CN112135298B - Anti-decoding Bluetooth broadcast rolling door control method - Google Patents

Anti-decoding Bluetooth broadcast rolling door control method Download PDF

Info

Publication number
CN112135298B
CN112135298B CN202010786569.0A CN202010786569A CN112135298B CN 112135298 B CN112135298 B CN 112135298B CN 202010786569 A CN202010786569 A CN 202010786569A CN 112135298 B CN112135298 B CN 112135298B
Authority
CN
China
Prior art keywords
controller
algorithm
time
rolling door
control method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010786569.0A
Other languages
Chinese (zh)
Other versions
CN112135298A (en
Inventor
刘王雍杰
刘乐
郭漳和
林颖艺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Anlin Electromechanical Technology Co ltd
Original Assignee
Fujian Anlin Electromechanical Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Anlin Electromechanical Technology Co ltd filed Critical Fujian Anlin Electromechanical Technology Co ltd
Priority to CN202010786569.0A priority Critical patent/CN112135298B/en
Publication of CN112135298A publication Critical patent/CN112135298A/en
Application granted granted Critical
Publication of CN112135298B publication Critical patent/CN112135298B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Lock And Its Accessories (AREA)
  • Alarm Systems (AREA)
  • Power-Operated Mechanisms For Wings (AREA)

Abstract

The invention provides a decoding-preventing Bluetooth broadcasting rolling door control method, which relates to the technical field of control and comprises the following steps: s1: establishing a central end, and generating an algorithm library in the central end; s2: when the controller is accessed to the central end, acquiring an algorithm library corresponding to the controller; s3: calculating a relation corresponding table of time and an algorithm library to generate a key; s4: when the mobile terminal is accessed to the central terminal, judging whether the mobile terminal has the control authority of the controller, and executing S5 if the mobile terminal has the control authority of the controller; otherwise, not executing the operation; s5: the central end sends the key of the controller to the mobile end; s6: acquiring real-time, acquiring a corresponding algorithm from an algorithm library through a key, and controlling and managing the controller through the algorithm. The control method of the Bluetooth broadcast rolling door for preventing decoding is good in safety, decoding can be effectively prevented, the risk that a wireless signal is intercepted and simulated to open the door can be effectively reduced, the control mode is novel, the Bluetooth broadcast rolling door can be used together with APP, and financial safety is guaranteed.

Description

Anti-decoding Bluetooth broadcast rolling door control method
Technical Field
The invention relates to the technical field of control,
in particular, the invention relates to a bluetooth broadcast rolling door control method capable of preventing decoding.
Background
At present, the rolling door is widely applied to warehouses, garages, shops and the like, and is matched with a ground lock through the rolling door lock so as to lock the rolling door, thereby being convenient for protecting finance inside the rolling door, and the opening and closing of the rolling door are controlled by a motor controller above the rolling door.
In the existing motor controller, the running direction of the motor is switched by manually toggling a sliding switch, for example, the IO port level of the motor controller is high/low, the motor controller detects the high/low level, and the motor controller receives a door opening instruction to control the running direction of the motor to be positive/negative; when the sliding switch is shifted to the other side, the level of the IO port is low/high, the motor controller detects the low/high level, and the motor controller receives an on command to control the running direction of the motor to be reverse/positive. The manual mode is used for switching, the sliding switch is required to be shifted to switch, so that the area of a PCB of the controller is increased, the limited data interface of the controller is occupied, the switching operation is troublesome, and the controller still has to climb up if the installation position of the controller is high.
For example, chinese patent invention CN109162626a relates to a motor control system for a rolling shutter door, comprising: the signal transmitter is used for transmitting a conversion signal to the motor controller in a wireless mode, and the conversion signal is used for indicating the running mode of the motor; and the motor controller is used for responding to the forward or reverse rotation switching signal of the motor sent by the signal transmitter reversely according to the received conversion signal. The beneficial effects of the invention are as follows: the control mode of wireless transmission is adopted, so that the user can conveniently switch the steering of the motor without being limited by the distance; and the system has simple structure and smaller volume.
However, the rolling door control method still has the following disadvantages: the safety is poor, is easily deciphered, and possible other people intercept the signal of opening the door to use the simulator to carry out the simulation of the signal of opening the door, just can illegally open the rolling slats door, financial security is not ensured.
Therefore, in order to solve the above-mentioned problems, it is necessary to design a reasonable anti-cracking bluetooth broadcast rolling door control method.
Disclosure of Invention
The invention aims to provide the Bluetooth broadcast rolling door control method which has good safety, can effectively prevent decoding, effectively reduce the risk of wireless signals being intercepted and simulated to open the door, has novel control mode, can be matched with APP for use, and ensures financial safety.
In order to achieve the above purpose, the invention is realized by adopting the following technical scheme:
a control method of a Bluetooth broadcast rolling door capable of preventing decoding comprises the following steps:
s1: establishing a central end, and generating an algorithm library in the central end;
s2: when the controller is accessed to the central end, an algorithm library corresponding to the controller is obtained;
s3: calculating a relation corresponding table of time and an algorithm library to generate a key;
s4: when the mobile terminal is accessed to the central terminal, judging whether the mobile terminal has the control authority of the controller, and if so, executing the step S5; otherwise, not executing the operation;
s5: the central end sends the key of the controller to the mobile end;
s6: acquiring real-time, acquiring a corresponding algorithm from an algorithm library through a key, and controlling and managing the controller through the algorithm.
Preferably, the number of algorithm libraries is at least one when step S1 is performed.
As a preferred aspect of the present invention, when step S2 is performed, the controller is connected to the central terminal through bluetooth or wifi.
In a preferred embodiment of the present invention, when step S2 is executed, the controller is numbered, the algorithm library is allocated, and then the corresponding record is made between the controller number and the algorithm library corresponding to the controller.
Preferably, in step S3, the key is stored in the central terminal.
As a preferred aspect of the present invention, when step S4 is performed, the mobile terminal is connected to the central terminal through bluetooth or wifi.
Preferably, in the present invention, when step S4 is executed, it is determined in real time whether the mobile terminal has the control authority of the controller.
Preferably, before executing step S5, the mobile terminal obtains the corresponding algorithm library of the controller from the central terminal.
As a preferred embodiment of the present invention, the step S6 is specifically performed by: the real-time is acquired through a network, an algorithm corresponding to the real-time is acquired in a specified algorithm library through a key, the mobile terminal acquires the real-time algorithm, the algorithm and a control instruction are sent to a controller, and the controller responds to the control instruction to control the roller shutter door.
Preferably, when step S6 is executed, the controller acquires the wrong algorithm instruction information twice in succession, and issues an alarm.
The anti-decoding Bluetooth broadcast rolling door control method has the beneficial effects that: the security is good, can effectually prevent to decipher, effectively reduces wireless signal and is intercepted the risk that the simulation opened the door, and control mode is novel, can use with APP cooperation, and financial security has the guarantee.
Drawings
Fig. 1 is a schematic flow chart of a bluetooth broadcast rolling door control method for preventing decoding according to the present invention.
Detailed Description
The following are specific examples of the present invention, and the technical solutions of the present invention are further described, but the present invention is not limited to these examples.
Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the modules and structures set forth in these embodiments does not limit the scope of the invention unless specifically stated otherwise.
The following description of at least one exemplary embodiment is merely exemplary in nature and is in no way intended to limit the invention, its application, or uses.
Techniques, methods, and systems known to those of ordinary skill in the relevant art may not be discussed in detail, but should be considered part of the authorization specification where appropriate.
Examples: as shown in fig. 1, which is only one embodiment of the present invention, an anti-hacking bluetooth broadcast rolling door control method includes the following steps:
s1: establishing a central end, and generating an algorithm library in the central end;
in general, a central terminal is established, that is, a server is established, or a data transmission terminal is established, and as the central terminal, a controller of the rolling shutter door and a mobile terminal for controlling the controller are connected to the central terminal for data exchange.
Algorithm library is a collection of rules of algorithm over time.
Of course, the algorithm library generated here may be one or a plurality of algorithm libraries, but once the algorithm libraries are a plurality of algorithm libraries, any two algorithm libraries must be different from each other.
S2: when the controller is accessed to the central end, an algorithm library corresponding to the controller is obtained;
when the controller is connected to the central end, that is, the controller receives the signal transmission of the central end to control, an algorithm library is allocated to the controller, the controller is connected to the central end through Bluetooth or wifi, the signals in a common warehouse or factory are poor, the connection is preferably carried out through Bluetooth, and the signal transmission between the controller and the central end does not depend on the network speed, so that the signal transmission can be carried out within a certain range.
Here, the controller is numbered when the algorithm library is allocated, and after the algorithm library is allocated, the controller number is recorded in association with the algorithm library corresponding to the controller.
It should be noted that if the central terminal generates only one algorithm library, all controllers connected to the central terminal share one algorithm library; otherwise, if the central side generates a plurality of algorithm libraries, each controller may share one algorithm library, or some controllers may share one algorithm library. However, the controllers are required to be numbered, and a plurality of controllers can be separated, so that the designated controllers can be controlled conveniently; and secondly, the corresponding algorithm library is conveniently read.
S3: calculating a relation corresponding table of time and an algorithm library to generate a key;
the key is a means for obtaining the relationship between the real-time and the zero time by taking a preset time as the zero point, and then calculating to obtain the algorithm corresponding to the real-time according to the law of the change of the algorithm in the algorithm library along with the time, which is called a key.
The predetermined time is settable and is not a unique value.
Even if all controllers share one algorithm library, the keys are different as long as the zero time set in the keys is different, and the passwords of the control algorithms of the two controllers are different at the current time; therefore, the probability of the same algorithm password appearing at the same time of the two controllers is infinitely reduced, even if the probability of the same algorithm password is very small, the algorithm password cannot be copied or expected, and the risk that an lawless person intercepts the algorithm password in a signal sent by the mobile terminal to perform simulated door opening is effectively reduced.
In summary, the algorithm libraries of the multiple controllers may be different, and even if the algorithm libraries of the multiple controllers are the same, the keys may be different, so that the algorithm passwords controlled by each controller in real time are different.
Of course, when step S3 is executed, the key is stored in the central terminal.
S4: when the mobile terminal is accessed to the central terminal, judging whether the mobile terminal has the control authority of the controller, and if so, executing the step S5; otherwise, not executing the operation;
when the mobile terminal is connected to the central terminal, that is, the mobile terminal wants to control the controller through signal transmission of the central terminal, the right of the mobile terminal needs to be judged, wherein the control authority of the mobile terminal is judged according to the number of the controller, and one mobile terminal may have one or more control authorities of the controller.
And when the step S4 is executed, the mobile terminal is connected to the central terminal through Bluetooth or wifi. Preferably, the connection is made by Bluetooth in a warehouse or in a factory where the signal is poor, and the signal transmission between the mobile device and the central terminal is independent of the network speed and can be carried out within a certain range
And, the administrator may give the control authority of the controller specified by the mobile terminal, or may delete the control authority of the controller specified by the mobile terminal, and then when executing step S4, it is determined in real time whether the mobile terminal has the control authority of the controller.
S5: the central end sends the key of the controller to the mobile end;
the mobile terminal with the control authority of the designated controller may accept the algorithm library and the key corresponding to the controller sent from the central terminal, and in general, the algorithm library is obtained from the central terminal when the mobile terminal first obtains the control authority of the controller, or when the mobile terminal is first connected to the central terminal with only one algorithm library, that is, before executing step S5.
Then, the central terminal sends the key of the controller to the mobile terminal with the control authority of the controller, and the mobile terminal has the algorithm library and the password of the designated controller, so that the control of the controller can be performed.
S6: acquiring real-time, acquiring a corresponding algorithm from an algorithm library through a key, and controlling and managing the controller through the algorithm.
The step S6 here is specifically: the real-time is acquired through a network, the algorithm password corresponding to the real-time is acquired in a specified algorithm library through a key, the mobile terminal acquires the real-time algorithm password, the algorithm and a control instruction are sent to a controller, and the controller responds to the control instruction to control the roller shutter door, such as ascending, descending, suspending, stopping suddenly and the like.
It should be noted that, the real-time is not only the current (Beijing) time, but may refer to a time difference value between the current time and a preset zero time, and the current algorithm password may be obtained according to the difference value and the key rule.
Of course, when executing step S6, the controller acquires the wrong algorithm instruction information twice in succession, and gives an alarm to avoid the simulation and decoding of lawless persons.
The control method of the Bluetooth broadcast rolling door for preventing decoding is good in safety, decoding can be effectively prevented, the risk that a wireless signal is intercepted and simulated to open the door can be effectively reduced, the control mode is novel, the Bluetooth broadcast rolling door can be used together with APP, and financial safety is guaranteed.
The present invention is not limited to the above-described specific embodiments, and various modifications and variations are possible. Any modification, equivalent replacement, improvement, etc. of the above embodiments according to the technical substance of the present invention should be included in the protection scope of the present invention.

Claims (9)

1. The anti-decoding Bluetooth broadcast rolling door control method is characterized by comprising the following steps of:
s1: establishing a central end, and generating an algorithm library in the central end;
s2: when the controller is accessed to the central end, an algorithm library corresponding to the controller is obtained;
s3: calculating a relation corresponding table of time and an algorithm library to generate a key;
s4: when the mobile terminal is accessed to the central terminal, judging whether the mobile terminal has the control authority of the controller, and if so, executing the step S5; otherwise, not executing the operation;
s5: the central end sends the key of the controller to the mobile end;
s6: acquiring real-time, acquiring a corresponding algorithm in an algorithm library through a key, and controlling and managing a controller through the algorithm;
the method comprises the steps of taking a preset time as a zero point, acquiring the relation between real-time and zero point time, and calculating to obtain an algorithm corresponding to the real-time according to the law of time variation of the algorithm in an algorithm library, wherein the zero point time of different keys is different;
and the executing step S6 specifically includes: the real-time is acquired through a network, an algorithm corresponding to the real-time is acquired in a specified algorithm library through a key, the mobile terminal acquires the real-time algorithm, the algorithm and a control instruction are sent to a controller, and the controller responds to the control instruction to control the roller shutter door.
2. The anti-hacking bluetooth broadcast rolling door control method of claim 1, wherein:
when step S1 is executed, the number of algorithm libraries is at least one.
3. The anti-hacking bluetooth broadcast rolling door control method of claim 1, wherein:
when executing step S2, the controller is connected to the central terminal through Bluetooth or wifi.
4. The anti-hacking bluetooth broadcast rolling door control method of claim 1, wherein:
and S2, numbering the controllers, distributing an algorithm library, and correspondingly recording the numbers of the controllers and the algorithm library corresponding to the controllers.
5. The anti-hacking bluetooth broadcast rolling door control method of claim 1, wherein:
and when the step S3 is executed, the key is stored to the central end.
6. The anti-hacking bluetooth broadcast rolling door control method of claim 1, wherein:
and when the step S4 is executed, the mobile terminal is connected to the central terminal through Bluetooth or wifi.
7. The anti-hacking bluetooth broadcast rolling door control method of claim 1, wherein:
and when executing the step S4, judging whether the mobile terminal has the control authority of the controller in real time.
8. The anti-hacking bluetooth broadcast rolling door control method of claim 1, wherein:
before executing step S5, the mobile terminal obtains a corresponding algorithm library of the controller from the central terminal.
9. The anti-hacking bluetooth broadcast rolling door control method of claim 1, wherein:
when executing step S6, the controller continuously acquires the wrong algorithm instruction information twice, and sends out an alarm.
CN202010786569.0A 2020-08-07 2020-08-07 Anti-decoding Bluetooth broadcast rolling door control method Active CN112135298B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010786569.0A CN112135298B (en) 2020-08-07 2020-08-07 Anti-decoding Bluetooth broadcast rolling door control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010786569.0A CN112135298B (en) 2020-08-07 2020-08-07 Anti-decoding Bluetooth broadcast rolling door control method

Publications (2)

Publication Number Publication Date
CN112135298A CN112135298A (en) 2020-12-25
CN112135298B true CN112135298B (en) 2024-02-02

Family

ID=73851651

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010786569.0A Active CN112135298B (en) 2020-08-07 2020-08-07 Anti-decoding Bluetooth broadcast rolling door control method

Country Status (1)

Country Link
CN (1) CN112135298B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112664125A (en) * 2020-12-31 2021-04-16 福建安麟智能科技股份有限公司 Voice control method for roller shutter door

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105303651A (en) * 2014-07-30 2016-02-03 许加庆 Bluetooth based two-way communication automatic locking system and method
CN106548554A (en) * 2016-12-22 2017-03-29 贵州商学院 A kind of bluetooth door opening method and door lock based on mobile terminal APP
WO2017181527A1 (en) * 2016-04-19 2017-10-26 深圳小狗科技有限公司 Shutter security control system using bluetooth function of internet-connected mobile phone
CN110930551A (en) * 2019-11-27 2020-03-27 惠州拓邦电气技术有限公司 Unlocking method and device, password authorization method and device, and door lock system
CN210776256U (en) * 2019-11-07 2020-06-16 福建安麟机电科技有限公司 System for remotely controlling and monitoring roller shutter door motor
CN111447062A (en) * 2020-04-28 2020-07-24 大陆汽车电子(长春)有限公司 Password management system for vehicle

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105303651A (en) * 2014-07-30 2016-02-03 许加庆 Bluetooth based two-way communication automatic locking system and method
WO2017181527A1 (en) * 2016-04-19 2017-10-26 深圳小狗科技有限公司 Shutter security control system using bluetooth function of internet-connected mobile phone
CN106548554A (en) * 2016-12-22 2017-03-29 贵州商学院 A kind of bluetooth door opening method and door lock based on mobile terminal APP
CN210776256U (en) * 2019-11-07 2020-06-16 福建安麟机电科技有限公司 System for remotely controlling and monitoring roller shutter door motor
CN110930551A (en) * 2019-11-27 2020-03-27 惠州拓邦电气技术有限公司 Unlocking method and device, password authorization method and device, and door lock system
CN111447062A (en) * 2020-04-28 2020-07-24 大陆汽车电子(长春)有限公司 Password management system for vehicle

Also Published As

Publication number Publication date
CN112135298A (en) 2020-12-25

Similar Documents

Publication Publication Date Title
CN109559407B (en) Time-limited secure access
US20220286847A1 (en) Method for pairing a mobile device with a wireless network
AU2014235174B2 (en) Controlling physical access to secure areas via client devices in a networked environment
EP2076078B1 (en) Defining a boundary for wireless network using physical access control systems
CN105378648B (en) Self-configuring access control
US20040177072A1 (en) Smart environment
JP2022110033A (en) Access control system and access control method using the same
EP2820584B1 (en) System and method for access decision evaluation for building automation and control systems
US20050048951A1 (en) Method and system for alternative access using mobile electronic devices
US20090216587A1 (en) Mapping of physical and logical coordinates of users with that of the network elements
CN113168484B (en) Authentication method, device and storage medium
AU2002356699A1 (en) Method for intrusion detection in a database system
JP2015057703A (en) Distributed event in access control system
US11641586B2 (en) Mobile device location determination
CN112135298B (en) Anti-decoding Bluetooth broadcast rolling door control method
US20230401913A1 (en) Access control device and system
WO2023280277A1 (en) Control method and system
CA3080097A1 (en) Managing and controlling access to secured areas
US20050071673A1 (en) Method and system for secure authentication using mobile electronic devices
US20130038448A1 (en) Access Control System
CN105447372A (en) Intelligent security early warning system
US20210037381A1 (en) Method and System for Authorizing the Communication of a Network Node
CN109743538A (en) Monitor video checks control method
KR102259156B1 (en) Authentication system and method for network environment
US20210327176A1 (en) Tamper detection in a stationary credential reader device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant