CN111768523B - CTID-based NFC intelligent door lock unlocking method, system, equipment and medium - Google Patents
CTID-based NFC intelligent door lock unlocking method, system, equipment and medium Download PDFInfo
- Publication number
- CN111768523B CN111768523B CN202010521112.7A CN202010521112A CN111768523B CN 111768523 B CN111768523 B CN 111768523B CN 202010521112 A CN202010521112 A CN 202010521112A CN 111768523 B CN111768523 B CN 111768523B
- Authority
- CN
- China
- Prior art keywords
- nfc
- ctid
- key
- door lock
- intelligent door
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 238000012795 verification Methods 0.000 claims abstract description 19
- 238000004590 computer program Methods 0.000 claims description 15
- 230000008569 process Effects 0.000 claims description 7
- 238000010586 diagram Methods 0.000 description 11
- 230000006870 function Effects 0.000 description 5
- 238000012545 processing Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/23—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder by means of a password
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/073—Special arrangements for circuits, e.g. for protecting identification code in memory
- G06K19/07309—Means for preventing undesired reading or writing from or onto record carriers
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00857—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
-
- H04B5/72—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
Abstract
The invention provides a CTID-based NFC intelligent door lock unlocking method, system, equipment and medium in the technical field of door locks, wherein the method comprises the following steps: step S10, creating a key A, a key B and a key C; step S20, acquiring the permission of writing data in the NFC access card by using the secret key A, erasing the data of the NFC access card by using the secret key B, and creating an application directory on the NFC access card; step S30, the intelligent door lock acquires and stores the BID value of the user and the UUID of the NFC access card, the UUID and the key C are encrypted by an encryption algorithm to generate a key D which is stored in an application directory, and the application directory is encrypted by the encryption algorithm; step S40, encrypting the UUID and the BID value by using the secret key D to generate encrypted identity data and storing the encrypted identity data in the NFC access card; and step S50, carrying out identity verification on the encrypted identity data of the NFC access card by using the encryption algorithm, the UUID and the BID value, and then unlocking. The invention has the advantages that: the unlocking method has the advantages that the unlocking is realized after the identity authentication is carried out on the user who cannot show the two-dimensional code on the premise of ensuring the safety.
Description
Technical Field
The invention relates to the technical field of door locks, in particular to a CTID-based NFC intelligent door lock unlocking method, system, equipment and medium.
Background
The CTID (network certificate) is a network identity authentication certificate, is an electronic encryption file issued by a public security organization for promoting social administration and police affair convenience and depends on the Internet and a credible identity authentication platform; the identification card of citizen and portrait are authenticated by CTID center (credible identity authentication platform) to generate unique BID value (individual unique identification) for identifying user identity. Similar to a public rental house and a hotel, the CTID intelligent door lock can be installed, a user can unlock the CTID intelligent door lock after identity authentication is carried out on a two-dimensional code or a bar code with BID value as the display content through a mobile phone, namely, the tenant is tracked and managed through the CTID, and house and person verification is realized.
However, not everyone has a mobile phone, and not every mobile phone can both show the two-dimensional code, for example, children do not have a mobile phone, and the old man machine for old people only has the function of making and receiving calls, and can not show the two-dimensional code, so that the identity authentication can not be carried out on the crowd of this type.
Therefore, how to provide a CTID-based NFC intelligent door lock unlocking method, system, device and medium to realize unlocking after authenticating the identity of a user who cannot present a two-dimensional code on the premise of ensuring security becomes a problem to be solved urgently.
Disclosure of Invention
The technical problem to be solved by the invention is to provide a CTID-based NFC intelligent door lock unlocking method, system, equipment and medium, so that the unlocking is realized after the identity authentication is carried out on the user who cannot show the two-dimensional code on the premise of ensuring the safety.
In a first aspect, the invention provides a CTID-based NFC intelligent door lock unlocking method, which comprises the following steps:
step S10, a key A, a key B and a key C are created on the NFC access card through the CTID intelligent door lock; the key A is used for acquiring the permission of writing data in the NFC access card, and the key B is used for acquiring the permission of erasing the data of the NFC access card;
step S20, after the CTID intelligent door lock is connected with the NFC entrance guard card through NFC, the CTID intelligent door lock obtains the permission of writing data in the NFC entrance guard card through the secret key A, the NFC entrance guard card data is erased through the secret key B, and an application directory is created on the NFC entrance guard card;
step S30, the CTID intelligent door lock obtains and stores the BID value of the user and the UUID of the NFC access control card, the UUID and the secret key C are encrypted by an encryption algorithm to generate a secret key D which is stored in an application directory, and the application directory is encrypted by the encryption algorithm;
step S40, the CTID intelligent door lock utilizes the secret key D to encrypt the UUID and the BID value to generate encrypted identity data and stores the encrypted identity data on the NFC access card;
and step S50, the CTID intelligent door lock performs identity verification on the encrypted identity data of the NFC access control card by using the encryption algorithm, the UUID and the BID value and then unlocks.
Further, the key a, the key B, the key C, and the key D are all symmetric keys or asymmetric keys.
Further, in the step S30, the encryption algorithm is a hash algorithm, a symmetric encryption algorithm, or an asymmetric encryption algorithm.
Further, the step S50 specifically includes:
step S51, after the CTID intelligent door lock and the NFC access card are connected through NFC, the encryption algorithm is used for decrypting the application directory to obtain a secret key D;
step S52, the CTID intelligent door lock decrypts encrypted identity data stored on the NFC access control card by using the secret key D to obtain a UUID and a BID value;
step S53, comparing the UUID and the BID obtained by decryption from the NFC access control card with the locally stored UUID and BID values, if so, passing the identity verification and unlocking; if not, the identity authentication is not passed, and the process is ended.
In a second aspect, the invention provides a CTID-based NFC intelligent door lock unlocking system, which includes the following modules:
the key creating module is used for creating a key A, a key B and a key C on the NFC access card through the CTID intelligent door lock; the secret key A is used for acquiring the permission of writing data in the NFC access card, and the secret key B is used for acquiring the permission of erasing the data of the NFC access card;
the NFC entrance guard card initialization module is used for acquiring the permission of writing data in the NFC entrance guard card by the CTID intelligent door lock through the secret key A, erasing the NFC entrance guard card data through the secret key B and creating an application directory on the NFC entrance guard card after the CTID intelligent door lock is connected with the NFC entrance guard card through NFC;
the key D generation module is used for acquiring a BID value of a user and a UUID of an NFC access control card by the CTID intelligent door lock, storing the BID value and the UUID, encrypting the UUID and the key C by using an encryption algorithm to generate a key D, storing the key D in an application directory, and encrypting the application directory by using the encryption algorithm;
the encrypted identity data generation module is used for generating encrypted identity data by the CTID intelligent door lock by utilizing the secret key D to encrypt the UUID and the BID value and storing the encrypted identity data on the NFC access card;
and the unlocking module is used for unlocking the CTID intelligent door lock after the encrypted identity data of the NFC access control card is subjected to identity verification by utilizing the encryption algorithm, the UUID and the BID value.
Further, the key a, the key B, the key C, and the key D are all symmetric keys or asymmetric keys.
Further, in the key D generation module, the encryption algorithm is a hash algorithm, a symmetric encryption algorithm, or an asymmetric encryption algorithm.
Further, the unlocking module specifically includes:
the secret key D obtaining unit is used for decrypting the application directory by using the encryption algorithm to obtain a secret key D after the CTID intelligent door lock is in NFC connection with the NFC access card;
the encrypted identity data decryption unit is used for decrypting the encrypted identity data stored on the NFC access control card by the CTID intelligent door lock through the secret key D to obtain a UUID and a BID value;
the identity verification unit is used for comparing whether the UUID and BID values obtained by decryption from the NFC access card are equal to the locally stored UUID and BID values or not by the CTID intelligent door lock, if yes, the identity verification is passed, and the lock is unlocked; if not, the identity authentication is not passed, and the process is ended.
In a third aspect, the present invention provides a CTID-based NFC intelligent door lock unlocking device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the method according to the first aspect when executing the program.
In a fourth aspect, the present invention provides a CTID-based NFC smart door lock unlocking medium, on which a computer program is stored, which when executed by a processor implements the method of the first aspect.
One or more technical solutions provided in the embodiments of the present invention have at least the following technical effects or advantages:
the method comprises the steps that a secret key A and a secret key B are created and are respectively used for obtaining the permission of writing data in the NFC entrance guard card and the permission of erasing the data of the NFC entrance guard card, double protection is added to the NFC entrance guard card, and the operations of writing data and clearing data cannot be carried out without the secret keys; the secret key D is generated by using the UUID of the NFC access cards and the secret key C pre-established by the CTID intelligent door lock, the secret key D of each NFC access card is different due to the uniqueness of the UUID, the UUID and the BID are encrypted by using the secret key D to generate encrypted identity data, namely, the UUID and the BID are bound and encrypted by using the unique secret key D, so that the safety of the encrypted identity data is greatly improved, and the data of the NFC access cards are prevented from being copied and cracked; after the user who can't show the two-dimensional code passes through NFC entrance guard card and is connected with CTID intelligent door lock establishment, CTID intelligent door lock can utilize encryption algorithm to read the BID value of saving in the NFC entrance guard card and carry out authentication and judge whether unblank, realizes promptly under the prerequisite of guaranteeing the security, unblanks after carrying out authentication to the user who can't show the two-dimensional code.
The above description is only an overview of the technical solutions of the present invention, and the present invention can be implemented in accordance with the content of the description so as to make the technical means of the present invention more clearly understood, and the above and other objects, features, and advantages of the present invention will be more clearly understood.
Drawings
The invention will be further described with reference to the following examples and figures.
Fig. 1 is a flow chart of an NFC intelligent door lock unlocking method based on CTID of the present invention.
Fig. 2 is a schematic structural diagram of an NFC intelligent door lock unlocking system based on CTID.
Fig. 3 is a schematic structural diagram of an NFC intelligent door lock unlocking device based on CTID.
Fig. 4 is a schematic structural diagram of an NFC intelligent door lock unlocking medium based on CTID.
Detailed Description
The NFC intelligent door lock unlocking method, the NFC intelligent door lock unlocking system, the NFC intelligent door lock unlocking equipment and the NFC intelligent door lock unlocking medium based on the CTID realize unlocking after identity authentication of a user incapable of displaying a two-dimensional code on the premise of ensuring safety.
The technical scheme in the embodiment of the application has the following general idea: writing a BID value of a user in the NFC entrance guard card for authenticating and unlocking the intelligent door lock; the key A and the key B are respectively created to acquire the permission for writing data in the NFC access card and the permission for erasing the data of the NFC access card, so that the safety of the NFC access card is improved, and the data of the NFC access card is prevented from being tampered; the unique secret key D is generated through the UUID of the NFC access control card and the secret key C pre-created by the intelligent door lock, the UUID and the BID are encrypted by the secret key D to generate encrypted identity data, namely the UUID and the BID are bound, one card is encrypted, the data of the NFC access control card are prevented from being copied and cracked, and the data security is improved.
Example one
The embodiment provides a CTID-based NFC intelligent door lock unlocking method, as shown in fig. 1, including the following steps:
step S10, a key A, a key B and a key C are created on the NFC entrance guard card through the CTID intelligent door lock; the secret key A is used for acquiring the permission of writing data in the NFC access card, and the secret key B is used for acquiring the permission of erasing the data of the NFC access card; the CTID intelligent door lock is provided with an NFC card reader for reading data of an NFC access control card, and a wireless communication module for acquiring a BID value of a user from a server;
step S20, after the CTID intelligent door lock is connected with the NFC entrance guard card through NFC, the CTID intelligent door lock acquires the permission of writing data in the NFC entrance guard card through the secret key A, erases data of the NFC entrance guard card through the secret key B, and creates an application directory on the NFC entrance guard card;
step S30, the CTID intelligent door lock acquires and stores the BID value of the user and the UUID (universal unique identification code) of the NFC access card, encrypts the UUID and the key C by using an encryption algorithm to generate a key D and stores the key D in an application directory, and encrypts the application directory by using the encryption algorithm; the UUID is the serial number of the NFC access control card and has uniqueness; the secret key D is stored in the encrypted application directory, so that the secret leakage caused by direct reading of the secret key D is prevented, the safety of the NFC access card is greatly improved, and the safety of the BID value of a user is ensured;
step S40, the CTID intelligent door lock utilizes the secret key D to encrypt UUID and BID value to generate encrypted identity data and stores the encrypted identity data on an NFC access card;
and step S50, the CTID intelligent door lock performs identity verification on the encrypted identity data of the NFC access control card by using the encryption algorithm, the UUID and the BID value and then unlocks, and if the identity verification fails, the CTID intelligent door lock does not unlock.
The key A, the key B, the key C and the key D are all symmetric keys or asymmetric keys.
In step S30, the encryption algorithm is a hash algorithm, a symmetric encryption algorithm, or an asymmetric encryption algorithm, and for example, 3DES may be used for encryption.
The step S50 specifically includes:
step S51, after the CTID intelligent door lock is connected with the NFC access card through NFC, the encryption algorithm is used for decrypting the application directory to obtain a secret key D;
step S52, the CTID intelligent door lock decrypts encrypted identity data stored on the NFC access control card by using the secret key D to obtain a UUID and a BID value;
step S53, comparing the UUID and the BID obtained by decryption from the NFC access control card with the locally stored UUID and BID values, if so, passing the identity verification and unlocking; if not, the identity authentication is not passed, and the process is ended.
Example two
This embodiment provides a NFC intelligence lock system of unblanking based on CTID, as shown in fig. 2, including following module:
the key creating module is used for creating a key A, a key B and a key C on the NFC access card through the CTID intelligent door lock; the secret key A is used for acquiring the permission of writing data in the NFC access card, and the secret key B is used for acquiring the permission of erasing the data of the NFC access card; the CTID intelligent door lock is provided with an NFC card reader for recognizing data of an NFC access control card, and a wireless communication module for acquiring a BID value of a user from a server;
the NFC entrance guard card initialization module is used for acquiring the permission of writing data in the NFC entrance guard card by the CTID intelligent door lock through the secret key A, erasing the NFC entrance guard card data through the secret key B and creating an application directory on the NFC entrance guard card after the CTID intelligent door lock is connected with the NFC entrance guard card through NFC;
the key D generation module is used for acquiring a BID value of a user and a UUID (universal unique identification code) of an NFC access card by the CTID intelligent door lock, storing the BID value and the UUID, generating a key D by utilizing an encryption algorithm and a key C, storing the key D in an application directory, and encrypting the application directory by utilizing the encryption algorithm; the UUID is the serial number of the NFC access control card and has uniqueness; the secret key D is stored in the encrypted application directory, so that the secret leakage caused by direct reading of the secret key D is prevented, the safety of the NFC access card is greatly improved, and the safety of the BID value of a user is ensured;
the encrypted identity data generation module is used for generating encrypted identity data by the CTID intelligent door lock by utilizing the secret key D to encrypt the UUID and the BID value and storing the encrypted identity data on the NFC access card;
and the unlocking module is used for unlocking after the CTID intelligent door lock performs identity verification on the encrypted identity data of the NFC access control card by utilizing the encryption algorithm, the UUID and the BID value, and unlocking if the identity verification fails.
The key A, the key B, the key C and the key D are all symmetric keys or asymmetric keys.
In the key D generation module, the encryption algorithm is a hash algorithm, a symmetric encryption algorithm, or an asymmetric encryption algorithm, and for example, 3DES may be used for encryption.
The unlocking module specifically comprises:
the secret key D obtaining unit is used for decrypting the application directory by using the encryption algorithm to obtain a secret key D after the CTID intelligent door lock is in NFC connection with the NFC access card;
the encrypted identity data decryption unit is used for decrypting the encrypted identity data stored on the NFC access control card by the CTID intelligent door lock through the secret key D to obtain a UUID and a BID value;
the identity verification unit is used for comparing whether the UUID and the BID values obtained by decryption on the NFC access control card are equal to the locally stored UUID and BID values or not by the CTID intelligent door lock, and if yes, passing the identity verification and unlocking; if not, the identity authentication is not passed, and the process is ended.
Based on the same inventive concept, the application also provides equipment corresponding to the method in the first embodiment, which is detailed in the third embodiment.
EXAMPLE III
The embodiment provides a CTID-based NFC intelligent door lock unlocking device, as shown in fig. 3, which includes a memory, a processor, and a computer program stored in the memory and capable of running on the processor, and when the processor executes the computer program, any one of the embodiments may be implemented.
Since the apparatus described in this embodiment is an apparatus used for implementing the method in the first embodiment of the present application, a person skilled in the art can understand the specific implementation manner of the apparatus in this embodiment and various variations thereof based on the method described in the first embodiment of the present application, and therefore, a detailed description of how to implement the method in the embodiment of the present application by the apparatus is not provided herein. The equipment used by those skilled in the art to implement the methods in the embodiments of the present application is within the scope of the present application.
Based on the same inventive concept, the application also provides a medium corresponding to the method in the first embodiment, which is detailed in the fourth embodiment.
Example four
The present embodiment provides a CTID-based NFC smart door lock unlocking medium, as shown in fig. 4, where a computer program is stored on the NFC smart door lock unlocking medium, and when the computer program is executed by a processor, any one of the embodiments in the first embodiment may be implemented.
The technical scheme provided in the embodiment of the application at least has the following technical effects or advantages:
the method comprises the steps that a secret key A and a secret key B are created and are respectively used for obtaining the permission of writing data in the NFC entrance guard card and the permission of erasing the data of the NFC entrance guard card, double protection is added to the NFC entrance guard card, and the operations of writing data and clearing data cannot be carried out without the secret keys; the secret key D is generated by using the UUID of the NFC access cards and the secret key C pre-established by the CTID intelligent door lock, the secret key D of each NFC access card is different due to the uniqueness of the UUID, the UUID and the BID are encrypted by using the secret key D to generate encrypted identity data, namely, the UUID and the BID are bound and encrypted by using the unique secret key D, so that the safety of the encrypted identity data is greatly improved, and the data of the NFC access cards are prevented from being copied and cracked; after the user who can't show the two-dimensional code passes through NFC entrance guard card and is connected with CTID intelligent door lock establishment, CTID intelligent door lock can utilize encryption algorithm to read the BID value of saving in the NFC entrance guard card and carry out authentication and judge whether unblank, realizes promptly under the prerequisite of guaranteeing the security, unblanks after carrying out authentication to the user who can't show the two-dimensional code.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention has been described with reference to flowchart illustrations and/or block diagrams of apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
Claims (4)
1. A CTID-based NFC intelligent door lock unlocking method is characterized by comprising the following steps: the method comprises the following steps:
step S10, a key A, a key B and a key C are created on the NFC access card through the CTID intelligent door lock; the secret key A is used for acquiring the permission of writing data in the NFC access card, and the secret key B is used for acquiring the permission of erasing the data of the NFC access card;
step S20, after the CTID intelligent door lock is connected with the NFC entrance guard card through NFC, the CTID intelligent door lock obtains the permission of writing data in the NFC entrance guard card through the secret key A, the NFC entrance guard card data is erased through the secret key B, and an application directory is created on the NFC entrance guard card;
step S30, the CTID intelligent door lock obtains and stores the BID value of the user and the UUID of the NFC access control card, the UUID and the secret key C are encrypted by an encryption algorithm to generate a secret key D which is stored in an application directory, and the application directory is encrypted by the encryption algorithm; the secret key A, the secret key B, the secret key C and the secret key D are all symmetric secret keys or asymmetric secret keys; the encryption algorithm is a Hash algorithm, a symmetric encryption algorithm or an asymmetric encryption algorithm;
step S40, the CTID intelligent door lock utilizes the secret key D to encrypt the UUID and the BID value to generate encrypted identity data and stores the encrypted identity data on the NFC access card;
step S50, the CTID intelligent door lock utilizes the encryption algorithm, the UUID and the BID value to carry out identity verification on the encrypted identity data of the NFC access card and then unlocks the door lock;
the step S50 specifically includes:
step S51, after the CTID intelligent door lock and the NFC access card are connected through NFC, the encryption algorithm is used for decrypting the application directory to obtain a secret key D;
step S52, the CTID intelligent door lock utilizes the secret key D to decrypt encrypted identity data stored on the NFC access control card to obtain a UUID and a BID value;
step S53, comparing the UUID and the BID obtained by decryption from the NFC access control card with the locally stored UUID and BID values, if so, passing the identity verification and unlocking; if not, the identity authentication is not passed, and the process is ended.
2. The utility model provides a NFC intelligence lock system of unblanking based on CTID which characterized in that: the system comprises the following modules:
the key creating module is used for creating a key A, a key B and a key C on the NFC access card through the CTID intelligent door lock; the secret key A is used for acquiring the permission of writing data in the NFC access card, and the secret key B is used for acquiring the permission of erasing the data of the NFC access card;
the NFC entrance guard card initialization module is used for acquiring the permission of writing data in the NFC entrance guard card by the CTID intelligent door lock through the secret key A, erasing the NFC entrance guard card data through the secret key B and creating an application directory on the NFC entrance guard card after the CTID intelligent door lock is connected with the NFC entrance guard card through NFC;
the key D generation module is used for acquiring a BID value of a user and a UUID of an NFC access control card by the CTID intelligent door lock, storing the BID value and the UUID, encrypting the UUID and the key C by using an encryption algorithm to generate a key D, storing the key D in an application directory, and encrypting the application directory by using the encryption algorithm; the key A, the key B, the key C and the key D are symmetric keys or asymmetric keys; the encryption algorithm is a Hash algorithm, a symmetric encryption algorithm or an asymmetric encryption algorithm;
the encrypted identity data generation module is used for generating encrypted identity data by the CTID intelligent door lock by utilizing the secret key D to encrypt the UUID and the BID value and storing the encrypted identity data in an NFC access card;
the unlocking module is used for unlocking the CTID intelligent door lock after carrying out identity verification on the encrypted identity data of the NFC access control card by utilizing the encryption algorithm, the UUID and the BID value;
the unlocking module specifically comprises:
the secret key D obtaining unit is used for decrypting the application directory by using the encryption algorithm to obtain a secret key D after the CTID intelligent door lock is in NFC connection with the NFC access card;
the encrypted identity data decryption unit is used for decrypting the encrypted identity data stored on the NFC access control card by the CTID intelligent door lock through the secret key D to obtain a UUID and a BID value;
the identity verification unit is used for comparing whether the UUID and the BID values obtained by decryption on the NFC access control card are equal to the locally stored UUID and BID values or not by the CTID intelligent door lock, and if yes, passing the identity verification and unlocking; if not, the identity authentication is not passed, and the process is ended.
3. A CTID-based NFC intelligent door lock unlocking device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method as claimed in claim 1 when executing the program.
4. A CTID-based NFC smart door lock unlocking medium having a computer program stored thereon, wherein the program, when executed by a processor, implements the method of claim 1.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010521112.7A CN111768523B (en) | 2020-06-10 | 2020-06-10 | CTID-based NFC intelligent door lock unlocking method, system, equipment and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010521112.7A CN111768523B (en) | 2020-06-10 | 2020-06-10 | CTID-based NFC intelligent door lock unlocking method, system, equipment and medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111768523A CN111768523A (en) | 2020-10-13 |
CN111768523B true CN111768523B (en) | 2022-07-26 |
Family
ID=72720471
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010521112.7A Active CN111768523B (en) | 2020-06-10 | 2020-06-10 | CTID-based NFC intelligent door lock unlocking method, system, equipment and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111768523B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112968791B (en) * | 2021-01-20 | 2022-08-05 | 福建新大陆通信科技股份有限公司 | CTID intelligent access control external usb network card communication method and system |
CN113487765A (en) * | 2021-06-08 | 2021-10-08 | 福建新大陆通信科技股份有限公司 | CTID (computer telephony integration) access control method and system supporting dynamic encryption |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104715528A (en) * | 2015-03-05 | 2015-06-17 | 福建新大陆通信科技股份有限公司 | Set top box-based household access control system |
CN108986278A (en) * | 2018-07-13 | 2018-12-11 | 深圳市欧瑞博科技有限公司 | A kind of intelligent door lock off-line cipher authorization method and authoring system |
CN110232762A (en) * | 2019-06-24 | 2019-09-13 | 沈阳泰格科技发展有限公司 | M1 card cabinet door electronic lock copy prevention method |
CN111091170A (en) * | 2019-12-16 | 2020-05-01 | 南京申宁达智能科技有限公司 | Site personnel management system and management method based on UWB positioning and millimeter wave imaging |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
IT1396333B1 (en) * | 2009-10-02 | 2012-11-16 | Silca Spa | METHOD OF DUPLICATION OF ELECTRONIC KEYS FOR CARS WITH MUTUAL AUTHENTICATION. |
CN105989645A (en) * | 2015-02-04 | 2016-10-05 | 鸿富锦精密工业(深圳)有限公司 | Intelligent power-free key, access-control unlocking system and access-control unlocking method thereof |
CN105989386B (en) * | 2015-02-28 | 2019-03-29 | 北京天威诚信电子商务服务有限公司 | A kind of method and apparatus for reading and writing radio frequency identification card |
FR3047369B1 (en) * | 2016-02-03 | 2019-06-21 | Icare Technologies | RING-TYPE RADIO FREQUENCY IDENTIFICATION DEVICE HAVING A SYSTEM FOR DETERIORATING PERSONAL DATA IN THE EVENT OF LOSS OR THEFT |
CN107679604A (en) * | 2017-10-16 | 2018-02-09 | 厦门盈趣科技股份有限公司 | A kind of identification card and RF system |
CN108228211B (en) * | 2017-12-15 | 2021-05-25 | 中国移动通信集团江苏有限公司 | Smart card, and method and system for safely updating data of smart card |
CN110708164B (en) * | 2019-09-25 | 2022-03-04 | 青岛海尔科技有限公司 | Control method and device for Internet of things equipment, storage medium and electronic device |
-
2020
- 2020-06-10 CN CN202010521112.7A patent/CN111768523B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104715528A (en) * | 2015-03-05 | 2015-06-17 | 福建新大陆通信科技股份有限公司 | Set top box-based household access control system |
CN108986278A (en) * | 2018-07-13 | 2018-12-11 | 深圳市欧瑞博科技有限公司 | A kind of intelligent door lock off-line cipher authorization method and authoring system |
CN110232762A (en) * | 2019-06-24 | 2019-09-13 | 沈阳泰格科技发展有限公司 | M1 card cabinet door electronic lock copy prevention method |
CN111091170A (en) * | 2019-12-16 | 2020-05-01 | 南京申宁达智能科技有限公司 | Site personnel management system and management method based on UWB positioning and millimeter wave imaging |
Also Published As
Publication number | Publication date |
---|---|
CN111768523A (en) | 2020-10-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111768522B (en) | CTID-based intelligent door lock unlocking method and system | |
CN100533459C (en) | Data safety reading method and safety storage apparatus thereof | |
CN112232814B (en) | Encryption and decryption methods of payment key, payment authentication method and terminal equipment | |
CN102136048A (en) | Mobile phone Bluetooth-based ambient intelligent computer protection device and method | |
GB2498039A (en) | Enabling a user to secure and back-up an encryption key | |
KR101724401B1 (en) | Certification System for Using Biometrics and Certification Method for Using Key Sharing and Recording medium Storing a Program to Implement the Method | |
CN105429761A (en) | Key generation method and device | |
CN106953732B (en) | Key management system and method for chip card | |
CN113282944B (en) | Intelligent lock unlocking method and device, electronic equipment and storage medium | |
CN112565265B (en) | Authentication method, authentication system and communication method between terminal devices of Internet of things | |
CN103345601A (en) | Identity recording and verification system based on radio frequency | |
CN106936588A (en) | A kind of trustship method, the apparatus and system of hardware controls lock | |
CN111768523B (en) | CTID-based NFC intelligent door lock unlocking method, system, equipment and medium | |
EP2628133A1 (en) | Authenticate a fingerprint image | |
CN110138548A (en) | Based on unsymmetrical key pond to and DH agreement quantum communications service station cryptographic key negotiation method and system | |
CN112039665A (en) | Key management method and device | |
TWI476629B (en) | Data security and security systems and methods | |
Chen et al. | A novel DRM scheme for accommodating expectations of personal use | |
CN1953366B (en) | Password management method and system for intelligent secret key device | |
CN113761488A (en) | Content network copyright tracing encryption system and encryption method | |
JP2005293490A (en) | Biometrics system | |
Cavoukian et al. | Keynote paper: Biometric encryption: Technology for strong authentication, security and privacy | |
KR100720738B1 (en) | A method for providing secrecy, authentication and integrity of information to RFID tag | |
KR101809976B1 (en) | A method for security certification generating authentication key combinating multi-user element | |
CN111815821B (en) | IC card security algorithm applied to intelligent door lock |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20221221 Address after: 603, Floor 6, Building 30 #, Fuzhou Software Park Phase I (Strait Park), No. 89, Software Avenue, Wufeng Street, Gulou District, Fuzhou City, 350000, Fujian Province Patentee after: Fujian New World Huichuang Technology Co.,Ltd. Address before: 6 # Building and 2 to 4 # Building of 5 # Building, No. 70, Rujiang East Road, Mawei Development Zone, Fuzhou City, Fujian Province, 350000 Patentee before: Fujian Newland Communication Science Technologies Co.,Ltd. |