CN111768523B - CTID-based NFC intelligent door lock unlocking method, system, equipment and medium - Google Patents

CTID-based NFC intelligent door lock unlocking method, system, equipment and medium Download PDF

Info

Publication number
CN111768523B
CN111768523B CN202010521112.7A CN202010521112A CN111768523B CN 111768523 B CN111768523 B CN 111768523B CN 202010521112 A CN202010521112 A CN 202010521112A CN 111768523 B CN111768523 B CN 111768523B
Authority
CN
China
Prior art keywords
nfc
ctid
key
door lock
intelligent door
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010521112.7A
Other languages
Chinese (zh)
Other versions
CN111768523A (en
Inventor
吴太亮
郑宇�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian New World Huichuang Technology Co ltd
Original Assignee
Fujian Newland Communication Science Technologies Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Newland Communication Science Technologies Co ltd filed Critical Fujian Newland Communication Science Technologies Co ltd
Priority to CN202010521112.7A priority Critical patent/CN111768523B/en
Publication of CN111768523A publication Critical patent/CN111768523A/en
Application granted granted Critical
Publication of CN111768523B publication Critical patent/CN111768523B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/23Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder by means of a password
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • G06K19/07309Means for preventing undesired reading or writing from or onto record carriers
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00857Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
    • H04B5/72
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Abstract

The invention provides a CTID-based NFC intelligent door lock unlocking method, system, equipment and medium in the technical field of door locks, wherein the method comprises the following steps: step S10, creating a key A, a key B and a key C; step S20, acquiring the permission of writing data in the NFC access card by using the secret key A, erasing the data of the NFC access card by using the secret key B, and creating an application directory on the NFC access card; step S30, the intelligent door lock acquires and stores the BID value of the user and the UUID of the NFC access card, the UUID and the key C are encrypted by an encryption algorithm to generate a key D which is stored in an application directory, and the application directory is encrypted by the encryption algorithm; step S40, encrypting the UUID and the BID value by using the secret key D to generate encrypted identity data and storing the encrypted identity data in the NFC access card; and step S50, carrying out identity verification on the encrypted identity data of the NFC access card by using the encryption algorithm, the UUID and the BID value, and then unlocking. The invention has the advantages that: the unlocking method has the advantages that the unlocking is realized after the identity authentication is carried out on the user who cannot show the two-dimensional code on the premise of ensuring the safety.

Description

CTID-based NFC intelligent door lock unlocking method, system, equipment and medium
Technical Field
The invention relates to the technical field of door locks, in particular to a CTID-based NFC intelligent door lock unlocking method, system, equipment and medium.
Background
The CTID (network certificate) is a network identity authentication certificate, is an electronic encryption file issued by a public security organization for promoting social administration and police affair convenience and depends on the Internet and a credible identity authentication platform; the identification card of citizen and portrait are authenticated by CTID center (credible identity authentication platform) to generate unique BID value (individual unique identification) for identifying user identity. Similar to a public rental house and a hotel, the CTID intelligent door lock can be installed, a user can unlock the CTID intelligent door lock after identity authentication is carried out on a two-dimensional code or a bar code with BID value as the display content through a mobile phone, namely, the tenant is tracked and managed through the CTID, and house and person verification is realized.
However, not everyone has a mobile phone, and not every mobile phone can both show the two-dimensional code, for example, children do not have a mobile phone, and the old man machine for old people only has the function of making and receiving calls, and can not show the two-dimensional code, so that the identity authentication can not be carried out on the crowd of this type.
Therefore, how to provide a CTID-based NFC intelligent door lock unlocking method, system, device and medium to realize unlocking after authenticating the identity of a user who cannot present a two-dimensional code on the premise of ensuring security becomes a problem to be solved urgently.
Disclosure of Invention
The technical problem to be solved by the invention is to provide a CTID-based NFC intelligent door lock unlocking method, system, equipment and medium, so that the unlocking is realized after the identity authentication is carried out on the user who cannot show the two-dimensional code on the premise of ensuring the safety.
In a first aspect, the invention provides a CTID-based NFC intelligent door lock unlocking method, which comprises the following steps:
step S10, a key A, a key B and a key C are created on the NFC access card through the CTID intelligent door lock; the key A is used for acquiring the permission of writing data in the NFC access card, and the key B is used for acquiring the permission of erasing the data of the NFC access card;
step S20, after the CTID intelligent door lock is connected with the NFC entrance guard card through NFC, the CTID intelligent door lock obtains the permission of writing data in the NFC entrance guard card through the secret key A, the NFC entrance guard card data is erased through the secret key B, and an application directory is created on the NFC entrance guard card;
step S30, the CTID intelligent door lock obtains and stores the BID value of the user and the UUID of the NFC access control card, the UUID and the secret key C are encrypted by an encryption algorithm to generate a secret key D which is stored in an application directory, and the application directory is encrypted by the encryption algorithm;
step S40, the CTID intelligent door lock utilizes the secret key D to encrypt the UUID and the BID value to generate encrypted identity data and stores the encrypted identity data on the NFC access card;
and step S50, the CTID intelligent door lock performs identity verification on the encrypted identity data of the NFC access control card by using the encryption algorithm, the UUID and the BID value and then unlocks.
Further, the key a, the key B, the key C, and the key D are all symmetric keys or asymmetric keys.
Further, in the step S30, the encryption algorithm is a hash algorithm, a symmetric encryption algorithm, or an asymmetric encryption algorithm.
Further, the step S50 specifically includes:
step S51, after the CTID intelligent door lock and the NFC access card are connected through NFC, the encryption algorithm is used for decrypting the application directory to obtain a secret key D;
step S52, the CTID intelligent door lock decrypts encrypted identity data stored on the NFC access control card by using the secret key D to obtain a UUID and a BID value;
step S53, comparing the UUID and the BID obtained by decryption from the NFC access control card with the locally stored UUID and BID values, if so, passing the identity verification and unlocking; if not, the identity authentication is not passed, and the process is ended.
In a second aspect, the invention provides a CTID-based NFC intelligent door lock unlocking system, which includes the following modules:
the key creating module is used for creating a key A, a key B and a key C on the NFC access card through the CTID intelligent door lock; the secret key A is used for acquiring the permission of writing data in the NFC access card, and the secret key B is used for acquiring the permission of erasing the data of the NFC access card;
the NFC entrance guard card initialization module is used for acquiring the permission of writing data in the NFC entrance guard card by the CTID intelligent door lock through the secret key A, erasing the NFC entrance guard card data through the secret key B and creating an application directory on the NFC entrance guard card after the CTID intelligent door lock is connected with the NFC entrance guard card through NFC;
the key D generation module is used for acquiring a BID value of a user and a UUID of an NFC access control card by the CTID intelligent door lock, storing the BID value and the UUID, encrypting the UUID and the key C by using an encryption algorithm to generate a key D, storing the key D in an application directory, and encrypting the application directory by using the encryption algorithm;
the encrypted identity data generation module is used for generating encrypted identity data by the CTID intelligent door lock by utilizing the secret key D to encrypt the UUID and the BID value and storing the encrypted identity data on the NFC access card;
and the unlocking module is used for unlocking the CTID intelligent door lock after the encrypted identity data of the NFC access control card is subjected to identity verification by utilizing the encryption algorithm, the UUID and the BID value.
Further, the key a, the key B, the key C, and the key D are all symmetric keys or asymmetric keys.
Further, in the key D generation module, the encryption algorithm is a hash algorithm, a symmetric encryption algorithm, or an asymmetric encryption algorithm.
Further, the unlocking module specifically includes:
the secret key D obtaining unit is used for decrypting the application directory by using the encryption algorithm to obtain a secret key D after the CTID intelligent door lock is in NFC connection with the NFC access card;
the encrypted identity data decryption unit is used for decrypting the encrypted identity data stored on the NFC access control card by the CTID intelligent door lock through the secret key D to obtain a UUID and a BID value;
the identity verification unit is used for comparing whether the UUID and BID values obtained by decryption from the NFC access card are equal to the locally stored UUID and BID values or not by the CTID intelligent door lock, if yes, the identity verification is passed, and the lock is unlocked; if not, the identity authentication is not passed, and the process is ended.
In a third aspect, the present invention provides a CTID-based NFC intelligent door lock unlocking device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the method according to the first aspect when executing the program.
In a fourth aspect, the present invention provides a CTID-based NFC smart door lock unlocking medium, on which a computer program is stored, which when executed by a processor implements the method of the first aspect.
One or more technical solutions provided in the embodiments of the present invention have at least the following technical effects or advantages:
the method comprises the steps that a secret key A and a secret key B are created and are respectively used for obtaining the permission of writing data in the NFC entrance guard card and the permission of erasing the data of the NFC entrance guard card, double protection is added to the NFC entrance guard card, and the operations of writing data and clearing data cannot be carried out without the secret keys; the secret key D is generated by using the UUID of the NFC access cards and the secret key C pre-established by the CTID intelligent door lock, the secret key D of each NFC access card is different due to the uniqueness of the UUID, the UUID and the BID are encrypted by using the secret key D to generate encrypted identity data, namely, the UUID and the BID are bound and encrypted by using the unique secret key D, so that the safety of the encrypted identity data is greatly improved, and the data of the NFC access cards are prevented from being copied and cracked; after the user who can't show the two-dimensional code passes through NFC entrance guard card and is connected with CTID intelligent door lock establishment, CTID intelligent door lock can utilize encryption algorithm to read the BID value of saving in the NFC entrance guard card and carry out authentication and judge whether unblank, realizes promptly under the prerequisite of guaranteeing the security, unblanks after carrying out authentication to the user who can't show the two-dimensional code.
The above description is only an overview of the technical solutions of the present invention, and the present invention can be implemented in accordance with the content of the description so as to make the technical means of the present invention more clearly understood, and the above and other objects, features, and advantages of the present invention will be more clearly understood.
Drawings
The invention will be further described with reference to the following examples and figures.
Fig. 1 is a flow chart of an NFC intelligent door lock unlocking method based on CTID of the present invention.
Fig. 2 is a schematic structural diagram of an NFC intelligent door lock unlocking system based on CTID.
Fig. 3 is a schematic structural diagram of an NFC intelligent door lock unlocking device based on CTID.
Fig. 4 is a schematic structural diagram of an NFC intelligent door lock unlocking medium based on CTID.
Detailed Description
The NFC intelligent door lock unlocking method, the NFC intelligent door lock unlocking system, the NFC intelligent door lock unlocking equipment and the NFC intelligent door lock unlocking medium based on the CTID realize unlocking after identity authentication of a user incapable of displaying a two-dimensional code on the premise of ensuring safety.
The technical scheme in the embodiment of the application has the following general idea: writing a BID value of a user in the NFC entrance guard card for authenticating and unlocking the intelligent door lock; the key A and the key B are respectively created to acquire the permission for writing data in the NFC access card and the permission for erasing the data of the NFC access card, so that the safety of the NFC access card is improved, and the data of the NFC access card is prevented from being tampered; the unique secret key D is generated through the UUID of the NFC access control card and the secret key C pre-created by the intelligent door lock, the UUID and the BID are encrypted by the secret key D to generate encrypted identity data, namely the UUID and the BID are bound, one card is encrypted, the data of the NFC access control card are prevented from being copied and cracked, and the data security is improved.
Example one
The embodiment provides a CTID-based NFC intelligent door lock unlocking method, as shown in fig. 1, including the following steps:
step S10, a key A, a key B and a key C are created on the NFC entrance guard card through the CTID intelligent door lock; the secret key A is used for acquiring the permission of writing data in the NFC access card, and the secret key B is used for acquiring the permission of erasing the data of the NFC access card; the CTID intelligent door lock is provided with an NFC card reader for reading data of an NFC access control card, and a wireless communication module for acquiring a BID value of a user from a server;
step S20, after the CTID intelligent door lock is connected with the NFC entrance guard card through NFC, the CTID intelligent door lock acquires the permission of writing data in the NFC entrance guard card through the secret key A, erases data of the NFC entrance guard card through the secret key B, and creates an application directory on the NFC entrance guard card;
step S30, the CTID intelligent door lock acquires and stores the BID value of the user and the UUID (universal unique identification code) of the NFC access card, encrypts the UUID and the key C by using an encryption algorithm to generate a key D and stores the key D in an application directory, and encrypts the application directory by using the encryption algorithm; the UUID is the serial number of the NFC access control card and has uniqueness; the secret key D is stored in the encrypted application directory, so that the secret leakage caused by direct reading of the secret key D is prevented, the safety of the NFC access card is greatly improved, and the safety of the BID value of a user is ensured;
step S40, the CTID intelligent door lock utilizes the secret key D to encrypt UUID and BID value to generate encrypted identity data and stores the encrypted identity data on an NFC access card;
and step S50, the CTID intelligent door lock performs identity verification on the encrypted identity data of the NFC access control card by using the encryption algorithm, the UUID and the BID value and then unlocks, and if the identity verification fails, the CTID intelligent door lock does not unlock.
The key A, the key B, the key C and the key D are all symmetric keys or asymmetric keys.
In step S30, the encryption algorithm is a hash algorithm, a symmetric encryption algorithm, or an asymmetric encryption algorithm, and for example, 3DES may be used for encryption.
The step S50 specifically includes:
step S51, after the CTID intelligent door lock is connected with the NFC access card through NFC, the encryption algorithm is used for decrypting the application directory to obtain a secret key D;
step S52, the CTID intelligent door lock decrypts encrypted identity data stored on the NFC access control card by using the secret key D to obtain a UUID and a BID value;
step S53, comparing the UUID and the BID obtained by decryption from the NFC access control card with the locally stored UUID and BID values, if so, passing the identity verification and unlocking; if not, the identity authentication is not passed, and the process is ended.
Example two
This embodiment provides a NFC intelligence lock system of unblanking based on CTID, as shown in fig. 2, including following module:
the key creating module is used for creating a key A, a key B and a key C on the NFC access card through the CTID intelligent door lock; the secret key A is used for acquiring the permission of writing data in the NFC access card, and the secret key B is used for acquiring the permission of erasing the data of the NFC access card; the CTID intelligent door lock is provided with an NFC card reader for recognizing data of an NFC access control card, and a wireless communication module for acquiring a BID value of a user from a server;
the NFC entrance guard card initialization module is used for acquiring the permission of writing data in the NFC entrance guard card by the CTID intelligent door lock through the secret key A, erasing the NFC entrance guard card data through the secret key B and creating an application directory on the NFC entrance guard card after the CTID intelligent door lock is connected with the NFC entrance guard card through NFC;
the key D generation module is used for acquiring a BID value of a user and a UUID (universal unique identification code) of an NFC access card by the CTID intelligent door lock, storing the BID value and the UUID, generating a key D by utilizing an encryption algorithm and a key C, storing the key D in an application directory, and encrypting the application directory by utilizing the encryption algorithm; the UUID is the serial number of the NFC access control card and has uniqueness; the secret key D is stored in the encrypted application directory, so that the secret leakage caused by direct reading of the secret key D is prevented, the safety of the NFC access card is greatly improved, and the safety of the BID value of a user is ensured;
the encrypted identity data generation module is used for generating encrypted identity data by the CTID intelligent door lock by utilizing the secret key D to encrypt the UUID and the BID value and storing the encrypted identity data on the NFC access card;
and the unlocking module is used for unlocking after the CTID intelligent door lock performs identity verification on the encrypted identity data of the NFC access control card by utilizing the encryption algorithm, the UUID and the BID value, and unlocking if the identity verification fails.
The key A, the key B, the key C and the key D are all symmetric keys or asymmetric keys.
In the key D generation module, the encryption algorithm is a hash algorithm, a symmetric encryption algorithm, or an asymmetric encryption algorithm, and for example, 3DES may be used for encryption.
The unlocking module specifically comprises:
the secret key D obtaining unit is used for decrypting the application directory by using the encryption algorithm to obtain a secret key D after the CTID intelligent door lock is in NFC connection with the NFC access card;
the encrypted identity data decryption unit is used for decrypting the encrypted identity data stored on the NFC access control card by the CTID intelligent door lock through the secret key D to obtain a UUID and a BID value;
the identity verification unit is used for comparing whether the UUID and the BID values obtained by decryption on the NFC access control card are equal to the locally stored UUID and BID values or not by the CTID intelligent door lock, and if yes, passing the identity verification and unlocking; if not, the identity authentication is not passed, and the process is ended.
Based on the same inventive concept, the application also provides equipment corresponding to the method in the first embodiment, which is detailed in the third embodiment.
EXAMPLE III
The embodiment provides a CTID-based NFC intelligent door lock unlocking device, as shown in fig. 3, which includes a memory, a processor, and a computer program stored in the memory and capable of running on the processor, and when the processor executes the computer program, any one of the embodiments may be implemented.
Since the apparatus described in this embodiment is an apparatus used for implementing the method in the first embodiment of the present application, a person skilled in the art can understand the specific implementation manner of the apparatus in this embodiment and various variations thereof based on the method described in the first embodiment of the present application, and therefore, a detailed description of how to implement the method in the embodiment of the present application by the apparatus is not provided herein. The equipment used by those skilled in the art to implement the methods in the embodiments of the present application is within the scope of the present application.
Based on the same inventive concept, the application also provides a medium corresponding to the method in the first embodiment, which is detailed in the fourth embodiment.
Example four
The present embodiment provides a CTID-based NFC smart door lock unlocking medium, as shown in fig. 4, where a computer program is stored on the NFC smart door lock unlocking medium, and when the computer program is executed by a processor, any one of the embodiments in the first embodiment may be implemented.
The technical scheme provided in the embodiment of the application at least has the following technical effects or advantages:
the method comprises the steps that a secret key A and a secret key B are created and are respectively used for obtaining the permission of writing data in the NFC entrance guard card and the permission of erasing the data of the NFC entrance guard card, double protection is added to the NFC entrance guard card, and the operations of writing data and clearing data cannot be carried out without the secret keys; the secret key D is generated by using the UUID of the NFC access cards and the secret key C pre-established by the CTID intelligent door lock, the secret key D of each NFC access card is different due to the uniqueness of the UUID, the UUID and the BID are encrypted by using the secret key D to generate encrypted identity data, namely, the UUID and the BID are bound and encrypted by using the unique secret key D, so that the safety of the encrypted identity data is greatly improved, and the data of the NFC access cards are prevented from being copied and cracked; after the user who can't show the two-dimensional code passes through NFC entrance guard card and is connected with CTID intelligent door lock establishment, CTID intelligent door lock can utilize encryption algorithm to read the BID value of saving in the NFC entrance guard card and carry out authentication and judge whether unblank, realizes promptly under the prerequisite of guaranteeing the security, unblanks after carrying out authentication to the user who can't show the two-dimensional code.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention has been described with reference to flowchart illustrations and/or block diagrams of apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.

Claims (4)

1. A CTID-based NFC intelligent door lock unlocking method is characterized by comprising the following steps: the method comprises the following steps:
step S10, a key A, a key B and a key C are created on the NFC access card through the CTID intelligent door lock; the secret key A is used for acquiring the permission of writing data in the NFC access card, and the secret key B is used for acquiring the permission of erasing the data of the NFC access card;
step S20, after the CTID intelligent door lock is connected with the NFC entrance guard card through NFC, the CTID intelligent door lock obtains the permission of writing data in the NFC entrance guard card through the secret key A, the NFC entrance guard card data is erased through the secret key B, and an application directory is created on the NFC entrance guard card;
step S30, the CTID intelligent door lock obtains and stores the BID value of the user and the UUID of the NFC access control card, the UUID and the secret key C are encrypted by an encryption algorithm to generate a secret key D which is stored in an application directory, and the application directory is encrypted by the encryption algorithm; the secret key A, the secret key B, the secret key C and the secret key D are all symmetric secret keys or asymmetric secret keys; the encryption algorithm is a Hash algorithm, a symmetric encryption algorithm or an asymmetric encryption algorithm;
step S40, the CTID intelligent door lock utilizes the secret key D to encrypt the UUID and the BID value to generate encrypted identity data and stores the encrypted identity data on the NFC access card;
step S50, the CTID intelligent door lock utilizes the encryption algorithm, the UUID and the BID value to carry out identity verification on the encrypted identity data of the NFC access card and then unlocks the door lock;
the step S50 specifically includes:
step S51, after the CTID intelligent door lock and the NFC access card are connected through NFC, the encryption algorithm is used for decrypting the application directory to obtain a secret key D;
step S52, the CTID intelligent door lock utilizes the secret key D to decrypt encrypted identity data stored on the NFC access control card to obtain a UUID and a BID value;
step S53, comparing the UUID and the BID obtained by decryption from the NFC access control card with the locally stored UUID and BID values, if so, passing the identity verification and unlocking; if not, the identity authentication is not passed, and the process is ended.
2. The utility model provides a NFC intelligence lock system of unblanking based on CTID which characterized in that: the system comprises the following modules:
the key creating module is used for creating a key A, a key B and a key C on the NFC access card through the CTID intelligent door lock; the secret key A is used for acquiring the permission of writing data in the NFC access card, and the secret key B is used for acquiring the permission of erasing the data of the NFC access card;
the NFC entrance guard card initialization module is used for acquiring the permission of writing data in the NFC entrance guard card by the CTID intelligent door lock through the secret key A, erasing the NFC entrance guard card data through the secret key B and creating an application directory on the NFC entrance guard card after the CTID intelligent door lock is connected with the NFC entrance guard card through NFC;
the key D generation module is used for acquiring a BID value of a user and a UUID of an NFC access control card by the CTID intelligent door lock, storing the BID value and the UUID, encrypting the UUID and the key C by using an encryption algorithm to generate a key D, storing the key D in an application directory, and encrypting the application directory by using the encryption algorithm; the key A, the key B, the key C and the key D are symmetric keys or asymmetric keys; the encryption algorithm is a Hash algorithm, a symmetric encryption algorithm or an asymmetric encryption algorithm;
the encrypted identity data generation module is used for generating encrypted identity data by the CTID intelligent door lock by utilizing the secret key D to encrypt the UUID and the BID value and storing the encrypted identity data in an NFC access card;
the unlocking module is used for unlocking the CTID intelligent door lock after carrying out identity verification on the encrypted identity data of the NFC access control card by utilizing the encryption algorithm, the UUID and the BID value;
the unlocking module specifically comprises:
the secret key D obtaining unit is used for decrypting the application directory by using the encryption algorithm to obtain a secret key D after the CTID intelligent door lock is in NFC connection with the NFC access card;
the encrypted identity data decryption unit is used for decrypting the encrypted identity data stored on the NFC access control card by the CTID intelligent door lock through the secret key D to obtain a UUID and a BID value;
the identity verification unit is used for comparing whether the UUID and the BID values obtained by decryption on the NFC access control card are equal to the locally stored UUID and BID values or not by the CTID intelligent door lock, and if yes, passing the identity verification and unlocking; if not, the identity authentication is not passed, and the process is ended.
3. A CTID-based NFC intelligent door lock unlocking device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method as claimed in claim 1 when executing the program.
4. A CTID-based NFC smart door lock unlocking medium having a computer program stored thereon, wherein the program, when executed by a processor, implements the method of claim 1.
CN202010521112.7A 2020-06-10 2020-06-10 CTID-based NFC intelligent door lock unlocking method, system, equipment and medium Active CN111768523B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010521112.7A CN111768523B (en) 2020-06-10 2020-06-10 CTID-based NFC intelligent door lock unlocking method, system, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010521112.7A CN111768523B (en) 2020-06-10 2020-06-10 CTID-based NFC intelligent door lock unlocking method, system, equipment and medium

Publications (2)

Publication Number Publication Date
CN111768523A CN111768523A (en) 2020-10-13
CN111768523B true CN111768523B (en) 2022-07-26

Family

ID=72720471

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010521112.7A Active CN111768523B (en) 2020-06-10 2020-06-10 CTID-based NFC intelligent door lock unlocking method, system, equipment and medium

Country Status (1)

Country Link
CN (1) CN111768523B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112968791B (en) * 2021-01-20 2022-08-05 福建新大陆通信科技股份有限公司 CTID intelligent access control external usb network card communication method and system
CN113487765A (en) * 2021-06-08 2021-10-08 福建新大陆通信科技股份有限公司 CTID (computer telephony integration) access control method and system supporting dynamic encryption

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104715528A (en) * 2015-03-05 2015-06-17 福建新大陆通信科技股份有限公司 Set top box-based household access control system
CN108986278A (en) * 2018-07-13 2018-12-11 深圳市欧瑞博科技有限公司 A kind of intelligent door lock off-line cipher authorization method and authoring system
CN110232762A (en) * 2019-06-24 2019-09-13 沈阳泰格科技发展有限公司 M1 card cabinet door electronic lock copy prevention method
CN111091170A (en) * 2019-12-16 2020-05-01 南京申宁达智能科技有限公司 Site personnel management system and management method based on UWB positioning and millimeter wave imaging

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
IT1396333B1 (en) * 2009-10-02 2012-11-16 Silca Spa METHOD OF DUPLICATION OF ELECTRONIC KEYS FOR CARS WITH MUTUAL AUTHENTICATION.
CN105989645A (en) * 2015-02-04 2016-10-05 鸿富锦精密工业(深圳)有限公司 Intelligent power-free key, access-control unlocking system and access-control unlocking method thereof
CN105989386B (en) * 2015-02-28 2019-03-29 北京天威诚信电子商务服务有限公司 A kind of method and apparatus for reading and writing radio frequency identification card
FR3047369B1 (en) * 2016-02-03 2019-06-21 Icare Technologies RING-TYPE RADIO FREQUENCY IDENTIFICATION DEVICE HAVING A SYSTEM FOR DETERIORATING PERSONAL DATA IN THE EVENT OF LOSS OR THEFT
CN107679604A (en) * 2017-10-16 2018-02-09 厦门盈趣科技股份有限公司 A kind of identification card and RF system
CN108228211B (en) * 2017-12-15 2021-05-25 中国移动通信集团江苏有限公司 Smart card, and method and system for safely updating data of smart card
CN110708164B (en) * 2019-09-25 2022-03-04 青岛海尔科技有限公司 Control method and device for Internet of things equipment, storage medium and electronic device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104715528A (en) * 2015-03-05 2015-06-17 福建新大陆通信科技股份有限公司 Set top box-based household access control system
CN108986278A (en) * 2018-07-13 2018-12-11 深圳市欧瑞博科技有限公司 A kind of intelligent door lock off-line cipher authorization method and authoring system
CN110232762A (en) * 2019-06-24 2019-09-13 沈阳泰格科技发展有限公司 M1 card cabinet door electronic lock copy prevention method
CN111091170A (en) * 2019-12-16 2020-05-01 南京申宁达智能科技有限公司 Site personnel management system and management method based on UWB positioning and millimeter wave imaging

Also Published As

Publication number Publication date
CN111768523A (en) 2020-10-13

Similar Documents

Publication Publication Date Title
CN111768522B (en) CTID-based intelligent door lock unlocking method and system
CN100533459C (en) Data safety reading method and safety storage apparatus thereof
CN112232814B (en) Encryption and decryption methods of payment key, payment authentication method and terminal equipment
CN102136048A (en) Mobile phone Bluetooth-based ambient intelligent computer protection device and method
GB2498039A (en) Enabling a user to secure and back-up an encryption key
KR101724401B1 (en) Certification System for Using Biometrics and Certification Method for Using Key Sharing and Recording medium Storing a Program to Implement the Method
CN105429761A (en) Key generation method and device
CN106953732B (en) Key management system and method for chip card
CN113282944B (en) Intelligent lock unlocking method and device, electronic equipment and storage medium
CN112565265B (en) Authentication method, authentication system and communication method between terminal devices of Internet of things
CN103345601A (en) Identity recording and verification system based on radio frequency
CN106936588A (en) A kind of trustship method, the apparatus and system of hardware controls lock
CN111768523B (en) CTID-based NFC intelligent door lock unlocking method, system, equipment and medium
EP2628133A1 (en) Authenticate a fingerprint image
CN110138548A (en) Based on unsymmetrical key pond to and DH agreement quantum communications service station cryptographic key negotiation method and system
CN112039665A (en) Key management method and device
TWI476629B (en) Data security and security systems and methods
Chen et al. A novel DRM scheme for accommodating expectations of personal use
CN1953366B (en) Password management method and system for intelligent secret key device
CN113761488A (en) Content network copyright tracing encryption system and encryption method
JP2005293490A (en) Biometrics system
Cavoukian et al. Keynote paper: Biometric encryption: Technology for strong authentication, security and privacy
KR100720738B1 (en) A method for providing secrecy, authentication and integrity of information to RFID tag
KR101809976B1 (en) A method for security certification generating authentication key combinating multi-user element
CN111815821B (en) IC card security algorithm applied to intelligent door lock

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20221221

Address after: 603, Floor 6, Building 30 #, Fuzhou Software Park Phase I (Strait Park), No. 89, Software Avenue, Wufeng Street, Gulou District, Fuzhou City, 350000, Fujian Province

Patentee after: Fujian New World Huichuang Technology Co.,Ltd.

Address before: 6 # Building and 2 to 4 # Building of 5 # Building, No. 70, Rujiang East Road, Mawei Development Zone, Fuzhou City, Fujian Province, 350000

Patentee before: Fujian Newland Communication Science Technologies Co.,Ltd.