CN112135298A - Control method of anti-deciphering Bluetooth broadcast rolling door - Google Patents

Control method of anti-deciphering Bluetooth broadcast rolling door Download PDF

Info

Publication number
CN112135298A
CN112135298A CN202010786569.0A CN202010786569A CN112135298A CN 112135298 A CN112135298 A CN 112135298A CN 202010786569 A CN202010786569 A CN 202010786569A CN 112135298 A CN112135298 A CN 112135298A
Authority
CN
China
Prior art keywords
controller
algorithm
control method
rolling door
deciphering
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010786569.0A
Other languages
Chinese (zh)
Other versions
CN112135298B (en
Inventor
刘王雍杰
刘乐
郭漳和
林颖艺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Anlin Electromechanical Technology Co ltd
Original Assignee
Fujian Anlin Electromechanical Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Anlin Electromechanical Technology Co ltd filed Critical Fujian Anlin Electromechanical Technology Co ltd
Priority to CN202010786569.0A priority Critical patent/CN112135298B/en
Publication of CN112135298A publication Critical patent/CN112135298A/en
Application granted granted Critical
Publication of CN112135298B publication Critical patent/CN112135298B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Lock And Its Accessories (AREA)
  • Alarm Systems (AREA)
  • Power-Operated Mechanisms For Wings (AREA)

Abstract

The invention provides a control method of a decoding-preventing Bluetooth broadcast rolling door, which relates to the technical field of control and comprises the following steps: s1: establishing a central terminal, and generating an algorithm library in the central terminal; s2: when the controller is accessed to the central terminal, acquiring an algorithm library corresponding to the controller; s3: calculating a relation corresponding table of time and an algorithm library to generate a key; s4: when the mobile terminal is accessed to the central terminal, judging whether the mobile terminal has the control authority of the controller, if so, executing S5; otherwise, the operation is not executed; s5: the central terminal sends the key of the controller to the mobile terminal; s6: and acquiring real-time, acquiring a corresponding algorithm in an algorithm library through the key, and controlling and managing the controller through the algorithm. The control method of the anti-deciphering Bluetooth broadcast rolling door has good safety, can effectively prevent deciphering, effectively reduces the risk of wireless signals intercepted and simulated opening, has novel control mode, can be matched with APP for use, and ensures financial safety.

Description

Control method of anti-deciphering Bluetooth broadcast rolling door
Technical Field
The invention relates to the technical field of control,
particularly, the invention relates to a control method of a decoding-preventing Bluetooth broadcast rolling door.
Background
At present, the rolling door is widely applied to warehouses, garages, shops and the like, the rolling door is matched with a ground lock through a rolling door lock so as to be locked to protect the finance inside the rolling door, and the rolling door is controlled to be opened and closed by a motor controller above the rolling door.
In the existing motor controller, the motor operation direction is switched by manually toggling a sliding switch, for example, the level of an IO port of the motor controller is high/low, the motor controller detects the high/low level, and the motor controller receives a door opening instruction to control the operation direction of the motor to be positive/negative; when the slide switch is shifted to the other side, the level of the IO port is low/high, the motor controller detects the low/high level, and the motor controller receives an opening instruction to control the running direction of the motor to be reverse/positive. Switch through manual mode, all need stir slide switch and switch, not only increased a slide switch like this, increaseed the area of controller PCB board, occupied the limited data interface of controller, switch over the operation moreover and be more troublesome, if controller mounted position is high, still must climb high.
For example, chinese patent invention CN109162626A relates to a motor control system for a roller shutter door, comprising: the signal transmitter is used for sending a conversion signal to the motor controller in a wireless mode, and the conversion signal is used for indicating the running mode of the motor; and the motor controller responds to the motor forward rotation or reverse rotation switching signal sent by the signal emitter reversely according to the received conversion signal. The invention has the beneficial effects that: by adopting a wireless transmission control mode, a user can conveniently switch the motor steering without being limited by distance; and the system has simple structure and smaller volume.
However, the above-mentioned roller shutter door control method still has the following disadvantages: the security is poor, is decoded easily, may have other people to intercept the signal of opening the door to use the simulator to carry out the simulation of the signal of opening the door, just can illegally open the rolling slats door, financial security does not have the guarantee.
Therefore, in order to solve the above problems, it is necessary to design a reasonable anti-deciphering bluetooth broadcast rolling door control method.
Disclosure of Invention
The invention aims to provide a control method of a decoding-preventing Bluetooth broadcast rolling door, which has good safety, can effectively prevent decoding, effectively reduces the risk of wireless signals being intercepted and simulating to open the door, has novel control mode, can be matched with APP for use, and has guaranteed financial safety.
In order to achieve the purpose, the invention is realized by adopting the following technical scheme:
a control method for a decoding-preventing Bluetooth broadcast rolling door comprises the following steps:
s1: establishing a central terminal, and generating an algorithm library in the central terminal;
s2: when the controller is accessed to the central terminal, acquiring an algorithm library corresponding to the controller;
s3: calculating a relation corresponding table of time and an algorithm library to generate a key;
s4: when the mobile terminal is connected to the central terminal, determining whether the mobile terminal has the control authority of the controller, if yes, executing step S5; otherwise, the operation is not executed;
s5: the central terminal sends the key of the controller to the mobile terminal;
s6: and acquiring real-time, acquiring a corresponding algorithm in an algorithm library through the key, and controlling and managing the controller through the algorithm.
Preferably, in step S1, the number of algorithm libraries is at least one.
Preferably, in step S2, the controller is connected to the central terminal via bluetooth or wifi.
In a preferred embodiment of the present invention, when step S2 is executed, the controller is numbered and the algorithm library is assigned, and then the controller number is recorded in association with the algorithm library corresponding to the controller.
Preferably, in step S3, the key is stored in the central terminal.
Preferably, in step S4, the mobile terminal is connected to the central terminal via bluetooth or wifi.
Preferably, when step S4 is executed, it is determined in real time whether the mobile terminal has the control authority of the controller.
Preferably, before performing step S5, the mobile terminal obtains the corresponding algorithm library of the controller from the central terminal.
As a preferred aspect of the present invention, the step S6 is executed specifically as follows: the real-time is obtained through a network, the algorithm corresponding to the real-time is obtained in the appointed algorithm library through the key, the mobile terminal obtains the real-time algorithm, the algorithm and the control instruction are sent to the controller, and the controller responds to the control instruction to control the roller shutter door.
Preferably, in the present invention, when step S6 is executed, the controller acquires the erroneous algorithm command information twice in succession and issues an alarm.
The control method of the anti-deciphering Bluetooth broadcast rolling door has the beneficial effects that: the security is good, can effectually prevent to decipher, effectively reduces the risk that radio signal was intercepted and is simulated to open a door, and control mode is novel, can use with the APP cooperation, and financial safety is secure.
Drawings
Fig. 1 is a schematic flow chart of a control method of a decoding-prevention bluetooth broadcast rolling door according to the present invention.
Detailed Description
The following are specific examples of the present invention and further describe the technical solutions of the present invention, but the present invention is not limited to these examples.
Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the modules and structures set forth in these embodiments does not limit the scope of the invention unless specifically stated otherwise.
The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the invention, its application, or uses.
Techniques, methods, and systems known to those of ordinary skill in the relevant art may not be discussed in detail, but are intended to be part of the specification where appropriate.
Example (b): as shown in fig. 1, which is only one embodiment of the present invention, a deciphering prevention bluetooth broadcast rolling door control method includes the following steps:
s1: establishing a central terminal, and generating an algorithm library in the central terminal;
generally, a central terminal is established, that is, a server is established, or a data transmission terminal is established, as the central terminal, the controller of the rolling door and the mobile terminal for controlling the controller are connected to the central terminal for data exchange.
The algorithm library is a set of rules of the algorithm changing along with time.
Of course, the generated algorithm library may be one or more, but once there are a plurality of algorithm libraries, there must be a difference between any two algorithm libraries.
S2: when the controller is accessed to the central terminal, acquiring an algorithm library corresponding to the controller;
when the controller is connected to the central end, namely the controller receives signal transmission of the central end to control, an algorithm library is distributed to the controller, the controller is connected to the central end through Bluetooth or wifi, signals in a general warehouse or a factory are poor, the controller is preferably connected through Bluetooth, signal transmission between the controller and the central end does not depend on network speed, and signal transmission can be carried out within a certain range.
Here, when the algorithm library is assigned, the controller is numbered, and after the algorithm library is assigned, the controller number is recorded in association with the algorithm library corresponding to the controller.
It should be noted that if only one algorithm library is generated at the central end, all the controllers connected to the central end share one algorithm library; on the contrary, if a plurality of algorithm libraries are generated at the central end, each controller may share one algorithm library independently, or some controllers may share one algorithm library. However, the controllers need to be numbered, so that a plurality of controllers can be respectively started, and the designated controllers can be conveniently controlled; and secondly, reading the corresponding algorithm library conveniently.
S3: calculating a relation corresponding table of time and an algorithm library to generate a key;
here, the key is a means of obtaining a relationship between real-time and zero time by using a predetermined time as a zero point, and then calculating to obtain an algorithm corresponding to the real-time according to a rule that an algorithm in an algorithm library changes with time, and this means is called a key.
The predetermined time is settable and is not a unique value.
Even if all controllers share one algorithm library, as long as the set zero time in the key is different, the key is also different, and then the passwords of the control algorithms of the two controllers are also different at the current time; therefore, the probability that the same algorithm password appears in the two controllers at the same time is infinitely reduced, even though the probability is very low, the probability is unpredictable and cannot be copied, and the risk that lawbreakers intercept the algorithm password in the signal sent by the mobile terminal to simulate door opening is effectively reduced.
In summary, the algorithm libraries of the controllers may be different, and even if the algorithm libraries of the controllers are the same, the keys may be different, so that the algorithm passwords controlled by each controller in real time are different.
Of course, when step S3 is executed, the key is stored in the central terminal.
S4: when the mobile terminal is connected to the central terminal, determining whether the mobile terminal has the control authority of the controller, if yes, executing step S5; otherwise, the operation is not executed;
when the mobile terminal is connected to the central terminal, that is, when the mobile terminal wants to control the controller through signal transmission of the central terminal, it needs to determine the right item of the mobile terminal, where the control right of the mobile terminal is determined according to the controller number, and one mobile terminal may have the control right of one or more controllers.
When step S4 is executed, the mobile terminal is connected to the central terminal through bluetooth or wifi. Preferably, in a place with poor signals in a warehouse or a factory, the connection is carried out through Bluetooth, the signal transmission between the mover and the central end does not depend on the network speed, and the signal transmission can be carried out within a certain range
In addition, the administrator may give the control authority of the controller designated by the mobile terminal or delete the control authority of the controller designated by the mobile terminal, and then, when performing step S4, it is determined whether the mobile terminal has the control authority of the controller in real time.
S5: the central terminal sends the key of the controller to the mobile terminal;
the mobile terminal having the control authority of the designated controller can receive the algorithm library and the key corresponding to the controller sent from the central terminal, and generally, the algorithm library is obtained from the central terminal when the mobile terminal initially obtains the control authority of the controller, or when the mobile terminal is initially connected to the central terminal having only one algorithm library, that is, before performing step S5.
Then, the central terminal sends the key of the controller to the mobile terminal with the control authority of the controller, and the mobile terminal has the specified algorithm library and the password of the controller and can control the controller.
S6: and acquiring real-time, acquiring a corresponding algorithm in an algorithm library through the key, and controlling and managing the controller through the algorithm.
Here, step S6 is specifically: the method comprises the steps of obtaining real-time through a network, obtaining an algorithm password corresponding to the real-time in a specified algorithm library through a key, obtaining the real-time algorithm password by a mobile terminal, sending the algorithm and a control instruction to a controller, and controlling the roller shutter door by the controller in response to the control instruction, wherein the controller controls the roller shutter door, such as ascending, descending, pausing, sudden stop and the like.
It should be noted that the real-time mentioned herein does not refer to the current (beijing) time, but may refer to a time difference value between the current time and a preset zero time, and the current algorithm password may be obtained according to the difference value and the key rule.
Of course, when step S6 is executed, the controller acquires the wrong algorithm instruction information twice in succession, and issues an alarm to avoid lawbreakers from being decoded by simulation.
The control method of the anti-deciphering Bluetooth broadcast rolling door has good safety, can effectively prevent deciphering, effectively reduces the risk of wireless signals intercepted and simulated opening, has novel control mode, can be matched with APP for use, and ensures financial safety.
The present invention is not limited to the above-described specific embodiments, and various modifications and variations are possible. Any modifications, equivalents, improvements and the like made to the above embodiments in accordance with the technical spirit of the present invention should be included in the scope of the present invention.

Claims (10)

1. A control method for a decoding-preventing Bluetooth broadcast rolling door is characterized by comprising the following steps:
s1: establishing a central terminal, and generating an algorithm library in the central terminal;
s2: when the controller is accessed to the central terminal, acquiring an algorithm library corresponding to the controller;
s3: calculating a relation corresponding table of time and an algorithm library to generate a key;
s4: when the mobile terminal is connected to the central terminal, determining whether the mobile terminal has the control authority of the controller, if yes, executing step S5; otherwise, the operation is not executed;
s5: the central terminal sends the key of the controller to the mobile terminal;
s6: and acquiring real-time, acquiring a corresponding algorithm in an algorithm library through the key, and controlling and managing the controller through the algorithm.
2. The control method of the anti-deciphering Bluetooth broadcast rolling door according to claim 1, wherein:
in step S1, the number of algorithm libraries is at least one.
3. The control method of the anti-deciphering Bluetooth broadcast rolling door according to claim 1, wherein:
when step S2 is executed, the controller is connected to the center terminal through bluetooth or wifi.
4. The control method of the anti-deciphering Bluetooth broadcast rolling door according to claim 1, wherein:
in step S2, the controller is numbered and the algorithm library is assigned, and then the controller number and the algorithm library corresponding to the controller are recorded in correspondence.
5. The control method of the anti-deciphering Bluetooth broadcast rolling door according to claim 1, wherein:
when step S3 is executed, the key is stored in the central terminal.
6. The control method of the anti-deciphering Bluetooth broadcast rolling door according to claim 1, wherein:
when step S4 is executed, the mobile terminal is connected to the central terminal through bluetooth or wifi.
7. The control method of the anti-deciphering Bluetooth broadcast rolling door according to claim 1, wherein:
when step S4 is executed, it is determined in real time whether the mobile terminal has the control authority of the controller.
8. The control method of the anti-deciphering Bluetooth broadcast rolling door according to claim 1, wherein:
before executing step S5, the mobile terminal obtains the corresponding algorithm library of the controller from the central terminal.
9. The control method of the anti-deciphering Bluetooth broadcast rolling door according to claim 1, wherein:
the step S6 is executed specifically as follows: the real-time is obtained through a network, the algorithm corresponding to the real-time is obtained in the appointed algorithm library through the key, the mobile terminal obtains the real-time algorithm, the algorithm and the control instruction are sent to the controller, and the controller responds to the control instruction to control the roller shutter door.
10. The control method of the deciphering-prevention Bluetooth broadcast rolling door according to claim 9, wherein:
when step S6 is executed, the controller acquires erroneous algorithm instruction information twice in succession and issues an alarm.
CN202010786569.0A 2020-08-07 2020-08-07 Anti-decoding Bluetooth broadcast rolling door control method Active CN112135298B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010786569.0A CN112135298B (en) 2020-08-07 2020-08-07 Anti-decoding Bluetooth broadcast rolling door control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010786569.0A CN112135298B (en) 2020-08-07 2020-08-07 Anti-decoding Bluetooth broadcast rolling door control method

Publications (2)

Publication Number Publication Date
CN112135298A true CN112135298A (en) 2020-12-25
CN112135298B CN112135298B (en) 2024-02-02

Family

ID=73851651

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010786569.0A Active CN112135298B (en) 2020-08-07 2020-08-07 Anti-decoding Bluetooth broadcast rolling door control method

Country Status (1)

Country Link
CN (1) CN112135298B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112664125A (en) * 2020-12-31 2021-04-16 福建安麟智能科技股份有限公司 Voice control method for roller shutter door

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105303651A (en) * 2014-07-30 2016-02-03 许加庆 Bluetooth based two-way communication automatic locking system and method
CN106548554A (en) * 2016-12-22 2017-03-29 贵州商学院 A kind of bluetooth door opening method and door lock based on mobile terminal APP
WO2017181527A1 (en) * 2016-04-19 2017-10-26 深圳小狗科技有限公司 Shutter security control system using bluetooth function of internet-connected mobile phone
CN110930551A (en) * 2019-11-27 2020-03-27 惠州拓邦电气技术有限公司 Unlocking method and device, password authorization method and device, and door lock system
CN210776256U (en) * 2019-11-07 2020-06-16 福建安麟机电科技有限公司 System for remotely controlling and monitoring roller shutter door motor
CN111447062A (en) * 2020-04-28 2020-07-24 大陆汽车电子(长春)有限公司 Password management system for vehicle

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105303651A (en) * 2014-07-30 2016-02-03 许加庆 Bluetooth based two-way communication automatic locking system and method
WO2017181527A1 (en) * 2016-04-19 2017-10-26 深圳小狗科技有限公司 Shutter security control system using bluetooth function of internet-connected mobile phone
CN106548554A (en) * 2016-12-22 2017-03-29 贵州商学院 A kind of bluetooth door opening method and door lock based on mobile terminal APP
CN210776256U (en) * 2019-11-07 2020-06-16 福建安麟机电科技有限公司 System for remotely controlling and monitoring roller shutter door motor
CN110930551A (en) * 2019-11-27 2020-03-27 惠州拓邦电气技术有限公司 Unlocking method and device, password authorization method and device, and door lock system
CN111447062A (en) * 2020-04-28 2020-07-24 大陆汽车电子(长春)有限公司 Password management system for vehicle

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112664125A (en) * 2020-12-31 2021-04-16 福建安麟智能科技股份有限公司 Voice control method for roller shutter door

Also Published As

Publication number Publication date
CN112135298B (en) 2024-02-02

Similar Documents

Publication Publication Date Title
US11038879B2 (en) Identity authentication method and apparatus, and user equipment
US5875395A (en) Secure equipment automation using a personal base station
CN104966340B (en) Access control system, access control method and cloud service platform
US8909194B2 (en) Physical location verification
US20170169698A1 (en) Integrated physical and logical security management via a portable device
CN105427416A (en) Two-dimension code unlocking method and system
US11206532B2 (en) Method and systems for pairing a mobile device with a wireless network
US20040177072A1 (en) Smart environment
CN109690541B (en) Forced failure of random password
US20050048951A1 (en) Method and system for alternative access using mobile electronic devices
EP2973442A1 (en) Controlling physical access to secure areas via client devices in a networked environment
KR101892145B1 (en) Multiple-Segment Authentication Technologies
KR101564716B1 (en) Apparatus for managing open and shut in enclosure box
JP2005312040A (en) Method for transmitting information between bidirectional objects
US10181230B2 (en) System and method for controlling access at access point
US9451388B1 (en) Framework and method for processing commands for controlling electronic devices
EP3319290A1 (en) Method and system for accessing home cloud system by cloud terminal, and cloud access control device
US20150166007A1 (en) Method and system for preventing telematics remote control vehicle from being externally hacked
CN112135298A (en) Control method of anti-deciphering Bluetooth broadcast rolling door
KR100651717B1 (en) Method and home network system for authentication between remote terminal and home network using smart card
US20120210399A1 (en) Location-enabled access control lists for real-world devices
US20050071673A1 (en) Method and system for secure authentication using mobile electronic devices
CN108834142B (en) Wireless router and connection authentication method thereof
CN110298953B (en) Method and device for controlling equipment in intelligent home operating system
US20230287727A1 (en) Window operator assemblies and devices for controlling the same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant