CN111340982A - Remote unlocking method and system - Google Patents

Remote unlocking method and system Download PDF

Info

Publication number
CN111340982A
CN111340982A CN202010104097.6A CN202010104097A CN111340982A CN 111340982 A CN111340982 A CN 111340982A CN 202010104097 A CN202010104097 A CN 202010104097A CN 111340982 A CN111340982 A CN 111340982A
Authority
CN
China
Prior art keywords
random password
electronic lock
unlocking
password
random
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010104097.6A
Other languages
Chinese (zh)
Inventor
刘龙威
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Tuya Information Technology Co Ltd
Original Assignee
Hangzhou Tuya Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Tuya Information Technology Co Ltd filed Critical Hangzhou Tuya Information Technology Co Ltd
Priority to CN202010104097.6A priority Critical patent/CN111340982A/en
Publication of CN111340982A publication Critical patent/CN111340982A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00412Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted

Abstract

The application discloses a remote unlocking method, which comprises the following steps: the control end sends an unlocking request to the electronic lock; the electronic lock generates a random password; the electronic lock encrypts the random password and sends the random password to the control end; the control end sends the encrypted random password to a server end; the server side decrypts the encrypted random password; the server side sends the random password after unlocking designation and decryption to the electronic lock; and when the decrypted random password passes the verification, the electronic lock executes the unlocking action. Compared with the prior art, the method has the following beneficial effects: the panel inputs the password as a basic factor of cloud verification, and the password for unlocking is guaranteed to be mastered in the hands of the user. By transformation, the original factor random input by the user is protected. Information encryption is accomplished through the inside key of the hardware of lock, passes through for APP, guarantees that APP can't accomplish the deciphering, takes sensitive information.

Description

Remote unlocking method and system
Technical Field
The application relates to the field of smart homes, in particular to a remote unlocking method.
Background
The door lock has a special requirement, namely under the scene that the safety requirement is not very high, a user does not need to input a password to open the door, and under the scene, the user can open and close the door simply without repeatedly inputting the password.
The main practice of the industry at present is that a simple control instruction directly issues a door opening instruction, and a door lock directly executes a door opening process after receiving the door opening instruction. This scheme is not conform to safe design principle, simultaneously, if the process of high in the clouds issue the instruction, if produce the security problem, probably lead to very big security risk. The high-safety scene of the door lock, namely the password of the door lock, is required to be mastered in the hand of a user.
Disclosure of Invention
The main purpose of the present application is to provide a remote unlocking method, which includes:
the control end sends an unlocking request to the electronic lock;
the electronic lock generates a random password;
the electronic lock encrypts the random password and sends the random password to the control end;
the control end sends the encrypted random password to a server end;
the server side decrypts the encrypted random password;
the server side sends the random password after unlocking designation and decryption to the electronic lock;
and when the decrypted random password passes the verification, the electronic lock executes the unlocking action.
Optionally, the encrypting the random password and sending the random password to the control end by the electronic lock includes:
the electronic lock transforms the random password into a first random password according to a preset rule;
the electronic lock encrypts the first random password through a preset secret key to obtain a second random password;
and the control end sends the second random password to the control end.
Optionally, the decrypting, by the server side, the encrypted random password, and sending the unlocking specification and the decrypted random password to the electronic lock includes:
the server decrypts the second random password through a preset secret key, and restores the second random password into a first random password;
and the server sends the unlocking instruction and the first random password to the electronic lock.
Optionally, the preset rule is a hash transformation.
Optionally, the preset key is stored in the electronic lock.
Optionally, the control end is a mobile phone app.
According to another aspect of the present application, there is also provided a remote unlocking system, including:
the unlocking request sending module is used for sending an unlocking request to the electronic lock by the control terminal;
the random password generating module is used for generating a random password by the electronic lock;
the encryption module is used for encrypting the random password by the electronic lock and sending the random password to the control end;
the first sending module is used for sending the encrypted random password to the server side by the control side;
the decryption module is used for decrypting the encrypted random password by the server side;
the second sending module is used for sending the random password subjected to unlocking designation and decryption to the electronic lock by the server;
and the execution module is used for executing unlocking action by the electronic lock when the decrypted random password passes the verification.
The application also discloses a computer device, which comprises a memory, a processor and a computer program stored in the memory and capable of being executed by the processor, wherein the processor realizes the method of any one of the above items when executing the computer program.
The application also discloses a computer-readable storage medium, a non-volatile readable storage medium, having stored therein a computer program which, when executed by a processor, implements the method of any of the above.
The present application also discloses a computer program product comprising computer readable code which, when executed by a computer device, causes the computer device to perform the method of any of the above.
Compared with the prior art, the method has the following beneficial effects:
the panel inputs the password as a basic factor of cloud verification, and the password for unlocking is guaranteed to be mastered in the hands of the user.
By transformation, the original factor random input by the user is protected.
Information encryption is accomplished through the inside key of the hardware of lock, passes through for APP, guarantees that APP can't accomplish the deciphering, takes sensitive information.
Cloud unlocking requires information to be changed as a certificate for opening the door.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, serve to provide a further understanding of the application and to enable other features, objects, and advantages of the application to be more apparent. The drawings and their description illustrate the embodiments of the invention and do not limit it. In the drawings:
FIG. 1 is a schematic flow chart diagram of a remote unlocking method according to an embodiment of the present application;
FIG. 2 is a schematic flow chart diagram of a remote unlocking method according to an embodiment of the present application;
FIG. 3 is a flow chart of a remote unlocking method according to an embodiment of the present application;
FIG. 4 is a schematic flow chart diagram of a remote unlocking method according to one embodiment of the present application;
FIG. 5 is a flow chart of a remote unlocking method according to an embodiment of the present application;
FIG. 6 is a schematic diagram of a computer device according to one embodiment of the present application; and
FIG. 7 is a schematic diagram of a computer-readable storage medium according to one embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Referring to fig. 1-2, an embodiment of the present application provides a remote unlocking method, including:
s1: the control end sends an unlocking request to the electronic lock;
s2: the electronic lock generates a random password;
s3: the electronic lock encrypts the random password and sends the random password to the control end;
s4: the control end sends the encrypted random password to a server end;
s5: the server side decrypts the encrypted random password;
s6: the server side sends the random password after unlocking designation and decryption to the electronic lock;
s7: and when the decrypted random password passes the verification, the electronic lock executes the unlocking action.
For example, the control end opens the remote door opening security function and informs the door lock. Door lock panel pop-up requires the entry of a six-digit random code, pwd 1. The door lock encrypts pwd1 to produce pwd3, which then transmits the encrypted information pwd3 to the APP. The APP cannot decrypt the information and directly transmits pwd3 to the cloud. The cloud decrypts pwd3 through the key of the corresponding device, and takes the password pwd1 of the user without password verification. When the cloud receives the APP remote door opening instruction, the cloud takes the pwd1 as the unlocking check value when issuing the door opening instruction. When the door lock receives pwd2, the value is checked and the door opening action is performed without any problem.
Referring to fig. 3, in an embodiment of the present application, the encrypting the random password and sending the random password to the control end by the electronic lock includes:
s31: the electronic lock transforms the random password into a first random password according to a preset rule;
s32: the electronic lock encrypts the first random password through a preset secret key to obtain a second random password;
s33: and the control end sends the second random password to the control end.
For example, the control end opens the remote door opening security function and informs the door lock. Door lock panel pop-up requires the entry of a six-digit random code, pwd 1. The door lock firstly transforms the pwd1, obtains the pwd2 after transformation, and then encrypts the key written in the chip of the lock (normally, the internet of things device writes a pair of id and key in production to be used as device authentication) or the key generated by the chip information (the information is in the cloud) through the algorithm. The encrypted information pwd3 is then transmitted to the APP. The APP cannot decrypt the information and directly transmits pwd3 to the cloud. The cloud decrypts pwd3 through the key of the corresponding device, and takes the password pwd2 of the user without password verification. When the cloud receives the APP remote door opening instruction, the cloud takes the pwd2 as the unlocking check value when issuing the door opening instruction. When the door lock receives pwd2, the value is checked and the door opening action is performed without any problem.
Referring to fig. 4, in an embodiment of the present application, the decrypting, by the server, the encrypted random password and sending the random password to the electronic lock includes:
s51: the server decrypts the second random password through a preset secret key, and restores the second random password into a first random password;
s52: and the server sends the unlocking instruction and the first random password to the electronic lock.
Referring to fig. 5, in an embodiment of the present application, a time validity period t is added, the cloud and the door lock simultaneously store the validity period t, and each time the lock is unlocked, whether the time is within the validity period is checked.
In an embodiment of the present application, the preset rule is hash transformation.
For example, the control end opens the remote door opening security function and informs the door lock. Door lock panel pop-up requires the entry of a six-digit random code, pwd 1. The door lock firstly carries out hash transformation on the pwd1 into the pwd2, and then the key written in is generated in a chip of the lock (normally, a pair of id and key is written in the internet of things device during production to be used for device authentication), or the key generated by an algorithm is encrypted through chip information (the information is in the cloud). The encrypted information pwd3 is then transmitted to the APP. The APP cannot decrypt the information and directly transmits pwd3 to the cloud. The cloud decrypts pwd3 through the key of the corresponding device, and takes the password pwd2 of the user without password verification. When the cloud receives the APP remote door opening instruction, the cloud takes the pwd2 as the unlocking check value when issuing the door opening instruction. When the door lock receives pwd2, the value is checked and the door opening action is performed without any problem.
In an embodiment of the application, the predetermined key is stored in the electronic lock.
The control terminal is a mobile phone app.
For example, the APP opens the remote door opening secret-free function and informs the door lock. Door lock panel pop-up requires the entry of a six-digit random code, pwd 1. The door lock firstly carries out hash transformation on the pwd1 into the pwd2, and then the key written in is generated in a chip of the lock (normally, a pair of id and key is written in the internet of things device during production to be used for device authentication), or the key generated by an algorithm is encrypted through chip information (the information is in the cloud). The encrypted information pwd3 is then transmitted to the APP. The APP cannot decrypt the information and directly transmits pwd3 to the cloud. The cloud decrypts pwd3 through the key of the corresponding device, and takes the password pwd2 of the user without password verification. When the cloud receives the APP remote door opening instruction, the cloud takes the pwd2 as the unlocking check value when issuing the door opening instruction. When the door lock receives pwd2, the value is checked and the door opening action is performed without any problem.
An embodiment of the present application further provides a remote unlocking system, including:
the unlocking request sending module is used for sending an unlocking request to the electronic lock by the control terminal;
the random password generating module is used for generating a random password by the electronic lock;
the encryption module is used for encrypting the random password by the electronic lock and sending the random password to the control end;
the first sending module is used for sending the encrypted random password to the server side by the control side;
the decryption module is used for decrypting the encrypted random password by the server side;
the second sending module is used for sending the random password subjected to unlocking designation and decryption to the electronic lock by the server;
and the execution module is used for executing unlocking action by the electronic lock when the decrypted random password passes the verification.
Compared with the prior art, the method has the following beneficial effects:
the panel inputs the password as a basic factor of cloud verification, and the password for unlocking is guaranteed to be mastered in the hands of the user.
By transformation, the original factor random input by the user is protected.
Information encryption is accomplished through the inside key of the hardware of lock, passes through for APP, guarantees that APP can't accomplish the deciphering, takes sensitive information.
Cloud unlocking requires information to be changed as a certificate for opening the door.
The time validity period is increased, so that the function can be ensured to have time limitation, and users and the door lock can be better protected.
Referring to fig. 6, the present application further provides a computer device including a memory, a processor, and a computer program stored in the memory and executable by the processor, wherein the processor implements the method of any one of the above methods when executing the computer program.
Referring to fig. 7, a computer-readable storage medium, a non-volatile readable storage medium, having stored therein a computer program which, when executed by a processor, implements any of the methods described above.
A computer program product comprising computer readable code which, when executed by a computer device, causes the computer device to perform the method of any of the above.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and they may alternatively be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, or fabricated separately as individual integrated circuit modules, or fabricated as a single integrated circuit module from multiple modules or steps. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (10)

1. A remote unlocking method is characterized by comprising the following steps:
the control end sends an unlocking request to the electronic lock;
the electronic lock generates a random password;
the electronic lock encrypts the random password and sends the random password to the control end;
the control end sends the encrypted random password to a server end;
the server side decrypts the encrypted random password;
the server side sends the random password after unlocking designation and decryption to the electronic lock;
and when the decrypted random password passes the verification, the electronic lock executes the unlocking action.
2. The remote unlocking method of claim 1, wherein the electronic lock encrypting the random password and sending the random password to the control terminal comprises:
the electronic lock transforms the random password into a first random password according to a preset rule;
the electronic lock encrypts the first random password through a preset secret key to obtain a second random password;
and the control end sends the second random password to the control end.
3. The remote unlocking method according to claim 2, wherein the server decrypting the encrypted random password and sending an unlocking specification and the decrypted random password to the electronic lock comprises:
the server decrypts the second random password through a preset secret key, and restores the second random password into a first random password;
and the server sends the unlocking instruction and the first random password to the electronic lock.
4. The remote unlocking method according to claim 3, wherein the preset rule is a hash transformation.
5. The remote unlocking method according to claim 4, wherein the preset key is stored in the electronic lock.
6. The remote unlocking method according to claim 5, wherein the control terminal is a mobile phone app.
7. A remote unlocking system, comprising:
the unlocking request sending module is used for sending an unlocking request to the electronic lock by the control terminal;
the random password generating module is used for generating a random password by the electronic lock;
the encryption module is used for encrypting the random password by the electronic lock and sending the random password to the control end;
the first sending module is used for sending the encrypted random password to the server side by the control side;
the decryption module is used for decrypting the encrypted random password by the server side;
the second sending module is used for sending the random password subjected to unlocking designation and decryption to the electronic lock by the server;
and the execution module is used for executing unlocking action by the electronic lock when the decrypted random password passes the verification.
8. A computer device comprising a memory, a processor and a computer program stored in the memory and executable by the processor, wherein the processor implements the method of any one of claims 1-6 when executing the computer program.
9. A computer-readable storage medium, a non-transitory readable storage medium, having stored therein a computer program, characterized in that the computer program, when executed by a processor, implements the method according to any one of claims 1-6.
10. A computer program product comprising computer readable code that, when executed by a computer device, causes the computer device to perform the method of any of claims 1-6.
CN202010104097.6A 2020-02-20 2020-02-20 Remote unlocking method and system Pending CN111340982A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010104097.6A CN111340982A (en) 2020-02-20 2020-02-20 Remote unlocking method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010104097.6A CN111340982A (en) 2020-02-20 2020-02-20 Remote unlocking method and system

Publications (1)

Publication Number Publication Date
CN111340982A true CN111340982A (en) 2020-06-26

Family

ID=71185361

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010104097.6A Pending CN111340982A (en) 2020-02-20 2020-02-20 Remote unlocking method and system

Country Status (1)

Country Link
CN (1) CN111340982A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104052817A (en) * 2014-06-27 2014-09-17 青岛歌尔声学科技有限公司 Intelligent door and intelligent door control method and system
CN106335572A (en) * 2016-08-31 2017-01-18 武汉大学 Low-power-consumption Bluetooth intelligent bicycle lock and public bicycle system adopting bicycle lock under Internet of things technology based on time-space safety
CN107301703A (en) * 2017-06-23 2017-10-27 钱本宁 Dynamic puzzle-lock system and unlocking method
CN107393061A (en) * 2017-06-16 2017-11-24 汪钰涵 Coded lock and communication system with communication capacity
CN107590885A (en) * 2017-09-04 2018-01-16 深圳市谷咔互联科技有限公司 A kind of shared bicycle electronic lock unlocking method and system
CN109255864A (en) * 2018-08-02 2019-01-22 深圳市朗仁科技有限公司 Shared bicycle bluetooth method for unlocking and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104052817A (en) * 2014-06-27 2014-09-17 青岛歌尔声学科技有限公司 Intelligent door and intelligent door control method and system
CN106335572A (en) * 2016-08-31 2017-01-18 武汉大学 Low-power-consumption Bluetooth intelligent bicycle lock and public bicycle system adopting bicycle lock under Internet of things technology based on time-space safety
CN107393061A (en) * 2017-06-16 2017-11-24 汪钰涵 Coded lock and communication system with communication capacity
CN107301703A (en) * 2017-06-23 2017-10-27 钱本宁 Dynamic puzzle-lock system and unlocking method
CN107590885A (en) * 2017-09-04 2018-01-16 深圳市谷咔互联科技有限公司 A kind of shared bicycle electronic lock unlocking method and system
CN109255864A (en) * 2018-08-02 2019-01-22 深圳市朗仁科技有限公司 Shared bicycle bluetooth method for unlocking and device

Similar Documents

Publication Publication Date Title
US20180144114A1 (en) Securing Blockchain Transactions Against Cyberattacks
CN101765996B (en) Device and method for remote authentication and transaction signatures
CN111034120B (en) Encryption key management based on identity information
US9443068B2 (en) System and method for preventing unauthorized access to information
EP2251810B1 (en) Authentication information generation system, authentication information generation method, and authentication information generation program utilizing a client device and said method
CN103929307A (en) Password input method, intelligent secret key device and client device
CN109412812A (en) Data safe processing system, method, apparatus and storage medium
EP2758922A2 (en) Securing transactions against cyberattacks
KR102234825B1 (en) Secure execution of cryptographic operations
JP2019525691A (en) Permission granting method and system for acquiring terminal attack warning message log
CN103378971A (en) Data encryption system and method
CN108768941B (en) Method and device for remotely unlocking safety equipment
EP3292654B1 (en) A security approach for storing credentials for offline use and copy-protected vault content in devices
US10764260B2 (en) Distributed processing of a product on the basis of centrally encrypted stored data
US20230327855A1 (en) System and method for protecting secret data items using multiple tiers of encryption and secure element
CN106330877B (en) It is a kind of to authorize the method and system converted to the SOT state of termination
US20200092096A1 (en) Method for secure management of secrets in a hierarchical multi-tenant environment
CN111340982A (en) Remote unlocking method and system
WO2018040881A1 (en) Method and system for authorizing to clear attack alarm for terminal
CN106972928A (en) A kind of fort machine private key management method, apparatus and system
CN112291058A (en) Communication method of management system and management system
CN106357624B (en) A kind of security setting terminal system time method and system
CN107682147B (en) Security management method and system for smart card chip operating system file
CZ2015474A3 (en) The method of communication authentication of the authentication device and at least one authentication server using a local factor
JPH09106445A (en) Key changing method for information recording medium and information recording medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200626

RJ01 Rejection of invention patent application after publication