication method and system as well as authentication server | |
CN106034123A (en) | Authentication method, application system server and client | |
CN106357679B (en) | Method, system and the client of cipher authentication, server and smart machine | |
JP2018529299A (en) | Biometric protocol standard system and method | |
CN104852913A (en) | Dynamic password electronic coded lock | |
CN110290150A (en) | A kind of login validation method and login authentication device of Virtual Private Network VPN | |
CN103780609A (en) | Cloud data processing method and device and cloud data security gateway | |
EP4211864A2 (en) | Systems and methods for non-deterministic multi-party, multi-user sender-receiver authentication and non-repudiatable resilient authorized access to secret data | |
CN107368737A (en) | A kind of processing method for preventing copy-attack, server and client | |
CN102457491A (en) | dynamic identity authentication method and system | |
CN109285256A (en) | Computer room based on block chain authentication enter permission give method | |
KR20230018417A (en) | Secure remote access to industrial control systems using hardware-based authentication | |
US9602284B1 (en) | Secure offline authentication | |
Gulsezim et al. | Two factor authentication using twofish encryption and visual cryptography algorithms for secure data communication | |
CN105187417B (en) | Authority acquiring method and apparatus | |
CN111080847A (en) | Encryption, decryption and authentication method for intelligent door lock in offline environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200428 |
|
RJ01 | Rejection of invention patent application after publication |