CN111612945A - Method for generating dynamic password by intelligent lock and intelligent lock system - Google Patents
Method for generating dynamic password by intelligent lock and intelligent lock system Download PDFInfo
- Publication number
- CN111612945A CN111612945A CN202010371883.2A CN202010371883A CN111612945A CN 111612945 A CN111612945 A CN 111612945A CN 202010371883 A CN202010371883 A CN 202010371883A CN 111612945 A CN111612945 A CN 111612945A
- Authority
- CN
- China
- Prior art keywords
- dynamic password
- intelligent lock
- control unit
- generating
- root
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 44
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 16
- 238000004590 computer program Methods 0.000 claims description 12
- 238000004364 calculation method Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 101100217298 Mus musculus Aspm gene Proteins 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 238000004886 process control Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/0042—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed
- G07C2009/00476—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically
Abstract
The invention discloses a method for generating a dynamic password by an intelligent lock and an intelligent lock system, wherein the method comprises the following steps: storing the same key with the intelligent lock at the control end; synchronizing the control end and the intelligent lock time; the control end and the intelligent lock end respectively adopt the same algorithm to calculate a root dynamic password according to the secret key and the time; and calculating the root dynamic password to obtain the dynamic password with N bits. The control end and the intelligent lock end adopt the same time record, the same secret key and the same algorithm to generate the same dynamic password, the dynamic password generated by the control end is input into the intelligent lock within the effective time, the intelligent lock end compares the received dynamic password with the own dynamic password, and whether the intelligent lock is unlocked is controlled according to the comparison result; the consistency of the intelligent lock and the control end is realized, and the safety of the intelligent lock is improved. The intelligent lock system increases the function of unlocking by dynamic passwords and realizes the diversification of unlocking modes.
Description
Technical Field
The invention relates to the technical field of intelligent locks, in particular to a method for generating a dynamic password by an intelligent lock and an intelligent lock system.
Background
The intelligence lock is unblanked and is sent out the instruction of unblanking through the master control unit, driving motor drive unit, the rotation of control motor realizes unblanking, the intelligence lock is usually unblanked control through the input password, just can open the intelligence lock when the input password is correct, and the password only can possess owner, others can not know the password, need get into the door when interim personnel, and owner is not in the same place as before again, under the condition that owner agrees interim personnel and get into, just need an interim password to solve interim personnel's entering problem, how guarantee the temporality and the confidentiality of interim password, be the problem that waits to solve at present urgently.
Disclosure of Invention
The invention aims to provide a method for generating a dynamic password by an intelligent lock and an intelligent lock system. The temporary unlocking function of the intelligent lock is realized, and the safety control of the intelligent lock is ensured.
The above object of the present invention is achieved by the following technical solutions:
a method for generating dynamic password of intelligent lock includes generating the same dynamic password at control end and intelligent lock end, inputting dynamic password generated by control end into intelligent lock, comparing received dynamic password with own dynamic password by intelligent lock end and controlling whether intelligent lock is opened or not according to comparison result.
The invention is further configured to: the method comprises the following steps:
s1, storing the same key by the control end and the intelligent lock;
s2, synchronizing the control end and the intelligent lock time;
s3, calculating a root dynamic password at the control end and the intelligent lock end respectively by adopting the same algorithm according to the secret key and the time;
and S4, calculating the root dynamic password to obtain the dynamic password with N bits.
The invention is further configured to: in step S1, when the control end and the smart lock end are initially bound, the control end generates a key and sends the key to the smart lock end.
The invention is further configured to: in step S3, the method includes the steps of:
a1, calculating a timestamp from a certain time to the current time;
a2, obtaining a movement factor according to the timestamp and the refreshing time interval;
a3, rounding the time stamp, and converting the integer time stamp into a character string form;
and A4, obtaining the root dynamic password by adopting an anti-repetition algorithm according to the key and the timestamp.
The invention is further configured to: step a4 includes the following steps:
b1, updating the key to obtain a first dynamic password;
b2, updating the first dynamic password according to the movement factor to obtain a second dynamic password;
and B3, intercepting the second dynamic password to obtain a root dynamic password.
The invention is further configured to: the second dynamic password comprises 256 bytes and the root dynamic password comprises 32 bytes.
The invention is further configured to: in step S4, the method includes the steps of:
c1, intercepting M1 bits from the root dynamic password to obtain a first byte number;
c2, intercepting M2 bytes in the root dynamic password by the numerical value of the first byte number to obtain a second byte number;
and C3, performing modulus operation on the numerical value of the second byte number to obtain the final dynamic password with N bits.
The invention is further configured to: the final dynamic password is valid for the refresh interval.
The invention is further configured to: in step C2, M2 bytes are truncated in the upper direction starting from the kth byte in the root dynamic password by the value K of the first byte number.
The invention is further configured to: in step C3, the value of the second byte number is modulo by the N power of 10 to obtain the final dynamic password of N bits.
The above object of the present invention is achieved by the following technical solutions:
an intelligent lock system comprises a control device and an intelligent lock, wherein the control device is used for controlling the intelligent lock and comprises a first storage unit and a first processing unit; the first storage unit stores a computer program for generating a dynamic password by the intelligent lock, and the first processor can load and execute the computer program for generating the dynamic password by the intelligent lock stored in the first storage unit; accordingly, the second storage unit stores the computer program of the intelligent lock generating dynamic password, and the second processor can load and execute the computer program of the intelligent lock generating dynamic password stored in the first storage unit.
Compared with the prior art, the invention has the beneficial technical effects that:
1. the method generates the same dynamic password by respectively adopting the same timestamp and password and the same algorithm at the intelligent lock end and the control end, realizes the consistency of the intelligent lock and the control end, and provides guarantee for the generation and the control of the dynamic password;
2. furthermore, the refreshing time interval is also adopted when the dynamic password is generated, the effective time of the dynamic password is set, the timeliness of the dynamic password is guaranteed, the dynamic password is prevented from becoming a permanent password, and the safety of the intelligent lock is guaranteed;
3. furthermore, the root dynamic password is calculated by adopting the anti-repetition algorithm, so that the uniqueness of the dynamic password is ensured, the potential safety hazard caused by the repetition of the dynamic password is avoided, and the safety of the intelligent lock is improved;
4. the system generates the same dynamic password at the same time through the control device and the intelligent lock, allows temporary personnel to unlock under the authorization of the master, increases the means of intelligent lock control, and realizes the diversification of unlocking modes.
Drawings
FIG. 1 is a flow diagram illustrating a process for generating a dynamic password according to an embodiment of the present invention;
FIG. 2 is a schematic control flow diagram of a master control unit according to an embodiment of the present invention;
fig. 3 is a schematic control flow diagram of a driving control unit according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings.
The intelligent lock comprises a main control unit and a drive control unit, wherein the main control unit is electrically connected with the drive control unit, the main control unit is controlled to unlock through the drive control unit, the main control unit comprises an MCU, and the drive control unit comprises an encryption chip.
The control process of the intelligent lock comprises a password generation process, a running process control and a dynamic password generation process.
Detailed description of the invention
The invention discloses a method for generating a dynamic password by an intelligent lock, which is characterized in that the same time record, a secret key and the same algorithm are adopted at a control end and an intelligent lock end to generate the same dynamic password, the dynamic password generated by the control end is input into the intelligent lock within the effective time, the intelligent lock end compares the received dynamic password with the self-generated dynamic password, and whether the intelligent lock is unlocked is controlled according to the comparison result.
The control end and the intelligent lock generate dynamic passwords, as shown in fig. 1, and the method comprises the following steps:
s1, storing the same key by the control end and the intelligent lock;
s2, synchronizing the control end and the intelligent lock time;
s3, calculating a root dynamic password at the control end and the intelligent lock end respectively by adopting the same algorithm according to the secret key and the time;
and S4, calculating the root dynamic password to obtain the dynamic password with N bits.
In step S1, when the control end initially binds to the smart lock, the control end generates a key and sends the key to the smart lock, and the control end and the smart lock end have the same key.
The control end and the intelligent lock end keep synchronous with the standard time.
The control end comprises a mobile end APP, and the secret key is a random character string with the length larger than 128 bytes.
In step S3, the method includes the steps of:
a1, calculating a timestamp from a certain time to the current time;
a2, obtaining a movement factor according to the timestamp and the refreshing time interval;
a3, rounding the time stamp, and converting the integer time stamp into a character string form;
and A4, obtaining the root dynamic password by adopting an anti-repetition algorithm according to the key and the timestamp.
A certain time is set as a time node of a long past, such as zero of the year's new year's day in 1960, all seconds from the zero to the present are time stamps, and the time stamps are removed by a refresh time interval to obtain a moving factor, which is expressed by the following formula: movement factor = timestamp/refresh time interval.
To facilitate procedural processing, the integer time stamp is converted to a string form.
Step a4 includes the following steps:
b1, updating the key to obtain a first dynamic password;
b2, updating the first dynamic password according to the movement factor to obtain a second dynamic password;
and B3, intercepting the second dynamic password to obtain a root dynamic password.
The hash algorithm is adopted and comprises SHA256 and SHA 1.
Updating the output result of the hash algorithm step by step, and updating the output result of the hash algorithm by using a secret key to obtain a first dynamic password; updating the first dynamic password by using the mobile factor to obtain a second dynamic password; and intercepting the second dynamic password to obtain a character string with a set byte length as a root dynamic password.
In one particular embodiment of the present application, the second dynamic password comprises 256 bytes and the root dynamic password comprises 32 bytes.
Obtaining an N-bit final dynamic password from the root dynamic password, comprising the steps of:
c1, intercepting M1 bits from the root dynamic password to obtain a first byte number;
c2, intercepting M2 bytes in the root dynamic password by the numerical value of the first byte number to obtain a second byte number;
and C3, performing modulus operation on the numerical value of the second byte number to obtain the final dynamic password with N bits.
In the root dynamic cipher, M1 bits, that is, M1 bits, are intercepted, M1 bits are converted into a value K, and starting from this value K, M2 bytes are intercepted from the kth byte in the root dynamic cipher in the high order direction, and then from 32 bytes.
In one embodiment of the present application, M1 and M2 are both equal to 4, and the last 4 bits of the 32 bytes are taken, and the value of the 4 bits is between 0 and 15.
If the value of 4 bits is 0, 4 bytes (unsigned integer) in total of [0,3] in the 32-byte result is intercepted;
if the value of 4 bits is 12, 4 bytes (unsigned integer) in total of [12,15] in the 32-byte result are intercepted;
if the 4-bit value is 15, 4 bytes (unsigned integers) in total of [15,18] in the 32-byte result are truncated.
And performing modulus extraction on the intercepted 4-byte result by using the power of N of 10 to obtain the final dynamic password with N bits.
If N equals 6, 6 bits of final dynamic password are obtained; if N equals 8, 8 bits of final dynamic password are obtained.
The final dynamic password is valid for the refresh interval.
Detailed description of the invention
According to the encryption control method of the intelligent lock, during initialization, the main control unit and the drive control unit perform encryption calculation, two authentication keys are generated respectively and are used for authentication of the main control unit to the drive control unit and authentication of the drive control unit to the main control unit in the operation process.
Specifically, the master control unit and the drive control unit respectively adopt drive control chip IDs and the same algorithm to generate two authentication keys, and the two authentication keys generated by the master control unit are respectively equal to the two authentication keys generated by the drive control unit.
When initializing, the main control unit encrypts, comprising the following steps:
s11, reading the first encryption mark of the main control unit;
s12, judging whether the drive control unit ID is stored or not according to the first encryption mark, if not, going to the next step, and if so, turning to S17;
s13, acquiring the ID of the drive control unit, and generating a first authentication key and a second authentication key;
s14, resetting the first encryption mark;
s15, storing the first encryption mark, the first authentication key and the second authentication key;
s16, sending the ID signal of the drive control unit to the drive control unit, and turning to S18;
s17, reading the ID of the drive control unit, the ID of the main control unit, the first authentication key and the second authentication key;
and S18, ending.
Before the main control unit generates the key, an encryption mark is checked, if the encryption mark indicates that the drive control unit ID is stored, the drive control unit ID is obtained before, calculation is carried out, and only two authentication keys need to be read; and if the encryption mark indicates that the drive control unit ID is not received, request information is sent to the drive control unit to request the drive control unit to transmit the ID to the main control unit, and after the drive control unit ID is received, two authentication keys are obtained through calculation and stored.
When initializing, the drive control unit encrypts, comprising the following steps:
q21, receiving the ID information of the main control unit request drive control unit;
q22, reading a second encryption flag of the drive control unit;
q23, judging whether the driving control unit ID is sent to the main control unit or not according to the second encryption mark, if not, entering the next step, and if so, turning to Q29;
q24, sending the ID information of the drive control unit to the main control unit;
q25, resetting the second encryption flag;
q26, receiving the signal of receiving the drive control unit ID information sent by the main control unit;
q27, calculating according to self ID, and generating a first authentication key and a second authentication key;
q28, storing the second encryption mark, the first authentication key and the second authentication key, and turning to Q30;
q29, sending the signal that the ID information of the drive control unit has been transmitted to the main control unit;
and Q30, finishing.
After receiving a signal of a main control unit requesting to send a drive control unit ID, the drive control unit firstly checks a second encryption mark, judges whether a drive control unit ID to be sent is sent to the main control unit before according to the second encryption mark, if the drive control unit ID is sent, the drive control unit ID is not sent to the main control unit, if the drive control unit ID is not sent, the drive control unit ID is sent to the main control unit, and then two authentication keys are generated and stored by adopting the same calculation as the main control unit according to the drive control unit ID. The two authentication keys thus generated are respectively identical to the two keys generated by the main control unit.
Specifically, two authentication keys are generated by using the SHA1 digest algorithm. The first encryption mark is a mark bit in the main control unit chip, the second encryption mark is a mark bit in the driving control unit chip, and the numerical values of the first encryption mark and the second encryption mark are the same or different.
After the authentication key is generated, the authentication key is respectively used for the authentication of the main control unit to the drive control unit and the authentication of the drive control unit to the main control unit.
In the operation process of the intelligent lock, as shown in fig. 2, the control of the main control unit includes the following steps:
a21, receiving unlocking information;
a22, judging whether the unlocking information is correct, if so, entering the next step, and if not, turning to A21;
a23, sending first authentication information to the drive control unit, and realizing authentication with the drive control unit according to the first authentication key;
a24, sending authentication request information to the drive control unit, and realizing the authentication of the drive control unit according to the second authentication key;
a25, judging whether the authentication is passed, if so, entering the next step, and if not, turning to A27;
a26, outputting an unlocking control signal to the drive control unit, and turning to A28;
a27, authentication failure;
and A28, ending.
The unlocking information comprises an unlocking password or a dynamic password.
Accordingly, the control of the drive control unit, as shown in fig. 3, includes the steps of:
b21, receiving first authentication information of the main control unit, and realizing authentication with the main control unit according to the first authentication key;
b22, receiving the authentication request information of the main control unit, and realizing the authentication with the main control unit according to the second authentication key;
b23, receiving an unlocking control signal;
b24, outputting an unlocking driving signal;
and B25, ending.
The main control unit authenticates the drive control unit by adopting a first authentication key; the driving control unit authenticates the main control unit by adopting a second authentication key; different authentication keys increase the complexity of the authentication of the intelligent lock and improve the accuracy of the authentication.
In a specific embodiment of the present application, the method for authenticating a drive control unit by a master control unit using a first authentication key includes the following steps:
c21, generating first authentication information and sending the first authentication information to the drive control unit;
c22, receiving the first authentication feedback information of the driving control unit, decrypting the first authentication feedback information by combining the first authentication key, and judging whether the authentication passes.
Accordingly, the control of the drive control unit comprises the steps of:
e21, receiving first authentication information of the main control unit;
e22, generating first authentication feedback information according to the first authentication information and combining the first authentication key;
e23, sending the first authentication feedback information to the main control unit.
Specifically, the first authentication information includes an authentication instruction and a first random number, the drive control unit encrypts the first random number according to a first authentication key to obtain first authentication feedback information, the main control unit decrypts the first authentication feedback information by using a method the same as the encryption method after receiving the first authentication feedback information to obtain a second random number, and then compares whether the first random number is the same as the second random number, if so, the authentication is successful, and if not, the authentication is failed.
The encryption mode includes a 3DES mode.
And the driving control unit authenticates the main control unit by adopting a second authentication key, and the control of the main control unit comprises the following steps:
d21, sending authentication request information to the drive control unit;
d22, receiving second authentication information sent by the drive control unit, generating second authentication feedback information by combining a second authentication key, and sending the second authentication feedback information to the drive control unit;
d23, receiving the third authentication information of the drive control unit, and determining whether the authentication is passed.
Accordingly, the control of the drive control unit comprises the steps of:
f21, receiving authentication request information sent by the main control unit;
f22, generating second authentication information and sending the second authentication information to the main control unit;
f23, receiving second authentication feedback information of the main control unit, and authenticating the second authentication feedback information by combining a second authentication key;
and F24, generating third authentication information and sending the third authentication information to the main control unit.
The master control unit sends an authentication instruction to the drive control unit, the drive control unit generates a third random number and sends the third random number to the master control unit, the master control unit encrypts the third random number according to a second authentication key and sends the third random number to the drive control unit, the drive control unit decrypts second authentication feedback information according to the second authentication key by adopting the same method as encryption to obtain a fourth random number, the fourth random number is compared with the third random number to obtain a comparison result, the comparison result is sent to the master control unit, and the master control unit judges whether authentication is successful or not according to the comparison result. If the comparison results are the same, the authentication is judged to be successful, and if the comparison results are different, the authentication is judged to be failed.
Detailed description of the invention
An intelligent lock system comprises a control device and an intelligent lock, wherein the control device is used for controlling the intelligent lock device and comprises a first storage unit and a first processing unit; the first storage unit stores a computer program of the encryption control method, and the first processing unit loads and executes the computer program of the encryption control method; similarly, the second storage unit stores a computer program of the encryption control method, and the second processing unit loads and executes the computer program of the encryption control method.
The intelligent lock comprises a main control unit, wherein the main control unit comprises a second storage unit and a second processing unit.
A computer program of the encryption control method is installed on equipment capable of running the computer program, such as a mobile phone and a computer, so that the generation of the dynamic password of the intelligent lock is realized.
The owner of the intelligent lock generates a dynamic password on the control equipment, informs the dynamic password to closely contacted related personnel, and allows the related personnel to open the intelligent lock so as to deal with emergency situations.
The embodiments of the present invention are preferred embodiments of the present invention, and the scope of the present invention is not limited by these embodiments, so: all equivalent changes made according to the structure, shape and principle of the invention are covered by the protection scope of the invention.
Claims (10)
1. A method for generating a dynamic password by an intelligent lock is characterized in that: the control end and the intelligent lock end generate the same dynamic password, the dynamic password generated by the control end is input into the intelligent lock, the intelligent lock end compares the received dynamic password with the self-generated dynamic password, and whether the intelligent lock is unlocked is controlled according to the comparison result.
2. The method for generating the dynamic password by the intelligent lock according to claim 1, wherein: the method comprises the following steps:
s1, storing the same key by the control end and the intelligent lock;
s2, synchronizing the control end and the intelligent lock time;
s3, calculating a root dynamic password at the control end and the intelligent lock end respectively by adopting the same algorithm according to the secret key and the time;
and S4, calculating the root dynamic password to obtain the dynamic password with N bits.
3. The method for generating the dynamic password by the intelligent lock according to claim 2, wherein: in step S1, when the control end and the smart lock end are initially bound, the control end generates a key and sends the key to the smart lock end.
4. The method for generating the dynamic password by the intelligent lock according to claim 2, wherein: in step S3, the method includes the steps of:
a1, calculating a timestamp from a certain time to the current time;
a2, obtaining a movement factor according to the timestamp and the refreshing time interval;
a3, rounding the time stamp, and converting the integer time stamp into a character string form;
and A4, obtaining the root dynamic password by adopting an anti-repetition algorithm according to the key and the timestamp.
5. The method for generating dynamic password by intelligent lock according to claim 4, wherein: step a4 includes the following steps:
b1, updating the key to obtain a first dynamic password;
b2, updating the first dynamic password according to the movement factor to obtain a second dynamic password;
and B3, intercepting the second dynamic password to obtain a root dynamic password.
6. The method for generating dynamic password by intelligent lock according to claim 5, wherein: the second dynamic password comprises 256 bytes and the root dynamic password comprises 32 bytes.
7. The method for generating the dynamic password by the intelligent lock according to claim 2, wherein: in step S4, the method includes the steps of:
c1, intercepting M1 bits from the root dynamic password to obtain a first byte number;
c2, intercepting M2 bytes in the root dynamic password by the numerical value of the first byte number to obtain a second byte number;
and C3, performing modulus operation on the numerical value of the second byte number to obtain the final dynamic password with N bits.
8. The method for generating a dynamic password by an intelligent lock according to claim 7, wherein: the final dynamic password is valid for the refresh interval.
9. The method for generating a dynamic password by an intelligent lock according to claim 7, wherein: in step C2, intercepting M2 bytes from the Kth byte in the root dynamic password according to the value K of the first byte number in the high order direction; in step C3, the value of the second byte number is modulo by the N power of 10 to obtain the final dynamic password of N bits.
10. An intelligent lock system, characterized in that: the intelligent lock comprises control equipment and an intelligent lock, wherein the control equipment is used for controlling the intelligent lock, the control equipment comprises a first storage unit and a first processing unit, and the intelligent lock comprises a second storage unit and a second processing unit; the first storage unit stores a computer program that can be loaded by the first processor and that executes the method according to any one of claims 1 to 9; the second memory unit stores a computer program that can be loaded by the second processor and that executes the method according to any one of claims 1 to 9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010371883.2A CN111612945A (en) | 2020-05-06 | 2020-05-06 | Method for generating dynamic password by intelligent lock and intelligent lock system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010371883.2A CN111612945A (en) | 2020-05-06 | 2020-05-06 | Method for generating dynamic password by intelligent lock and intelligent lock system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111612945A true CN111612945A (en) | 2020-09-01 |
Family
ID=72201754
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010371883.2A Pending CN111612945A (en) | 2020-05-06 | 2020-05-06 | Method for generating dynamic password by intelligent lock and intelligent lock system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111612945A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113726508A (en) * | 2021-08-30 | 2021-11-30 | 北京博瑞翔伦科技发展有限公司 | TOTP algorithm and system for unmanned bin offline intelligent lock |
CN114694279A (en) * | 2020-12-28 | 2022-07-01 | 深圳Tcl新技术有限公司 | Method for acquiring offline password, computer readable storage medium and terminal device |
CN115225673A (en) * | 2022-07-14 | 2022-10-21 | 蔚来汽车科技(安徽)有限公司 | Vehicle monitoring method, apparatus and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106131179A (en) * | 2016-07-05 | 2016-11-16 | 林哲敏 | The password Rights Management System of a kind of intelligent door lock and method |
CN107784712A (en) * | 2016-08-25 | 2018-03-09 | 大连楼兰科技股份有限公司 | A kind of method of car networking embedded system car telephone control cryptographic check |
CN107979472A (en) * | 2017-12-01 | 2018-05-01 | 江苏乐希科技有限公司 | A kind of coding lock system and authentication method |
CN108492413A (en) * | 2018-03-15 | 2018-09-04 | 广东西雅斯智能科技有限公司 | Dynamic cipher generating method, password generator and coded lock |
CN111010268A (en) * | 2019-11-15 | 2020-04-14 | 珠海数字动力科技股份有限公司 | Dynamic cryptographic algorithm based on time line |
-
2020
- 2020-05-06 CN CN202010371883.2A patent/CN111612945A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106131179A (en) * | 2016-07-05 | 2016-11-16 | 林哲敏 | The password Rights Management System of a kind of intelligent door lock and method |
CN107784712A (en) * | 2016-08-25 | 2018-03-09 | 大连楼兰科技股份有限公司 | A kind of method of car networking embedded system car telephone control cryptographic check |
CN107979472A (en) * | 2017-12-01 | 2018-05-01 | 江苏乐希科技有限公司 | A kind of coding lock system and authentication method |
CN108492413A (en) * | 2018-03-15 | 2018-09-04 | 广东西雅斯智能科技有限公司 | Dynamic cipher generating method, password generator and coded lock |
CN111010268A (en) * | 2019-11-15 | 2020-04-14 | 珠海数字动力科技股份有限公司 | Dynamic cryptographic algorithm based on time line |
Non-Patent Citations (1)
Title |
---|
姜思宇等: "基于动态口令的增强身份认证", 华东师范大学学报(自然科学版), 31 March 2015 (2015-03-31) * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114694279A (en) * | 2020-12-28 | 2022-07-01 | 深圳Tcl新技术有限公司 | Method for acquiring offline password, computer readable storage medium and terminal device |
CN113726508A (en) * | 2021-08-30 | 2021-11-30 | 北京博瑞翔伦科技发展有限公司 | TOTP algorithm and system for unmanned bin offline intelligent lock |
CN113726508B (en) * | 2021-08-30 | 2024-04-02 | 北京博瑞翔伦科技发展有限公司 | TOTP algorithm and system for unmanned bin offline intelligent lock |
CN115225673A (en) * | 2022-07-14 | 2022-10-21 | 蔚来汽车科技(安徽)有限公司 | Vehicle monitoring method, apparatus and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111612945A (en) | Method for generating dynamic password by intelligent lock and intelligent lock system | |
US9203836B2 (en) | Token for securing communication | |
CN108494740B (en) | Token generation and verification method, intelligent terminal and server | |
US7802112B2 (en) | Information processing apparatus with security module | |
CN101939754B (en) | Finger sensing apparatus using hybrid matching and associated methods | |
CN109587162B (en) | Login verification method, device, terminal, password server and storage medium | |
US7644285B1 (en) | Recovery access to secure data | |
JPH09128507A (en) | Mutual certifying method | |
CN101971182B (en) | Finger sensing apparatus with credential release and associated methods | |
US20040128523A1 (en) | Information security microcomputer having an information securtiy function and authenticating an external device | |
WO2006043904A1 (en) | One time passcode system | |
CN106936588B (en) | Hosting method, device and system of hardware control lock | |
EP2251810A1 (en) | Authentication information generation system, authentication information generation method, and authentication information generation program utilizing a client device and said method | |
CN109598104B (en) | Software authorization protection system and method based on timestamp and secret authentication file | |
US7792303B2 (en) | Method of delivering direct proof private keys to devices using a distribution CD | |
JP2007534544A (en) | Certification of control equipment in the vehicle | |
US20050120245A1 (en) | Confidential information processing system and LSI | |
CN113282944B (en) | Intelligent lock unlocking method and device, electronic equipment and storage medium | |
CN113872770A (en) | Security verification method, system, electronic device and storage medium | |
KR100350931B1 (en) | Method for generating one-time password in a portable card | |
JP2007535250A (en) | Authentication of equipment outside the vehicle | |
WO2006046484A1 (en) | Authentication method | |
CN111612944A (en) | Intelligent lock and unlocking control method thereof | |
CN111523127B (en) | Authority authentication method and system for password equipment | |
CN111599043A (en) | Intelligent lock and encryption control method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |