CN111179476B - Configuration method and control method of intelligent lock, equipment and storage medium - Google Patents

Configuration method and control method of intelligent lock, equipment and storage medium Download PDF

Info

Publication number
CN111179476B
CN111179476B CN202010028967.6A CN202010028967A CN111179476B CN 111179476 B CN111179476 B CN 111179476B CN 202010028967 A CN202010028967 A CN 202010028967A CN 111179476 B CN111179476 B CN 111179476B
Authority
CN
China
Prior art keywords
intelligent lock
unlocking
public key
contract
lock
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010028967.6A
Other languages
Chinese (zh)
Other versions
CN111179476A (en
Inventor
雷磊
王志文
吴思进
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Fuzamei Technology Co Ltd
Original Assignee
Hangzhou Fuzamei Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Fuzamei Technology Co Ltd filed Critical Hangzhou Fuzamei Technology Co Ltd
Priority to CN202010028967.6A priority Critical patent/CN111179476B/en
Publication of CN111179476A publication Critical patent/CN111179476A/en
Application granted granted Critical
Publication of CN111179476B publication Critical patent/CN111179476B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Abstract

The invention provides a configuration method and a control method of an intelligent lock, the intelligent lock, equipment and a storage medium, wherein the method comprises the following steps: generating a first private key and a corresponding first public key; wherein the first private key cannot be derived; storing the corresponding relation between the first public key and the current intelligent lock into an intelligent lock contract on the block chain; and storing the authorization relationship between the current intelligent lock and the second public key of the administrator into an intelligent lock contract, so that the terminal of the administrator generates an authorization transaction comprising a third public key of the first user and the intelligent lock information according to the second private key signature corresponding to the second public key and sends the authorization transaction to the block chain node for execution through the intelligent lock contract, and storing the authorization relationship between the current intelligent lock and the first user into the intelligent lock contract after the identity of the administrator is verified successfully. And the corresponding relation and the authorization relation are used for verifying whether a user requesting to unlock the current intelligent lock is authorized or not. The invention realizes the intelligent lock scheme without additionally arranging computer equipment and realizing decentralization.

Description

Configuration method and control method of intelligent lock, equipment and storage medium
Technical Field
The application relates to the technical field of intelligent equipment, in particular to a configuration method and a control method of an intelligent lock, the intelligent lock, equipment and a storage medium.
Background
The unlocking principle of the current intelligent lock is generally configured to send an unlocking instruction to equipment after verification of a centralized server, and when the centralized server breaks down or network connection between a user and the centralized server is interrupted, unlocking cannot be achieved.
Furthermore, some published patent applications propose some smart lock solutions incorporating blockchains, however the unlocking principles of these solutions are generally of the following two types:
1. configuring computer equipment for controlling the intelligent lock outside the intelligent lock, and controlling the intelligent lock after the computer equipment interacts with the block chain network;
2. similar to the centralized scheme, an unlock instruction is sent to the smart lock after verification by the blockchain.
The first type of scheme has the defects that computer equipment needs to be additionally deployed besides the intelligent lock, which is inconvenient in many scenes;
the second type of scheme has a problem that a principle is wrong, a block chain in a general sense cannot actively send specific information to a single device, only the information is recorded on the block chain, and the device performs local query after self-synchronizing data, or the device performs query to a block chain link point configured with a query interface.
Disclosure of Invention
In view of the above-mentioned drawbacks and deficiencies of the prior art, it would be desirable to provide a method for configuring and controlling a decentralized smart lock, a device, and a storage medium without additional deployment of computer devices.
In a first aspect, the present invention provides a configuration method of an intelligent lock, including:
generating a first private key and a corresponding first public key; wherein the first private key cannot be derived;
storing the corresponding relation between the first public key and the current intelligent lock into an intelligent lock contract on the block chain;
and storing the authorization relationship between the current intelligent lock and the second public key of the administrator into an intelligent lock contract, so that the terminal of the administrator generates an authorization transaction comprising a third public key of the first user and the intelligent lock information according to the second private key signature corresponding to the second public key and sends the authorization transaction to the block chain node for execution through the intelligent lock contract, and storing the authorization relationship between the current intelligent lock and the first user into the intelligent lock contract after the identity of the administrator is verified successfully.
Wherein the smart lock information includes at least one of: the first public key is the equipment information of the current intelligent lock; the corresponding relation and the authorization relation are used for verifying whether a user requesting to unlock the current intelligent lock is authorized.
In a second aspect, the present invention provides a method for controlling an intelligent lock suitable for an intelligent lock, the intelligent lock being configured by the method for configuring an intelligent lock according to the first aspect, the method comprising:
acquiring a two-dimensional code displayed by a first user end to acquire unlocking request information, or receiving the unlocking request information through Bluetooth connection; the unlocking request information is generated through a third private key signature;
generating and sending query transaction through the first private key signature to acquire the authorization relationship of the current intelligent lock recorded in the intelligent lock contract, and verifying the signature of the unlocking request information according to a public key in the acquired authorization relationship:
if the verification fails, generating and outputting prompt information of unlocking failure;
and if the verification is successful, generating an unlocking control instruction and outputting the unlocking control instruction to control the unlocking of the current intelligent lock.
In a third aspect, the present invention provides a method for controlling an intelligent lock applicable to a user side, where the intelligent lock is configured by the method for configuring an intelligent lock provided in the first aspect, and the method includes:
generating unlocking request information through a third private key signature;
generating a two-dimensional code according to the unlocking request information and displaying the two-dimensional code, or sending the unlocking request information through Bluetooth connection so that the first intelligent lock can obtain the unlocking request information, then generate and send inquiry transaction through a first private key signature so as to obtain the authorization relationship of the first intelligent lock recorded in the contract of the intelligent lock, and then verify the signature of the unlocking request information according to a public key in the obtained authorization relationship:
if the verification fails, generating and outputting prompt information of unlocking failure;
and if the verification is successful, generating an unlocking control instruction and outputting the unlocking control instruction to control the first intelligent lock to be opened.
In a fourth aspect, the present invention further provides an intelligent lock, which includes one or more processors and a memory, where the memory contains instructions executable by the one or more processors to cause the one or more processors to execute the configuration method of the intelligent lock provided in the first aspect, and the control method of the intelligent lock provided in the second aspect.
In a fifth aspect, the present invention also provides an apparatus comprising one or more processors and a memory, wherein the memory contains instructions executable by the one or more processors to cause the one or more processors to execute the method for controlling an intelligent lock provided in the third aspect.
In a sixth aspect, the present invention also provides a storage medium storing a computer program that causes a computer to execute the methods provided according to the embodiments of the present invention.
According to the configuration method and the control method of the intelligent lock, the equipment and the storage medium provided by the embodiments of the invention, the secret key which cannot be derived and the corresponding public key are generated in the intelligent lock, and the intelligent lock contract which stores the corresponding relation between the intelligent lock and the public key and the authorization relation between the intelligent lock and the user is configured on the block chain, so that when the user requests to unlock the intelligent lock, the intelligent lock can acquire the data stored in the contract to verify whether the user requesting to unlock is authorized, and therefore, the intelligent lock scheme which does not need to additionally deploy computer equipment and is decentralized is realized;
the configuration method and the control method of the intelligent lock, the equipment and the storage medium provided by some embodiments of the invention further enable the intelligent lock to verify whether the current authorization relationship is valid when verifying the unlocking request by storing the validity period of the authorization relationship in the contract of the intelligent lock, thereby further enriching the application mode of the intelligent lock.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
fig. 1 is a flowchart of a configuration method of an intelligent lock according to an embodiment of the present invention.
Fig. 2 is a flowchart of a control method of an intelligent lock according to an embodiment of the present invention.
Fig. 3 is a schematic view of an unlocking scenario of the smart lock according to an embodiment of the present invention.
FIG. 4 is a flow chart of a preferred embodiment of the method shown in FIG. 2.
Fig. 5 is a flowchart of another control method of an intelligent lock according to an embodiment of the present invention.
FIG. 6 is a flow chart of a preferred embodiment of the method shown in FIG. 5.
Fig. 7 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 1 is a flowchart of a configuration method of an intelligent lock according to an embodiment of the present invention.
As shown in fig. 1, in this embodiment, the present invention provides a configuration method of an intelligent lock, including:
s12: generating a first private key and a corresponding first public key; wherein the first private key cannot be derived;
s14: storing the corresponding relation between the first public key and the current intelligent lock into an intelligent lock contract on the block chain;
s16: and storing the authorization relationship between the current intelligent lock and the second public key of the administrator into an intelligent lock contract, so that the terminal of the administrator generates an authorization transaction comprising a third public key of the first user and the intelligent lock information according to the second private key signature corresponding to the second public key and sends the authorization transaction to the block chain node for execution through the intelligent lock contract, and storing the authorization relationship between the current intelligent lock and the first user into the intelligent lock contract after the identity of the administrator is verified successfully.
Wherein the smart lock information includes at least one of: the first public key is the equipment information of the current intelligent lock; the corresponding relation and the authorization relation are used for verifying whether a user requesting to unlock the current intelligent lock is authorized.
Specifically, the intelligent lock configuration method provided by the embodiment is suitable for unshared equipment, and can be configured for private use scenes such as private door locks and cabinet locks, and can also be configured for commercial scenes such as hotel and hotel door locks.
Taking the initialization configuration of the private door lock as an example:
in the step S12, in step S12,automatic generation of first private key p incapable of being exported inside intelligent lock1And with p1Corresponding, public first public key P1
Wherein the first private key p1And a first public key P1The smart lock can be generated by an encryption sim card chip built in the smart lock, and can also be generated by an encryption processor chip. Preferably, a first private key p is generated1The chip is also provided with hardware protection, and can be self-destroyed to ensure the first private key p when being cracked violently1And is not stolen.
In step S14, the smart lock passes through the first private key p1The signature generation comprises a first public key P1And device information LID of the current smart lock1To tx1, sends tx1 to the blockchain node.
The block chain node receives, broadcasts, packages and executes tx1 through intelligent lock contract, registers the current intelligent lock in the contract, and stores the corresponding relation (LID) between the current intelligent lock and the first public key1-P1)。
Preferably, in order to prevent the counterfeit smart lock from being registered in the smart lock contract as well, the first public key may be stored in the smart lock contract at the time of the factory shipment of the smart lock, so that the smart lock performs signature verification at the time of executing the first registration transaction tx1, thereby preventing the registration transaction sent by the counterfeit smart lock from being successfully executed.
In another embodiment, step S14 may be further configured to output the first public key P to the management device with the registered lock authority when the smart lock is shipped from the factory1And device information LID of the current smart lock1For the management equipment to produce P1And LID1To tx2, sends tx2 to the blockchain node. The blockchain node registers the current intelligent lock in the contract and stores the corresponding relation (LID) between the current intelligent lock and the first public key through the intelligent lock contract execution tx21-P1)。
In step S16, the smart lock obtains the second public key P of the current user (administrator)2Then, by the first private key p1Signature generation manager authorizes transaction tx3 and sends to tileAnd (4) linking the nodes.
Block chain nodes receive, broadcast, package, and execute tx3 through smart lock contract, through P1After the signature of tx3 is successfully verified, the current smart Lock (LID) is stored in the contract1) Administrator's public key P2
After the administrator configuration is completed, the current user (administrator) can use the second private key p2And authorizing the family. For example, the user terminal of the current user passes through the second private key p2Signature Generation of a third public Key P comprising family members3And the first public key P of the current intelligent lock1And sends the authorized transaction tx4 to the blockchain node; block chain nodes receive, broadcast, package, and execute tx4 through smart lock contract, through P2After the signature of tx4 is successfully verified, the current smart Lock (LID) is stored in the contract1) Is authorized to the public key P of the user3
When a user requests to unlock the current intelligent lock, the current intelligent lock can inquire the authorization relationship stored in the intelligent lock contract to verify whether the unlocking request is legal or not.
It should be noted that, the smart lock contract may configure the administrator as authorized or unauthorized according to actual requirements, for example, when the smart lock is applied in a private use scenario, the administrator may be configured as authorized (having an unlocking right), and then the administrator does not need to authorize itself any more; when the intelligent lock is applied to commercial scenes such as hotel door locks, an administrator can be configured to be unauthorized (without unlocking permission), and if the administrator needs the unlocking permission, the administrator needs authorization as a common user.
In a preferred embodiment, the authorized transaction further includes a validity period of the authorized relationship, and the smart lock contract is further configured to store the validity period of the authorized relationship.
For example, in any scenario, an administrator may temporarily authorize guests, and for example, in a business scenario, an administrator may authorize customers, clients, etc. for different objects on a short-term basis, depending on business needs.
Fig. 2 is a flowchart of a control method of an intelligent lock according to an embodiment of the present invention.
Fig. 3 is a schematic view of an unlocking scenario of the smart lock according to an embodiment of the present invention. As shown in fig. 2 to 3, in this embodiment, the present invention provides a method for controlling an intelligent lock suitable for an intelligent lock, where the intelligent lock is configured by the method for configuring the intelligent lock shown in fig. 1, and the method includes:
s22: acquiring a two-dimensional code displayed by a first user end to acquire unlocking request information, or receiving the unlocking request information through Bluetooth connection; the unlocking request information is generated through a third private key signature;
s241: generating and sending query transaction through the first private key signature to acquire the authorization relationship of the current intelligent lock recorded in the intelligent lock contract;
s243: verifying the signature of the unlocking request information according to the obtained public key in the authorization relationship:
if the verification fails, step S245 is executed: generating and outputting prompt information of unlocking failure;
if the verification is successful, step S247 is executed: and generating an unlocking control instruction and outputting the unlocking control instruction to control the opening of the current intelligent lock.
Taking the user A as an example, the user B is authorized to unlock the own door lock:
the user terminal 30 of the user B passes the third private key p3And generating unlocking request information by signature, generating a two-dimensional code according to the unlocking request information and displaying the two-dimensional code to the acquisition area of the intelligent lock 10.
In step S22, the smart lock 10 acquires the two-dimensional code to acquire p3Signed unlock request information m.
In step S241, the smart lock 10 uses the first private key p1The signature generates a query transaction tx5 and sends the query transaction tx5 to acquire the authorization relationship of the current smart lock recorded in the smart lock contract;
in step S243, the smart lock 10 verifies the signature of the unlocking request information m according to the public key in the acquired authorization relationship:
if the verification fails, it indicates that the user requesting unlocking is not authorized, and the intelligent lock 10 executes step S245 to generate and output a prompt message of the unlocking failure;
if the verification is successful, it indicates that the user requesting to unlock is authorized, and the smart lock 10 executes step S247, generates an unlocking control command and outputs the command to control the unlocking of the current smart lock.
In the above example, the intelligent lock information includes the first public key, and the intelligent lock 10 acquires the unlocking request information transmitted by the user side 30 by acquiring the two-dimensional code in step S22, the method is exemplarily explained, in further embodiments, the intelligent lock information may be configured to include the device information of the current intelligent lock according to actual requirements, or the first public key and the device information, step S22 may be configured to receive the unlocking request information through bluetooth connection, and the like, which all can achieve the same technical effect.
In the embodiment, the secret key which cannot be derived and the corresponding public key are generated in the intelligent lock, and the intelligent lock contract which stores the corresponding relation between the intelligent lock and the public key and the authorization relation between the intelligent lock and the user is configured on the block chain, so that when the user requests to unlock the intelligent lock, the intelligent lock can acquire the data stored in the contract to verify whether the user requesting to unlock is authorized, and the intelligent lock scheme without additionally deploying computer equipment and without centralization is realized.
FIG. 4 is a flow chart of a preferred embodiment of the method shown in FIG. 2. As shown in fig. 4, in a preferred embodiment, step S247 includes:
s2471: judging whether a first authorization relationship for verifying successful signature of the unlocking request information is activated or not:
if not, returning to the step S245;
if yes, go to step S2473: and generating and outputting an unlocking control command.
Wherein the smart lock contract is further used to execute a payment transaction to freeze the deposit and activate the corresponding authorization relationship.
Specifically, in some commercial scenarios, there is a business requirement that the user who unlocks the smart lock needs to be charged or receive the deposit, so in this embodiment, the authorization relationship is configured to require the user to freeze the deposit in the smart lock contract for activation, and the smart lock is configured with a business logic that verifies whether the authorization relationship is activated, so that the user must pay the deposit to the smart lock contract for unlocking, and the business requirement is satisfied.
Further preferably, the smart lock contract is further used for executing settlement transactions to deduct fees from the deposit and unfreeze the remaining deposits, and deleting the authorization relationship of the current smart lock with the corresponding user. When the charging is not needed, the charging amount is configured to be 0.
Fig. 5 is a flowchart of another control method of an intelligent lock according to an embodiment of the present invention. The method illustrated in fig. 5 may be performed in conjunction with the method illustrated in fig. 2.
As shown in fig. 5, in this embodiment, the present invention further provides a method for controlling an intelligent lock applicable to a user side, where the intelligent lock is configured by the method for configuring an intelligent lock as shown in fig. 1, and the method includes:
s32: generating unlocking request information through a third private key signature;
s34: generating a two-dimensional code according to the unlocking request information and displaying the two-dimensional code, or sending the unlocking request information through Bluetooth connection so that the first intelligent lock can obtain the unlocking request information, then generate and send inquiry transaction through a first private key signature so as to obtain the authorization relationship of the first intelligent lock recorded in the contract of the intelligent lock, and then verify the signature of the unlocking request information according to a public key in the obtained authorization relationship:
if the verification fails, generating and outputting prompt information of unlocking failure;
and if the verification is successful, generating an unlocking control instruction and outputting the unlocking control instruction to control the first intelligent lock to be opened.
The control principle of the method shown in fig. 5 can refer to the method shown in fig. 2, and is not described herein again.
FIG. 6 is a flow chart of a preferred embodiment of the method shown in FIG. 5. The method illustrated in fig. 6 may be performed in conjunction with the method illustrated in fig. 4.
As shown in fig. 6, in a preferred embodiment, step S32 is preceded by:
s31: and generating payment transaction through the third private key signature and sending the payment transaction to the block chain node for execution through intelligent locking to freeze the deposit paid by the current user and activate a first authorization relationship between the current user and the first intelligent lock.
The generating and outputting the unlocking control command to control the unlocking of the first intelligent lock comprises:
judging whether an authorization relation for verifying successful signature of the unlocking request information is activated or not: if not, generating and outputting prompt information of unlocking failure; if yes, an unlocking control command is generated and output.
Preferably, the smart lock contract is further used to execute a settlement transaction to deduct fees from the deposit and unfreeze the remaining deposit, and to delete the authorized relationship of the first smart lock to the current user.
The control principle of the method shown in fig. 6 can refer to the method shown in fig. 4, and is not described herein again.
In a preferred embodiment, the method further comprises:
and generating transfer transaction including a fourth public key through the signature of the third private key, sending the transfer transaction to the block chain node for execution of the intelligent lock contract, and modifying the authorization of the first intelligent lock to the third public key into the authorization of the first intelligent lock to the fourth public key after the security verification.
Specifically, in some commercial scenarios where there is a business need to transfer the unlocking right, the administrator may configure a security policy for transferring the unlocking right in the smart lock contract (e.g., whether to allow the transfer, whether to pay for the transfer, whether to freeze the guarantee fund, etc.). The intelligent locking firstly verifies whether a signature party has unlocking authority or not when transfer transaction is executed, secondly verifies whether the transaction conforms to the security policy, and if the verification is passed, the authorization relation recorded in the contract is modified, and the transfer of the unlocking authority is successful.
In this embodiment, the present invention further provides an intelligent lock, which includes one or more processors and a memory, where the memory contains instructions executable by the one or more processors to enable the one or more processors to execute the configuration method of the intelligent lock shown in fig. 1 and the control method of the intelligent lock shown in fig. 2 or fig. 4.
Fig. 7 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
As shown in fig. 7, as another aspect, the present application also provides an apparatus 700 including one or more Central Processing Units (CPUs) 701 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)702 or a program loaded from a storage section 708 into a Random Access Memory (RAM) 703. In the RAM703, various programs and data necessary for the operation of the apparatus 700 are also stored. The CPU701, the ROM702, and the RAM703 are connected to each other via a bus 704. An input/output (I/O) interface 705 is also connected to bus 704.
The following components are connected to the I/O interface 705: an input portion 706 including a keyboard, a mouse, and the like; an output section 707 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 708 including a hard disk and the like; and a communication section 709 including a network interface card such as a LAN card, a modem, or the like. The communication section 709 performs communication processing via a network such as the internet. A drive 710 is also connected to the I/O interface 705 as needed. A removable medium 711 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 710 as necessary, so that a computer program read out therefrom is mounted into the storage section 708 as necessary.
In particular, the methods illustrated in fig. 5-6 above may be implemented as computer software programs, according to embodiments of the present disclosure. For example, embodiments of the present disclosure include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing the methods illustrated in fig. 5-6 and described above. In such an embodiment, the computer program can be downloaded and installed from a network through the communication section 709, and/or installed from the removable medium 711.
As yet another aspect, the present application also provides a computer-readable storage medium, which may be the computer-readable storage medium included in the apparatus of the above-described embodiment; or it may be a separate computer readable storage medium not incorporated into the device. The computer readable storage medium stores one or more programs for use by one or more processors in performing the methods described in the present application.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present application may be implemented by software or hardware. The described units or modules may also be provided in a processor, for example, each unit may be a software program provided in a computer or a mobile intelligent device, or may be a separately configured hardware device. Wherein the designation of a unit or module does not in some way constitute a limitation of the unit or module itself.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the present application. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (15)

1. A configuration method of an intelligent lock is characterized by comprising the following steps:
generating a first private key and a corresponding first public key; wherein the first private key cannot be derived;
storing the corresponding relation between the first public key and the current intelligent lock into an intelligent lock contract on a block chain;
storing the authorization relationship between the current intelligent lock and a second public key of an administrator into the intelligent lock contract, so that the terminal of the administrator generates an authorization transaction comprising a third public key of a first user and intelligent lock information according to a second private key signature corresponding to the second public key and sends the authorization transaction to a block chain node for execution through the intelligent lock contract, and storing the authorization relationship between the current intelligent lock and the first user into the intelligent lock contract after the identity of the administrator is verified successfully;
wherein the smart lock information includes at least one of: the first public key is the equipment information of the current intelligent lock; and the corresponding relation and the authorization relation are used for verifying whether a user requesting to unlock the current intelligent lock is authorized.
2. The method of claim 1, wherein storing the correspondence between the first public key and the current smart lock in a smart lock contract on a blockchain comprises:
and generating a first registration transaction comprising the first public key and the equipment information of the current intelligent lock through the first private key signature, sending the first registration transaction to a block chain node for execution through the intelligent lock contract, and storing the corresponding relation between the first public key and the current intelligent lock into the intelligent lock contract.
3. The method of claim 1, wherein storing the correspondence between the first public key and the current smart lock in a smart lock contract on a blockchain comprises:
and outputting the first public key and the equipment information of the current intelligent lock so that a management equipment generates a second registration transaction and sends the second registration transaction to a block chain node for execution through the intelligent lock contract, and storing the corresponding relation between the first public key and the current intelligent lock into the intelligent lock contract.
4. The method of any of claims 1-3, wherein the first private key is configured with hardware protection.
5. A method according to any one of claims 1-3, wherein the authorized transaction further comprises a validity period for the authorized relationship, and wherein the smart lock contract is further used to store the validity period for the authorized relationship.
6. A control method of an intelligent lock, wherein the intelligent lock is configured by the configuration method of the intelligent lock according to any one of claims 1 to 5, the control method is applied to the intelligent lock, and the control method comprises:
acquiring a two-dimensional code displayed by a first user end to acquire unlocking request information, or receiving the unlocking request information through Bluetooth connection; the unlocking request information is generated through a third private key signature;
generating and sending query transaction through the first private key signature to acquire the authorization relationship of the current intelligent lock recorded in the intelligent lock contract, and verifying the signature of the unlocking request information according to a public key in the acquired authorization relationship:
if the verification fails, generating and outputting prompt information of unlocking failure;
and if the verification is successful, generating an unlocking control instruction and outputting the unlocking control instruction to control the unlocking of the current intelligent lock.
7. The method of claim 6, wherein the generating and outputting the unlocking control command to control the unlocking of the current smart lock comprises:
judging whether a first authorization relationship for verifying the successful signature of the unlocking request information is activated or not:
if not, generating and outputting prompt information of unlocking failure;
if so, generating an unlocking control instruction and outputting the unlocking control instruction;
wherein the smart lock contract is further used to execute a payment transaction to freeze the deposit and activate the corresponding authorization relationship.
8. The method of claim 7, wherein the smart lock contract is further used to perform a settlement transaction to deduct fees from the deposit and unfreeze the remaining deposit, and to delete the authorization relationship of the current smart lock to the corresponding user.
9. A control method of an intelligent lock, wherein the intelligent lock is configured by the configuration method of the intelligent lock according to any one of claims 1 to 5, the control method is suitable for a user side, and the control method comprises:
generating unlocking request information through a third private key signature;
generating a two-dimensional code according to the unlocking request information and displaying the two-dimensional code, or sending the unlocking request information through Bluetooth connection, so that a first intelligent lock generates and sends inquiry transaction through a first private key signature after acquiring the unlocking request information to acquire an authorization relationship of the first intelligent lock recorded in an intelligent lock contract, and then verifying the signature of the unlocking request information according to a public key in the acquired authorization relationship:
if the verification fails, generating and outputting prompt information of unlocking failure;
and if the verification is successful, generating an unlocking control instruction and outputting the unlocking control instruction to control the first intelligent lock to be opened.
10. The method of claim 9, wherein generating the unlocking request information by the third private key signature further comprises:
generating payment transaction through a third private key signature and sending the payment transaction to a block chain node for execution through the intelligent lock contract to freeze a guarantee fund paid by a current user and activate a first authorization relationship between the current user and the first intelligent lock;
the generating and outputting of the unlocking control instruction to control the opening of the first intelligent lock comprises:
judging whether an authorization relation for verifying the successful signature of the unlocking request information is activated or not: if not, generating and outputting prompt information of unlocking failure; if yes, an unlocking control command is generated and output.
11. The method of claim 10, wherein the smart lock contract is further used to execute a settlement transaction to debit and defraud the remaining deposit from the deposit, and to remove the authorized relationship of the first smart lock to the current user.
12. The method according to any one of claims 9-11, further comprising:
and generating transfer transaction including a fourth public key through a third private key signature, sending the transfer transaction to a block chain node for execution of the intelligent lock contract, and modifying the authorization of the first intelligent lock to the third public key into the authorization of the first intelligent lock to the fourth public key after the security verification.
13. An intelligent lock, comprising:
one or more processors;
a memory for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of configuring a smart lock as recited in any one of claims 1-5, and the method of controlling a smart lock as recited in any one of claims 6-8.
14. A computer device, comprising:
one or more processors;
a memory for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of controlling a smart lock of any of claims 9-12.
15. A storage medium storing a computer program, characterized in that the program, when executed by a processor, implements the method according to any one of claims 1-12.
CN202010028967.6A 2020-01-12 2020-01-12 Configuration method and control method of intelligent lock, equipment and storage medium Active CN111179476B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010028967.6A CN111179476B (en) 2020-01-12 2020-01-12 Configuration method and control method of intelligent lock, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010028967.6A CN111179476B (en) 2020-01-12 2020-01-12 Configuration method and control method of intelligent lock, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111179476A CN111179476A (en) 2020-05-19
CN111179476B true CN111179476B (en) 2021-08-31

Family

ID=70656313

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010028967.6A Active CN111179476B (en) 2020-01-12 2020-01-12 Configuration method and control method of intelligent lock, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111179476B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112689016B (en) * 2020-12-25 2022-06-28 杭州复杂美科技有限公司 Intelligent device control method, device and storage medium
CN113569226B (en) * 2021-09-22 2022-02-15 深圳市金蚁云数字科技有限公司 Parking space management system and method based on block chain
CN113963464A (en) * 2021-10-11 2022-01-21 安徽中科晶格技术有限公司 Bank safe deposit box unlocking system and method based on block chain
CN115035637A (en) * 2022-05-26 2022-09-09 北京溪塔科技有限公司 Lock control method and system based on block chain and electronic lock

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104125226A (en) * 2014-07-28 2014-10-29 北京握奇智能科技有限公司 Locking and unlocking application method, device and system
CN106341817A (en) * 2016-09-05 2017-01-18 努比亚技术有限公司 Access control system, access control method, mobile terminals and access server
CN108648287A (en) * 2018-03-31 2018-10-12 蒋欣言 The implementation method of private savings parking stall leasing system based on block chain
CN109495274A (en) * 2018-12-25 2019-03-19 成都三零瑞通移动通信有限公司 A kind of decentralization smart lock electron key distribution method and system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2016223212A (en) * 2015-06-02 2016-12-28 ソニー株式会社 Lock device, information processing method, program, and communication terminal
CN109325762B (en) * 2018-08-30 2020-07-10 杭州复杂美科技有限公司 Parallel chain cross-chain transaction method, equipment and storage medium
CN109741500B (en) * 2018-12-29 2022-05-10 北京方正数码有限公司 Temporary password setting and verification method for intelligent lock
CN110189440A (en) * 2019-05-17 2019-08-30 杭州宇链科技有限公司 A kind of smart lock monitoring equipment and its method based on block chain
CN110533807A (en) * 2019-08-13 2019-12-03 杭州宇链科技有限公司 A kind of decentralization door-locking system based on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104125226A (en) * 2014-07-28 2014-10-29 北京握奇智能科技有限公司 Locking and unlocking application method, device and system
CN106341817A (en) * 2016-09-05 2017-01-18 努比亚技术有限公司 Access control system, access control method, mobile terminals and access server
CN108648287A (en) * 2018-03-31 2018-10-12 蒋欣言 The implementation method of private savings parking stall leasing system based on block chain
CN109495274A (en) * 2018-12-25 2019-03-19 成都三零瑞通移动通信有限公司 A kind of decentralization smart lock electron key distribution method and system

Also Published As

Publication number Publication date
CN111179476A (en) 2020-05-19

Similar Documents

Publication Publication Date Title
CN111179476B (en) Configuration method and control method of intelligent lock, equipment and storage medium
JP7236992B2 (en) Methods and systems implemented by blockchain
CN109087080B (en) Cross-chain transaction method, device and storage medium
CN111026789B (en) Block chain-based electronic bill query method and device and electronic equipment
CN109064169B (en) Transaction method, apparatus and storage medium
CN112994892B (en) Cross-chain interaction method, device, system and electronic equipment
CN110049048B (en) Data access method, equipment and readable medium for government affair public service
CN102947797A (en) Online service access controls using scale out directory features
CN111163034B (en) Block chain network, electronic lock control method thereof, terminal device and storage medium
US20140237569A1 (en) Data storage system and method for security information interaction
CN109472576A (en) The processing method and processing device of digital asset, storage medium
CN106559389A (en) A kind of Service Source issue, call method, device, system and cloud service platform
US20230412400A1 (en) Method for suspending protection of an object achieved by a protection device
CN115761939A (en) Withdrawal box lock and unlock control method, withdrawal box, system and device
CN109472658B (en) Control system and method for house and guest source electronic lock for renting and selling real estate
CN109801418A (en) User autonomous controllable fining authorization management method and device
CN111028398B (en) Configuration method and control method of intelligent lock, equipment and storage medium
Vogler et al. Distributed transaction processing as a reliability concept for mobile agents
CN114723449B (en) Block chain piece payment method and electronic equipment
CN109472377B (en) Cloud control management system for renting and selling real estate and customer source
CN113918645A (en) Heterogeneous asset transaction system and method based on block chain and computer device
Pandolfi et al. Interoperability Between DLT Following a Gateway-Based Approach: The Case of Ethereum and Hyperledger Fabric
CN110782193A (en) Method, apparatus and computer readable medium for managing object distribution
US20220300923A1 (en) Systems and methods for secondary merchant card delivery
CN110557362A (en) Intelligent locking and managing method and system and intelligent lock

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant