CN111612945A - Method for generating dynamic password by intelligent lock and intelligent lock system - Google Patents

Method for generating dynamic password by intelligent lock and intelligent lock system Download PDF

Info

Publication number
CN111612945A
CN111612945A CN202010371883.2A CN202010371883A CN111612945A CN 111612945 A CN111612945 A CN 111612945A CN 202010371883 A CN202010371883 A CN 202010371883A CN 111612945 A CN111612945 A CN 111612945A
Authority
CN
China
Prior art keywords
dynamic password
intelligent lock
control unit
generating
root
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010371883.2A
Other languages
Chinese (zh)
Inventor
王水平
白冲
王冠林
詹显光
潘仁国
詹成
潘一嘉
王禾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Zhongbang Digital Technology Co ltd
Original Assignee
Zhejiang Zhongbang Digital Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Zhongbang Digital Technology Co ltd filed Critical Zhejiang Zhongbang Digital Technology Co ltd
Priority to CN202010371883.2A priority Critical patent/CN111612945A/en
Publication of CN111612945A publication Critical patent/CN111612945A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/0042Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed
    • G07C2009/00476Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically

Abstract

The invention discloses a method for generating a dynamic password by an intelligent lock and an intelligent lock system, wherein the method comprises the following steps: storing the same key with the intelligent lock at the control end; synchronizing the control end and the intelligent lock time; the control end and the intelligent lock end respectively adopt the same algorithm to calculate a root dynamic password according to the secret key and the time; and calculating the root dynamic password to obtain the dynamic password with N bits. The control end and the intelligent lock end adopt the same time record, the same secret key and the same algorithm to generate the same dynamic password, the dynamic password generated by the control end is input into the intelligent lock within the effective time, the intelligent lock end compares the received dynamic password with the own dynamic password, and whether the intelligent lock is unlocked is controlled according to the comparison result; the consistency of the intelligent lock and the control end is realized, and the safety of the intelligent lock is improved. The intelligent lock system increases the function of unlocking by dynamic passwords and realizes the diversification of unlocking modes.

Description

Method for generating dynamic password by intelligent lock and intelligent lock system
Technical Field
The invention relates to the technical field of intelligent locks, in particular to a method for generating a dynamic password by an intelligent lock and an intelligent lock system.
Background
The intelligence lock is unblanked and is sent out the instruction of unblanking through the master control unit, driving motor drive unit, the rotation of control motor realizes unblanking, the intelligence lock is usually unblanked control through the input password, just can open the intelligence lock when the input password is correct, and the password only can possess owner, others can not know the password, need get into the door when interim personnel, and owner is not in the same place as before again, under the condition that owner agrees interim personnel and get into, just need an interim password to solve interim personnel's entering problem, how guarantee the temporality and the confidentiality of interim password, be the problem that waits to solve at present urgently.
Disclosure of Invention
The invention aims to provide a method for generating a dynamic password by an intelligent lock and an intelligent lock system. The temporary unlocking function of the intelligent lock is realized, and the safety control of the intelligent lock is ensured.
The above object of the present invention is achieved by the following technical solutions:
a method for generating dynamic password of intelligent lock includes generating the same dynamic password at control end and intelligent lock end, inputting dynamic password generated by control end into intelligent lock, comparing received dynamic password with own dynamic password by intelligent lock end and controlling whether intelligent lock is opened or not according to comparison result.
The invention is further configured to: the method comprises the following steps:
s1, storing the same key by the control end and the intelligent lock;
s2, synchronizing the control end and the intelligent lock time;
s3, calculating a root dynamic password at the control end and the intelligent lock end respectively by adopting the same algorithm according to the secret key and the time;
and S4, calculating the root dynamic password to obtain the dynamic password with N bits.
The invention is further configured to: in step S1, when the control end and the smart lock end are initially bound, the control end generates a key and sends the key to the smart lock end.
The invention is further configured to: in step S3, the method includes the steps of:
a1, calculating a timestamp from a certain time to the current time;
a2, obtaining a movement factor according to the timestamp and the refreshing time interval;
a3, rounding the time stamp, and converting the integer time stamp into a character string form;
and A4, obtaining the root dynamic password by adopting an anti-repetition algorithm according to the key and the timestamp.
The invention is further configured to: step a4 includes the following steps:
b1, updating the key to obtain a first dynamic password;
b2, updating the first dynamic password according to the movement factor to obtain a second dynamic password;
and B3, intercepting the second dynamic password to obtain a root dynamic password.
The invention is further configured to: the second dynamic password comprises 256 bytes and the root dynamic password comprises 32 bytes.
The invention is further configured to: in step S4, the method includes the steps of:
c1, intercepting M1 bits from the root dynamic password to obtain a first byte number;
c2, intercepting M2 bytes in the root dynamic password by the numerical value of the first byte number to obtain a second byte number;
and C3, performing modulus operation on the numerical value of the second byte number to obtain the final dynamic password with N bits.
The invention is further configured to: the final dynamic password is valid for the refresh interval.
The invention is further configured to: in step C2, M2 bytes are truncated in the upper direction starting from the kth byte in the root dynamic password by the value K of the first byte number.
The invention is further configured to: in step C3, the value of the second byte number is modulo by the N power of 10 to obtain the final dynamic password of N bits.
The above object of the present invention is achieved by the following technical solutions:
an intelligent lock system comprises a control device and an intelligent lock, wherein the control device is used for controlling the intelligent lock and comprises a first storage unit and a first processing unit; the first storage unit stores a computer program for generating a dynamic password by the intelligent lock, and the first processor can load and execute the computer program for generating the dynamic password by the intelligent lock stored in the first storage unit; accordingly, the second storage unit stores the computer program of the intelligent lock generating dynamic password, and the second processor can load and execute the computer program of the intelligent lock generating dynamic password stored in the first storage unit.
Compared with the prior art, the invention has the beneficial technical effects that:
1. the method generates the same dynamic password by respectively adopting the same timestamp and password and the same algorithm at the intelligent lock end and the control end, realizes the consistency of the intelligent lock and the control end, and provides guarantee for the generation and the control of the dynamic password;
2. furthermore, the refreshing time interval is also adopted when the dynamic password is generated, the effective time of the dynamic password is set, the timeliness of the dynamic password is guaranteed, the dynamic password is prevented from becoming a permanent password, and the safety of the intelligent lock is guaranteed;
3. furthermore, the root dynamic password is calculated by adopting the anti-repetition algorithm, so that the uniqueness of the dynamic password is ensured, the potential safety hazard caused by the repetition of the dynamic password is avoided, and the safety of the intelligent lock is improved;
4. the system generates the same dynamic password at the same time through the control device and the intelligent lock, allows temporary personnel to unlock under the authorization of the master, increases the means of intelligent lock control, and realizes the diversification of unlocking modes.
Drawings
FIG. 1 is a flow diagram illustrating a process for generating a dynamic password according to an embodiment of the present invention;
FIG. 2 is a schematic control flow diagram of a master control unit according to an embodiment of the present invention;
fig. 3 is a schematic control flow diagram of a driving control unit according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings.
The intelligent lock comprises a main control unit and a drive control unit, wherein the main control unit is electrically connected with the drive control unit, the main control unit is controlled to unlock through the drive control unit, the main control unit comprises an MCU, and the drive control unit comprises an encryption chip.
The control process of the intelligent lock comprises a password generation process, a running process control and a dynamic password generation process.
Detailed description of the invention
The invention discloses a method for generating a dynamic password by an intelligent lock, which is characterized in that the same time record, a secret key and the same algorithm are adopted at a control end and an intelligent lock end to generate the same dynamic password, the dynamic password generated by the control end is input into the intelligent lock within the effective time, the intelligent lock end compares the received dynamic password with the self-generated dynamic password, and whether the intelligent lock is unlocked is controlled according to the comparison result.
The control end and the intelligent lock generate dynamic passwords, as shown in fig. 1, and the method comprises the following steps:
s1, storing the same key by the control end and the intelligent lock;
s2, synchronizing the control end and the intelligent lock time;
s3, calculating a root dynamic password at the control end and the intelligent lock end respectively by adopting the same algorithm according to the secret key and the time;
and S4, calculating the root dynamic password to obtain the dynamic password with N bits.
In step S1, when the control end initially binds to the smart lock, the control end generates a key and sends the key to the smart lock, and the control end and the smart lock end have the same key.
The control end and the intelligent lock end keep synchronous with the standard time.
The control end comprises a mobile end APP, and the secret key is a random character string with the length larger than 128 bytes.
In step S3, the method includes the steps of:
a1, calculating a timestamp from a certain time to the current time;
a2, obtaining a movement factor according to the timestamp and the refreshing time interval;
a3, rounding the time stamp, and converting the integer time stamp into a character string form;
and A4, obtaining the root dynamic password by adopting an anti-repetition algorithm according to the key and the timestamp.
A certain time is set as a time node of a long past, such as zero of the year's new year's day in 1960, all seconds from the zero to the present are time stamps, and the time stamps are removed by a refresh time interval to obtain a moving factor, which is expressed by the following formula: movement factor = timestamp/refresh time interval.
To facilitate procedural processing, the integer time stamp is converted to a string form.
Step a4 includes the following steps:
b1, updating the key to obtain a first dynamic password;
b2, updating the first dynamic password according to the movement factor to obtain a second dynamic password;
and B3, intercepting the second dynamic password to obtain a root dynamic password.
The hash algorithm is adopted and comprises SHA256 and SHA 1.
Updating the output result of the hash algorithm step by step, and updating the output result of the hash algorithm by using a secret key to obtain a first dynamic password; updating the first dynamic password by using the mobile factor to obtain a second dynamic password; and intercepting the second dynamic password to obtain a character string with a set byte length as a root dynamic password.
In one particular embodiment of the present application, the second dynamic password comprises 256 bytes and the root dynamic password comprises 32 bytes.
Obtaining an N-bit final dynamic password from the root dynamic password, comprising the steps of:
c1, intercepting M1 bits from the root dynamic password to obtain a first byte number;
c2, intercepting M2 bytes in the root dynamic password by the numerical value of the first byte number to obtain a second byte number;
and C3, performing modulus operation on the numerical value of the second byte number to obtain the final dynamic password with N bits.
In the root dynamic cipher, M1 bits, that is, M1 bits, are intercepted, M1 bits are converted into a value K, and starting from this value K, M2 bytes are intercepted from the kth byte in the root dynamic cipher in the high order direction, and then from 32 bytes.
In one embodiment of the present application, M1 and M2 are both equal to 4, and the last 4 bits of the 32 bytes are taken, and the value of the 4 bits is between 0 and 15.
If the value of 4 bits is 0, 4 bytes (unsigned integer) in total of [0,3] in the 32-byte result is intercepted;
if the value of 4 bits is 12, 4 bytes (unsigned integer) in total of [12,15] in the 32-byte result are intercepted;
if the 4-bit value is 15, 4 bytes (unsigned integers) in total of [15,18] in the 32-byte result are truncated.
And performing modulus extraction on the intercepted 4-byte result by using the power of N of 10 to obtain the final dynamic password with N bits.
If N equals 6, 6 bits of final dynamic password are obtained; if N equals 8, 8 bits of final dynamic password are obtained.
The final dynamic password is valid for the refresh interval.
Detailed description of the invention
According to the encryption control method of the intelligent lock, during initialization, the main control unit and the drive control unit perform encryption calculation, two authentication keys are generated respectively and are used for authentication of the main control unit to the drive control unit and authentication of the drive control unit to the main control unit in the operation process.
Specifically, the master control unit and the drive control unit respectively adopt drive control chip IDs and the same algorithm to generate two authentication keys, and the two authentication keys generated by the master control unit are respectively equal to the two authentication keys generated by the drive control unit.
When initializing, the main control unit encrypts, comprising the following steps:
s11, reading the first encryption mark of the main control unit;
s12, judging whether the drive control unit ID is stored or not according to the first encryption mark, if not, going to the next step, and if so, turning to S17;
s13, acquiring the ID of the drive control unit, and generating a first authentication key and a second authentication key;
s14, resetting the first encryption mark;
s15, storing the first encryption mark, the first authentication key and the second authentication key;
s16, sending the ID signal of the drive control unit to the drive control unit, and turning to S18;
s17, reading the ID of the drive control unit, the ID of the main control unit, the first authentication key and the second authentication key;
and S18, ending.
Before the main control unit generates the key, an encryption mark is checked, if the encryption mark indicates that the drive control unit ID is stored, the drive control unit ID is obtained before, calculation is carried out, and only two authentication keys need to be read; and if the encryption mark indicates that the drive control unit ID is not received, request information is sent to the drive control unit to request the drive control unit to transmit the ID to the main control unit, and after the drive control unit ID is received, two authentication keys are obtained through calculation and stored.
When initializing, the drive control unit encrypts, comprising the following steps:
q21, receiving the ID information of the main control unit request drive control unit;
q22, reading a second encryption flag of the drive control unit;
q23, judging whether the driving control unit ID is sent to the main control unit or not according to the second encryption mark, if not, entering the next step, and if so, turning to Q29;
q24, sending the ID information of the drive control unit to the main control unit;
q25, resetting the second encryption flag;
q26, receiving the signal of receiving the drive control unit ID information sent by the main control unit;
q27, calculating according to self ID, and generating a first authentication key and a second authentication key;
q28, storing the second encryption mark, the first authentication key and the second authentication key, and turning to Q30;
q29, sending the signal that the ID information of the drive control unit has been transmitted to the main control unit;
and Q30, finishing.
After receiving a signal of a main control unit requesting to send a drive control unit ID, the drive control unit firstly checks a second encryption mark, judges whether a drive control unit ID to be sent is sent to the main control unit before according to the second encryption mark, if the drive control unit ID is sent, the drive control unit ID is not sent to the main control unit, if the drive control unit ID is not sent, the drive control unit ID is sent to the main control unit, and then two authentication keys are generated and stored by adopting the same calculation as the main control unit according to the drive control unit ID. The two authentication keys thus generated are respectively identical to the two keys generated by the main control unit.
Specifically, two authentication keys are generated by using the SHA1 digest algorithm. The first encryption mark is a mark bit in the main control unit chip, the second encryption mark is a mark bit in the driving control unit chip, and the numerical values of the first encryption mark and the second encryption mark are the same or different.
After the authentication key is generated, the authentication key is respectively used for the authentication of the main control unit to the drive control unit and the authentication of the drive control unit to the main control unit.
In the operation process of the intelligent lock, as shown in fig. 2, the control of the main control unit includes the following steps:
a21, receiving unlocking information;
a22, judging whether the unlocking information is correct, if so, entering the next step, and if not, turning to A21;
a23, sending first authentication information to the drive control unit, and realizing authentication with the drive control unit according to the first authentication key;
a24, sending authentication request information to the drive control unit, and realizing the authentication of the drive control unit according to the second authentication key;
a25, judging whether the authentication is passed, if so, entering the next step, and if not, turning to A27;
a26, outputting an unlocking control signal to the drive control unit, and turning to A28;
a27, authentication failure;
and A28, ending.
The unlocking information comprises an unlocking password or a dynamic password.
Accordingly, the control of the drive control unit, as shown in fig. 3, includes the steps of:
b21, receiving first authentication information of the main control unit, and realizing authentication with the main control unit according to the first authentication key;
b22, receiving the authentication request information of the main control unit, and realizing the authentication with the main control unit according to the second authentication key;
b23, receiving an unlocking control signal;
b24, outputting an unlocking driving signal;
and B25, ending.
The main control unit authenticates the drive control unit by adopting a first authentication key; the driving control unit authenticates the main control unit by adopting a second authentication key; different authentication keys increase the complexity of the authentication of the intelligent lock and improve the accuracy of the authentication.
In a specific embodiment of the present application, the method for authenticating a drive control unit by a master control unit using a first authentication key includes the following steps:
c21, generating first authentication information and sending the first authentication information to the drive control unit;
c22, receiving the first authentication feedback information of the driving control unit, decrypting the first authentication feedback information by combining the first authentication key, and judging whether the authentication passes.
Accordingly, the control of the drive control unit comprises the steps of:
e21, receiving first authentication information of the main control unit;
e22, generating first authentication feedback information according to the first authentication information and combining the first authentication key;
e23, sending the first authentication feedback information to the main control unit.
Specifically, the first authentication information includes an authentication instruction and a first random number, the drive control unit encrypts the first random number according to a first authentication key to obtain first authentication feedback information, the main control unit decrypts the first authentication feedback information by using a method the same as the encryption method after receiving the first authentication feedback information to obtain a second random number, and then compares whether the first random number is the same as the second random number, if so, the authentication is successful, and if not, the authentication is failed.
The encryption mode includes a 3DES mode.
And the driving control unit authenticates the main control unit by adopting a second authentication key, and the control of the main control unit comprises the following steps:
d21, sending authentication request information to the drive control unit;
d22, receiving second authentication information sent by the drive control unit, generating second authentication feedback information by combining a second authentication key, and sending the second authentication feedback information to the drive control unit;
d23, receiving the third authentication information of the drive control unit, and determining whether the authentication is passed.
Accordingly, the control of the drive control unit comprises the steps of:
f21, receiving authentication request information sent by the main control unit;
f22, generating second authentication information and sending the second authentication information to the main control unit;
f23, receiving second authentication feedback information of the main control unit, and authenticating the second authentication feedback information by combining a second authentication key;
and F24, generating third authentication information and sending the third authentication information to the main control unit.
The master control unit sends an authentication instruction to the drive control unit, the drive control unit generates a third random number and sends the third random number to the master control unit, the master control unit encrypts the third random number according to a second authentication key and sends the third random number to the drive control unit, the drive control unit decrypts second authentication feedback information according to the second authentication key by adopting the same method as encryption to obtain a fourth random number, the fourth random number is compared with the third random number to obtain a comparison result, the comparison result is sent to the master control unit, and the master control unit judges whether authentication is successful or not according to the comparison result. If the comparison results are the same, the authentication is judged to be successful, and if the comparison results are different, the authentication is judged to be failed.
Detailed description of the invention
An intelligent lock system comprises a control device and an intelligent lock, wherein the control device is used for controlling the intelligent lock device and comprises a first storage unit and a first processing unit; the first storage unit stores a computer program of the encryption control method, and the first processing unit loads and executes the computer program of the encryption control method; similarly, the second storage unit stores a computer program of the encryption control method, and the second processing unit loads and executes the computer program of the encryption control method.
The intelligent lock comprises a main control unit, wherein the main control unit comprises a second storage unit and a second processing unit.
A computer program of the encryption control method is installed on equipment capable of running the computer program, such as a mobile phone and a computer, so that the generation of the dynamic password of the intelligent lock is realized.
The owner of the intelligent lock generates a dynamic password on the control equipment, informs the dynamic password to closely contacted related personnel, and allows the related personnel to open the intelligent lock so as to deal with emergency situations.
The embodiments of the present invention are preferred embodiments of the present invention, and the scope of the present invention is not limited by these embodiments, so: all equivalent changes made according to the structure, shape and principle of the invention are covered by the protection scope of the invention.

Claims (10)

1. A method for generating a dynamic password by an intelligent lock is characterized in that: the control end and the intelligent lock end generate the same dynamic password, the dynamic password generated by the control end is input into the intelligent lock, the intelligent lock end compares the received dynamic password with the self-generated dynamic password, and whether the intelligent lock is unlocked is controlled according to the comparison result.
2. The method for generating the dynamic password by the intelligent lock according to claim 1, wherein: the method comprises the following steps:
s1, storing the same key by the control end and the intelligent lock;
s2, synchronizing the control end and the intelligent lock time;
s3, calculating a root dynamic password at the control end and the intelligent lock end respectively by adopting the same algorithm according to the secret key and the time;
and S4, calculating the root dynamic password to obtain the dynamic password with N bits.
3. The method for generating the dynamic password by the intelligent lock according to claim 2, wherein: in step S1, when the control end and the smart lock end are initially bound, the control end generates a key and sends the key to the smart lock end.
4. The method for generating the dynamic password by the intelligent lock according to claim 2, wherein: in step S3, the method includes the steps of:
a1, calculating a timestamp from a certain time to the current time;
a2, obtaining a movement factor according to the timestamp and the refreshing time interval;
a3, rounding the time stamp, and converting the integer time stamp into a character string form;
and A4, obtaining the root dynamic password by adopting an anti-repetition algorithm according to the key and the timestamp.
5. The method for generating dynamic password by intelligent lock according to claim 4, wherein: step a4 includes the following steps:
b1, updating the key to obtain a first dynamic password;
b2, updating the first dynamic password according to the movement factor to obtain a second dynamic password;
and B3, intercepting the second dynamic password to obtain a root dynamic password.
6. The method for generating dynamic password by intelligent lock according to claim 5, wherein: the second dynamic password comprises 256 bytes and the root dynamic password comprises 32 bytes.
7. The method for generating the dynamic password by the intelligent lock according to claim 2, wherein: in step S4, the method includes the steps of:
c1, intercepting M1 bits from the root dynamic password to obtain a first byte number;
c2, intercepting M2 bytes in the root dynamic password by the numerical value of the first byte number to obtain a second byte number;
and C3, performing modulus operation on the numerical value of the second byte number to obtain the final dynamic password with N bits.
8. The method for generating a dynamic password by an intelligent lock according to claim 7, wherein: the final dynamic password is valid for the refresh interval.
9. The method for generating a dynamic password by an intelligent lock according to claim 7, wherein: in step C2, intercepting M2 bytes from the Kth byte in the root dynamic password according to the value K of the first byte number in the high order direction; in step C3, the value of the second byte number is modulo by the N power of 10 to obtain the final dynamic password of N bits.
10. An intelligent lock system, characterized in that: the intelligent lock comprises control equipment and an intelligent lock, wherein the control equipment is used for controlling the intelligent lock, the control equipment comprises a first storage unit and a first processing unit, and the intelligent lock comprises a second storage unit and a second processing unit; the first storage unit stores a computer program that can be loaded by the first processor and that executes the method according to any one of claims 1 to 9; the second memory unit stores a computer program that can be loaded by the second processor and that executes the method according to any one of claims 1 to 9.
CN202010371883.2A 2020-05-06 2020-05-06 Method for generating dynamic password by intelligent lock and intelligent lock system Pending CN111612945A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010371883.2A CN111612945A (en) 2020-05-06 2020-05-06 Method for generating dynamic password by intelligent lock and intelligent lock system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010371883.2A CN111612945A (en) 2020-05-06 2020-05-06 Method for generating dynamic password by intelligent lock and intelligent lock system

Publications (1)

Publication Number Publication Date
CN111612945A true CN111612945A (en) 2020-09-01

Family

ID=72201754

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010371883.2A Pending CN111612945A (en) 2020-05-06 2020-05-06 Method for generating dynamic password by intelligent lock and intelligent lock system

Country Status (1)

Country Link
CN (1) CN111612945A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113726508A (en) * 2021-08-30 2021-11-30 北京博瑞翔伦科技发展有限公司 TOTP algorithm and system for unmanned bin offline intelligent lock
CN114694279A (en) * 2020-12-28 2022-07-01 深圳Tcl新技术有限公司 Method for acquiring offline password, computer readable storage medium and terminal device
CN115225673A (en) * 2022-07-14 2022-10-21 蔚来汽车科技(安徽)有限公司 Vehicle monitoring method, apparatus and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106131179A (en) * 2016-07-05 2016-11-16 林哲敏 The password Rights Management System of a kind of intelligent door lock and method
CN107784712A (en) * 2016-08-25 2018-03-09 大连楼兰科技股份有限公司 A kind of method of car networking embedded system car telephone control cryptographic check
CN107979472A (en) * 2017-12-01 2018-05-01 江苏乐希科技有限公司 A kind of coding lock system and authentication method
CN108492413A (en) * 2018-03-15 2018-09-04 广东西雅斯智能科技有限公司 Dynamic cipher generating method, password generator and coded lock
CN111010268A (en) * 2019-11-15 2020-04-14 珠海数字动力科技股份有限公司 Dynamic cryptographic algorithm based on time line

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106131179A (en) * 2016-07-05 2016-11-16 林哲敏 The password Rights Management System of a kind of intelligent door lock and method
CN107784712A (en) * 2016-08-25 2018-03-09 大连楼兰科技股份有限公司 A kind of method of car networking embedded system car telephone control cryptographic check
CN107979472A (en) * 2017-12-01 2018-05-01 江苏乐希科技有限公司 A kind of coding lock system and authentication method
CN108492413A (en) * 2018-03-15 2018-09-04 广东西雅斯智能科技有限公司 Dynamic cipher generating method, password generator and coded lock
CN111010268A (en) * 2019-11-15 2020-04-14 珠海数字动力科技股份有限公司 Dynamic cryptographic algorithm based on time line

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
姜思宇等: "基于动态口令的增强身份认证", 华东师范大学学报(自然科学版), 31 March 2015 (2015-03-31) *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114694279A (en) * 2020-12-28 2022-07-01 深圳Tcl新技术有限公司 Method for acquiring offline password, computer readable storage medium and terminal device
CN113726508A (en) * 2021-08-30 2021-11-30 北京博瑞翔伦科技发展有限公司 TOTP algorithm and system for unmanned bin offline intelligent lock
CN113726508B (en) * 2021-08-30 2024-04-02 北京博瑞翔伦科技发展有限公司 TOTP algorithm and system for unmanned bin offline intelligent lock
CN115225673A (en) * 2022-07-14 2022-10-21 蔚来汽车科技(安徽)有限公司 Vehicle monitoring method, apparatus and storage medium

Similar Documents

Publication Publication Date Title
CN111612945A (en) Method for generating dynamic password by intelligent lock and intelligent lock system
US9203836B2 (en) Token for securing communication
CN108494740B (en) Token generation and verification method, intelligent terminal and server
US7802112B2 (en) Information processing apparatus with security module
CN101939754B (en) Finger sensing apparatus using hybrid matching and associated methods
CN109587162B (en) Login verification method, device, terminal, password server and storage medium
US7644285B1 (en) Recovery access to secure data
JPH09128507A (en) Mutual certifying method
CN101971182B (en) Finger sensing apparatus with credential release and associated methods
US20040128523A1 (en) Information security microcomputer having an information securtiy function and authenticating an external device
WO2006043904A1 (en) One time passcode system
CN106936588B (en) Hosting method, device and system of hardware control lock
EP2251810A1 (en) Authentication information generation system, authentication information generation method, and authentication information generation program utilizing a client device and said method
CN109598104B (en) Software authorization protection system and method based on timestamp and secret authentication file
US7792303B2 (en) Method of delivering direct proof private keys to devices using a distribution CD
JP2007534544A (en) Certification of control equipment in the vehicle
US20050120245A1 (en) Confidential information processing system and LSI
CN113282944B (en) Intelligent lock unlocking method and device, electronic equipment and storage medium
CN113872770A (en) Security verification method, system, electronic device and storage medium
KR100350931B1 (en) Method for generating one-time password in a portable card
JP2007535250A (en) Authentication of equipment outside the vehicle
WO2006046484A1 (en) Authentication method
CN111612944A (en) Intelligent lock and unlocking control method thereof
CN111523127B (en) Authority authentication method and system for password equipment
CN111599043A (en) Intelligent lock and encryption control method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination