CN112425116A - Intelligent door lock wireless communication method, intelligent door lock, gateway and communication equipment - Google Patents

Intelligent door lock wireless communication method, intelligent door lock, gateway and communication equipment Download PDF

Info

Publication number
CN112425116A
CN112425116A CN201880094566.1A CN201880094566A CN112425116A CN 112425116 A CN112425116 A CN 112425116A CN 201880094566 A CN201880094566 A CN 201880094566A CN 112425116 A CN112425116 A CN 112425116A
Authority
CN
China
Prior art keywords
door lock
intelligent door
gateway
control instruction
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201880094566.1A
Other languages
Chinese (zh)
Other versions
CN112425116B (en
Inventor
周培锋
黄灿武
钟智渊
郑权
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Lutuo Technology Co Ltd
Original Assignee
Shenzhen Lutuo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Lutuo Technology Co Ltd filed Critical Shenzhen Lutuo Technology Co Ltd
Publication of CN112425116A publication Critical patent/CN112425116A/en
Application granted granted Critical
Publication of CN112425116B publication Critical patent/CN112425116B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention relates to an intelligent door lock wireless communication method, an intelligent door lock, a gateway and communication equipment. The wireless communication method for the intelligent door lock comprises the following steps: receiving control instruction data forwarded by a gateway, wherein the control instruction data is obtained by encrypting a control instruction generated by a client according to user trigger operation by the gateway; decrypting the control instruction data according to a symmetric encryption algorithm to obtain decrypted data; performing secondary decryption on the decrypted data according to an encryption algorithm configured in a specified communication protocol to obtain a control instruction, wherein the specified communication protocol is used for establishing communication connection with the gateway; and controlling the intelligent door lock to execute corresponding operation according to the control instruction. The invention solves the problem of poor security of wireless communication between the intelligent door lock and the gateway in the prior art.

Description

Intelligent door lock wireless communication method, intelligent door lock, gateway and communication equipment Technical Field
The invention relates to the technical field of intelligent home, in particular to an intelligent door lock wireless communication method, an intelligent door lock, a gateway and communication equipment.
Background
With the rapid development of the intelligent home technology, the intelligent door lock is produced.
At least one of wireless communication chips such as zigBee, Bluetooth, wiFi, NBIOT, 433 generally put into to present intelligent lock for the user can borrow the intelligent lock customer end of operation in the terminal and realize and the gateway between mutual, and then through gateway remote control intelligent lock, for example, look over the record of unblanking of intelligent lock etc. with this promotion user experience.
However, the communication process between the intelligent door lock and the gateway is easily intercepted, so that the security of the wireless communication between the intelligent door lock and the gateway is poor.
In order to improve the security of wireless communication between intelligent lock and the gateway, prior art adopts hardware encryption scheme to encrypt the data of transmission between intelligent lock and the gateway in the communication process usually, but this scheme needs additionally to increase the encryption chip in intelligent lock, and then leads to the volume of intelligent lock too big, causes the manufacturing cost of intelligent lock to be high.
From the above, how to provide an intelligent door lock with low cost and high wireless communication security is still to be solved.
Disclosure of Invention
Based on the technical problem, the invention provides an intelligent door lock wireless communication method, an intelligent door lock, a gateway and communication equipment.
The technical scheme adopted by the invention is as follows:
a method of intelligent door lock wireless communication, comprising: receiving control instruction data forwarded by a gateway, wherein the control instruction data is obtained by encrypting a control instruction generated by a client according to user trigger operation by the gateway; decrypting the control instruction data according to a symmetric encryption algorithm to obtain decrypted data; performing secondary decryption on the decrypted data according to an encryption algorithm configured in a specified communication protocol to obtain a control instruction, wherein the specified communication protocol is used for establishing communication connection with the gateway; and controlling the intelligent door lock to execute corresponding operation according to the control instruction.
An intelligent door lock wireless communication method comprises the following steps: a gateway receives a control instruction sent by a client, wherein the control instruction is generated by the client according to a user trigger operation; encrypting the control instruction according to an encryption algorithm configured in a specified communication protocol to obtain encrypted data; encrypting the encrypted data for the second time according to a symmetric encryption algorithm to obtain control instruction data; and sending the control instruction data to the intelligent door lock.
An intelligent door lock comprising: the control instruction data receiving module is used for receiving control instruction data sent by a gateway, wherein the control instruction data is obtained by encrypting a control instruction generated by a client according to user trigger operation by the gateway; the first decryption module is used for decrypting the control instruction data according to a symmetric encryption algorithm to obtain decrypted data; the second decryption module is used for carrying out secondary decryption on the decrypted data according to an encryption algorithm configured in a specified communication protocol to obtain a control instruction, wherein the specified communication protocol is used for establishing communication connection with the gateway; and the control instruction execution module is used for controlling the intelligent door lock to execute corresponding operation according to the control instruction. A gateway, comprising: the control instruction receiving module is used for receiving a control instruction sent by a client, wherein the control instruction is generated by the client according to user trigger operation; the first encryption module is used for encrypting the control instruction according to an encryption algorithm configured in a specified communication protocol to obtain encrypted data; the second encryption module is used for carrying out second encryption on the encrypted data according to the symmetric encryption algorithm to obtain control instruction data; and the control instruction data sending module is used for sending the control instruction data to the intelligent door lock.
A communication device comprising a processor and a memory, the memory having stored thereon computer readable instructions which, when executed by the processor, implement the intelligent door lock wireless communication method as described above.
In the technical scheme, the control instruction data sent to the intelligent door lock by the gateway is obtained by encrypting the control instruction generated by the client according to the user triggering operation by the gateway, after receiving the control instruction data, the intelligent door lock sequentially decrypts twice according to the symmetric encryption algorithm and the encryption algorithm configured in the specified communication protocol to obtain the control instruction, and then executes corresponding operation according to the decrypted control instruction.
Therefore, through twice encryption, the complexity of decrypting the control instruction data is increased, and the risk of leaking a third party is reduced possibly because of incapability of cracking even if the control instruction data sent to the intelligent door lock by the gateway is intercepted, so that the safety of wireless communication between the intelligent door lock and the gateway is fully ensured, and the wireless communication safety of the intelligent door lock is greatly improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
FIG. 1 is a schematic illustration of an implementation environment in accordance with the present invention.
Fig. 2 is a block diagram illustrating a hardware configuration of an intelligent door lock according to an exemplary embodiment.
Fig. 3 is a flow chart illustrating a method of wireless communication for an intelligent door lock according to an exemplary embodiment.
FIG. 4 is a flow chart of one embodiment of step 130 of the corresponding embodiment of FIG. 3.
Fig. 5 is a flow chart of one embodiment of step 135 of the corresponding embodiment of fig. 4.
Fig. 6 is a flow chart illustrating another method of wireless communication for an intelligent door lock, according to an example embodiment.
Fig. 7 is a flowchart illustrating a wireless communication method for an intelligent door lock according to an exemplary embodiment.
Fig. 8 is a flow chart illustrating another method of wireless communication for an intelligent door lock, according to an example embodiment.
Fig. 9 is a flowchart illustrating an intelligent door lock wireless communication method applied to an intelligent door lock wireless communication system according to an exemplary embodiment.
FIG. 10 is a block diagram illustrating another intelligent door lock, according to an example embodiment.
Fig. 11 is a block diagram illustrating a gateway in accordance with an example embodiment.
While specific embodiments of the invention have been shown by way of example in the drawings and will be described in detail hereinafter, such drawings and description are not intended to limit the scope of the inventive concepts in any way, but rather to explain the inventive concepts to those skilled in the art by reference to the particular embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
FIG. 1 is a schematic illustration of an implementation environment according to the present invention. As shown in fig. 1, the implementation environment is an intelligent door lock wireless communication system in the internet of things, and the intelligent door lock wireless communication system includes a terminal 100, a gateway 200, and an intelligent door lock 300.
The intelligent door lock 300 establishes a wireless or wired network connection with the gateway 200 through a communication module configured by itself, and further realizes communication with the gateway 200 through the network connection. The communication module configured for the intelligent door lock 300 includes any one or more of a ZigBee communication module, a Bluetooth module, and a WiFi communication module.
The gateway 200 may be a router, or any other electronic device capable of establishing a wireless or wired network connection with the intelligent door lock 300, and is not limited herein.
The terminal 100 may be a smart phone, a tablet computer, a notebook computer, a computer, or any other electronic device capable of being operated by the smart door lock client, which is not limited herein. A wireless or wired network connection is pre-established between the terminal 100 and the gateway 200 to enable interaction between the terminal 100 and the gateway 200 through the network connection.
Referring to fig. 2, fig. 2 is a block diagram illustrating a hardware structure of an intelligent door lock according to an exemplary embodiment. It should be noted that the intelligent door lock is only an example adapted to the present invention, and should not be considered as providing any limitation to the scope of the present invention. Nor should the intelligent door lock be interpreted as requiring reliance on, or necessity of, one or more of the components of the exemplary intelligent door lock illustrated in fig. 2.
As shown in fig. 2, the smart door lock includes a microprocessor 401, a memory 402, a communication module 403, a pairing module 404, a fingerprint acquisition module 405, an image acquisition module 406, and a power supply module 407. These components communicate with each other via one or more communication buses or signal lines.
The microprocessor 401 is used as a core module of data processing of the intelligent door lock, and is used for calculating data stored in the memory 402 of the intelligent door lock.
The memory 402 is also used for storing computer readable instructions and modules, such as computer readable instructions and modules corresponding to the intelligent door lock wireless communication method and system in the exemplary embodiment of the present invention, and the processor 401 executes the computer readable instructions stored in the memory 402, thereby performing various functions and data processing, i.e., completing the intelligent door lock wireless communication method. The memory 402 may be random access memory, e.g., high speed random access memory, non-volatile memory such as one or more magnetic storage devices, flash memory, or other solid state memory. The storage means may be a transient storage or a permanent storage.
The communication module 403 is configured to establish a communication connection between the intelligent door lock and the gateway according to a specified communication protocol, so that the intelligent door lock and the gateway perform data transmission, for example, control instruction data sent by the gateway to the intelligent door lock, data to be sent reported by the intelligent door lock to the gateway, and the like. The communication module 403 may be a wireless communication chip, for example, the wireless communication chip may be any one of a ZigBee chip, a Bluetooth chip, or a WiFi chip.
The pairing module 404 is configured to perform pairing between the intelligent door lock and the gateway, and the pairing module 404 may be a pairing button arranged on the intelligent door lock, through which a user pairs the intelligent door lock and the gateway.
Fingerprint collection module 405 is used for gathering the person's fingerprint of unblanking, only when the person's fingerprint of unblanking that it gathered is effective fingerprint, just can control intelligent lock execution operation of unblanking. For example, when the fingerprint of the person who unlocks who fingerprint collection module 405 gathered can match with the user fingerprint that was prestored in intelligent door lock memory 402, then the fingerprint of the person who unlocks that fingerprint collection module 405 gathered is effective fingerprint.
The image capturing module 406 is configured to capture image information of an environment around the intelligent door lock, for example, the image capturing module 406 is a built-in camera, so as to increase security of the intelligent door lock. For example, when fingerprint acquisition module 405 is acquiring the fingerprint of the person who unlocks the lock, image acquisition module 406 simultaneously performs an image acquisition operation on the face of the person who unlocks the lock in order to verify the identity of the person who unlocks the lock.
Further, the intelligent door lock further includes an image recognition module (not shown in fig. 2), which recognizes the image of the face of the unlocking person collected by the image collection module 406, and if the recognized image of the face of the unlocking person matches with the face data of the user pre-stored in the intelligent door lock memory 402, it indicates that the unlocking person is a legal user, and then the intelligent door lock is controlled to execute the unlocking operation.
It will be appreciated that the configuration shown in fig. 2 is merely illustrative and that the smart door lock may include more or fewer components than shown in fig. 2, or different components than shown in fig. 2. The components shown in fig. 2 may be implemented in hardware, software, or a combination thereof.
Fig. 3 is a flowchart illustrating an intelligent door lock wireless communication method according to an exemplary embodiment, which is suitable for the intelligent door lock shown in the implementation environment of fig. 1, and the hardware structure of the intelligent door lock is as shown in fig. 2.
The intelligent door lock wireless communication method is executed by the intelligent door lock and can comprise the following steps:
in step 110, control instruction data forwarded by the gateway is received, where the control instruction data is obtained by encrypting, by the gateway, a control instruction generated by the client according to the user trigger operation.
The user triggering operation is that the user triggers the operation in the client interface. The operation of the user triggering the client interface can enable the client to generate a corresponding control instruction, and the control instruction is used for controlling the intelligent door lock to execute the corresponding operation. For example, in one embodiment, the client-side interface adds an unlocking user addition entry to the user, and if the user wishes to add a new unlocking user, the user addition entry in the client-side interface triggers an "add unlocking user" operation, so that the intelligent door lock learns that the user wishes to add the new unlocking user, and further generates an "add unlocking user" control instruction accordingly.
Certainly, in other embodiments, the control instruction generated by the client in response to the user trigger operation may further include a "delete unlock user" control instruction, a "synchronize unlock user" control instruction, a "set temporary unlock password" control instruction, a "set user sign-in password" control instruction, an "intelligent door lock unlock record acquisition" control instruction, and the like, where a specific type of the control instruction is not limited, and accordingly, the intelligent door lock wireless communication method provided in this embodiment is applicable to different application scenarios according to the type of the control instruction, for example, the "add unlock user" control instruction corresponds to a fingerprint addition application scenario, and the "intelligent door lock unlock record acquisition" control instruction corresponds to an unlock behavior acquisition application scenario.
For the gateway, after the client generates a control instruction according to the user triggering operation and sends the generated control instruction to the gateway, the gateway can receive the control instruction sent by the client and encrypt the control instruction, so that the security of wireless communication between the gateway and the intelligent door lock is ensured.
Specifically, the control instruction is firstly encrypted for the first time according to an encryption algorithm configured in a specified communication protocol to obtain encrypted data, and then the encrypted data is encrypted for the second time according to a symmetric encryption algorithm to obtain control instruction data.
Therefore, for the intelligent door lock, after the gateway encrypts the control command sent by the client twice to obtain the control command data, the gateway can receive the control command data sent by the gateway.
Furthermore, the intelligent door lock and the gateway are respectively provided with a communication module, so that the intelligent door lock and the gateway are respectively connected with each other through a wireless or wired network according to a specified communication protocol supported by the communication module, and further, the communication between the intelligent door lock and the gateway is realized through the network connection.
The designated communication protocol can be any one of a ZigBee protocol, a Bluetooth protocol and a WiFi protocol, correspondingly, no matter the designated communication protocol is an intelligent door lock or a gateway, the designated communication protocol and the designated communication protocol are consistent with each other through communication modules configured by the intelligent door lock and the gateway, and the designated communication protocol can be any one or more of a ZigBee communication module, a Bluetooth module and a WiFi communication module.
In order to ensure the security of wireless communication between the intelligent door lock and the gateway, the specified communication protocols are all configured with encryption algorithms, for example, if the specified communication protocol is a ZigBee protocol, the configured encryption algorithm is an initial symmetric encryption algorithm, so that the encryption complexity is effectively reduced on the premise of ensuring the security of wireless communication.
Still further, symmetric encryption algorithms include, but are not limited to: DES algorithm, 3DES algorithm, TDEA algorithm, Blowfish algorithm, RC5 algorithm, IDEA algorithm, ASE algorithm and the like, so that the safety of wireless communication between the intelligent door lock and the gateway is simply and effectively ensured.
Of course, in other application scenarios, an asymmetric encryption algorithm with higher complexity and higher security may also be adopted according to the actual processing capability of the smart door lock, for example, the asymmetric encryption algorithm includes but is not limited to: RSA algorithm, Elgamal algorithm, knapsack algorithm, Rabin algorithm, D-H algorithm, ECC (elliptic curve cryptography) algorithm, etc.
In step 130, the control instruction data is decrypted according to a symmetric encryption algorithm to obtain decrypted data.
The control instruction data is obtained by encrypting the control instruction sent by the client twice by the gateway, namely the first encryption is carried out according to an encryption algorithm configured in a specified communication protocol, and the second encryption is carried out according to a symmetric encryption algorithm.
It should be understood that symmetric encryption algorithm means that the encryption algorithm used for encryption and decryption are identical. Therefore, after receiving the control instruction data sent by the gateway, the intelligent door lock firstly decrypts the control instruction data for the first time by using a symmetric encryption algorithm.
For example, if the symmetric encryption algorithm used by the gateway to encrypt the encrypted data is the ASE algorithm, the symmetric encryption algorithm used by the intelligent door lock to decrypt the control instruction data is correspondingly the ASE algorithm.
In step 150, performing secondary decryption on the decrypted data according to an encryption algorithm configured in a specified communication protocol, to obtain a control instruction, where the specified communication protocol is used to establish a communication connection with the gateway.
After the control instruction data sent by the gateway is decrypted for the first time by executing the symmetric encryption algorithm, the intelligent door lock also decrypts the decrypted data for the second time according to the encryption algorithm configured in the specified communication protocol.
As mentioned above, the intelligent door lock and the gateway are respectively configured with a communication module, so that the intelligent door lock and the gateway are respectively connected with each other through a wireless or wired network according to a specified communication protocol supported by the communication module configured for the intelligent door lock and the gateway, and further, the communication between the intelligent door lock and the gateway is realized through the network connection.
Therefore, for the intelligent door lock, the adopted specified communication protocol is consistent with the specified communication protocol in the gateway, so that secondary decryption of the decrypted data is realized.
For example, if the designated communication protocol adopted by the communication module configured by the gateway is the ZigBee protocol, and the encryption algorithm configured by the designated communication protocol is the initial symmetric encryption algorithm, then, in the communication module configured by the smart door lock, the designated communication protocol is also the ZigBee protocol, and accordingly, the encryption algorithm configured by the designated communication protocol is also the initial symmetric encryption algorithm.
In step 170, the intelligent door lock is controlled to execute corresponding operations according to the control command.
The intelligent door lock respectively adopts a symmetric encryption algorithm and an encryption algorithm configured in a specified communication protocol to decrypt the control instruction data twice, and after the control instruction generated by the client according to the user trigger operation is obtained, the intelligent door lock can execute corresponding operation according to the control instruction.
In an embodiment, if the control instruction instructs the intelligent door lock to perform the operation of adding the unlocking user, the intelligent door lock correspondingly performs the operation of adding the unlocking user, and the fingerprint acquired at the moment is stored in the memory as the user fingerprint, so that the user can conveniently and subsequently use the fingerprint to control the intelligent door lock to perform the unlocking operation.
In this embodiment, the control instruction data sent by the gateway to the intelligent door lock is encrypted twice by the encryption algorithm configured by the specified communication protocol and the symmetric encryption algorithm, so that the security of the transmission of the control instruction data between the intelligent door lock and the gateway is fully ensured, and the security of the wireless communication between the intelligent door lock and the gateway is greatly improved.
In addition, the encryption algorithm and the symmetric encryption algorithm configured by the appointed communication protocol in the intelligent door lock can run in the microprocessor of the intelligent door lock in a client-side mode, namely, the data transmitted between the intelligent door lock and the gateway in the communication process is encrypted by adopting a software encryption scheme, the size of the intelligent door lock cannot be additionally increased, and the production cost of the intelligent door lock is further reduced.
Fig. 4 is a flowchart illustrating the generation of a first key for executing a symmetric encryption algorithm by the smart door lock according to an exemplary embodiment.
As shown in fig. 4, the process of generating the first key by the smart door lock may include the following steps:
in step 131, the first key base sent by the gateway is received, and a second key base is randomly generated according to the first key base.
It should be noted that, in the present embodiment, the smart door lock is configured with a two-dimensional code, which is regarded as a third key base for generating the first key. The third key base is a random number, and the number of bits of the random number is predetermined, for example, the number of bits of the random number is 128 bits.
In an embodiment, the two-dimensional code configured for the smart door lock is used for the smart door lock client to scan, or the user inputs the two-dimensional code into the smart door lock client, so that the smart door lock client identifies the two-dimensional code, thereby obtaining a third key base number represented by the two-dimensional code, and further sending the third key base number to the gateway through interaction between a terminal operated by the smart door lock client and the gateway.
After receiving the third key base number sent by the intelligent door lock client, the gateway can randomly generate the first key base number, store the first key base number in the gateway, and send the first key base number to the intelligent door lock.
For the intelligent door lock, a first key base number sent by the gateway can be received, a second key base number is randomly generated according to the first key base number and is stored in the intelligent door lock, and meanwhile, the second key base number is reported to the gateway.
In step 133, the third key base is read from the memory of the smart door lock.
As described above, the smart door lock is provided with a two-dimensional code, which is regarded as a third key base for generating the first key.
In one embodiment, before the smart door lock leaves the factory, the two-dimensional code is burned into the smart door lock, so that the smart door lock stores the two-dimensional code, for example, the two-dimensional code regarded as the third key base is stored in the memory.
In another embodiment, the two-dimensional code is further attached to the smart door lock in the form of a two-dimensional code label, for example, on the inner side of a battery rear cover of the smart door lock, so that a user can perform two-dimensional code scanning by means of a smart door lock client.
For a smart door lock, the third key base may then be read from memory before the first key is generated.
In step 135, a key operation is performed on the first key base, the second key base, and the third key base to obtain a first key for executing the symmetric encryption algorithm.
After the first key base number, the second key base number and the third key base number are obtained, the intelligent door lock can perform key operation according to the three key base numbers to obtain a first key.
It should be understood that symmetric encryption algorithm means that the encryption algorithm used for encryption and decryption is identical, i.e. the key used for encryption and decryption is symmetric.
Thus, after obtaining the first key base number, the second key base number and the third key base number, the gateway performs a key operation on the obtained three key base numbers by using a symmetric encryption algorithm, so as to obtain a second key symmetric to the first key.
In one embodiment, the key operation is implemented by a message digest algorithm, which may include, for example, a hash operation.
Under the effect of the embodiment, the first key acquired by the intelligent door lock is obtained by performing key calculation on the first key base number, the second key base number and the third key base number, so that the generation of the first key is derived from multi-party data, the complexity of cracking the first key is increased, and the security of wireless communication between the intelligent door lock and the gateway is further enhanced.
FIG. 5 is a flowchart illustrating a key operation of the smart door lock based on the first key base, the second key base, and the third key base in accordance with an exemplary embodiment.
As shown in fig. 5, the process of the smart door lock performing the key operation according to the three key bases may include the following steps:
in step 1351, the first key base, the second key base, and the third key base are operated according to a message digest algorithm to obtain message digest data.
The message digest algorithm preferably adopts irreversible digest operation to ensure that the generated first key is not easy to crack. The message digest algorithm may employ hash operations including, but not limited to, SHA-1 operations or MD5 operations, but SHA-1 operations are preferred in this embodiment.
For convenience of understanding, for example, assuming that the first key base is a, the second key base is B, and the third key base is C, the operation formula for performing the digest operation on the first key base, the second key base, and the third key base by using the SHA-1 operation is SHA-1(a + B + C). Where "a + B + C" denotes that the first, second, and third key bases are numerically concatenated, for example, assuming that a is "1010", B is "1101", C is "1001", and "a + B + C" is "101011011001".
In one embodiment, the third key base is a 128-bit random number, the first key base is a 32-bit random number, and the second key base is a 32-bit random number, the three key bases are concatenated to obtain a 192-bit random number, and the message digest algorithm operates on the 192-bit random number to obtain the message digest data.
For example, if SHA-1 operation is adopted, 160-bit message digest data is generated; if the MD5 operation is used, 128-bit message digest data is generated.
In step 1353, specified data is extracted from the message digest data as the first key.
In order to further ensure that the first secret key is not cracked, the intelligent door lock extracts specified data from the generated message digest data, the extracted specified data is used as the first secret key, and the generated first secret key is stored, so that the intelligent door lock can be called in the subsequent wireless passing process between the intelligent door lock and the gateway.
Taking SHA-1 operation as an example for explanation, assuming that 160-bit message digest data is generated, the low 128-bit number in the 160-bit message digest data may be extracted as the first key, the high 128-bit number in the 160-bit message digest data may also be extracted as the first key, or 128-bit numbers in the 160-bit message digest data may be extracted at random as the first key by negotiating with the gateway, which is not limited herein.
In the embodiment, the smart door lock adopts the message digest algorithm to generate the message digest data, and extracts the specified data from the generated message digest data as the first key, because the message digest algorithm is irreversible, and the extraction of the fixed bit number from the generated message digest data can be randomly specified, the complexity of cracking the first key is fully ensured.
Similarly, in the gateway device, the gateway adopts the same message digest algorithm as the intelligent door lock to calculate the acquired first key base number, the acquired second key base number and the acquired third key base number, and extracts the same designated data from the calculated message digest data to be used as the second key for storage, so as to ensure that the second key is completely consistent with the first key, and further provide a basis for executing the symmetric key algorithm, so as to facilitate the subsequent realization of the security of the wireless communication between the intelligent door lock and the gateway.
Fig. 6 is a flowchart illustrating a method of wireless communication for an intelligent door lock, according to another exemplary embodiment. As shown in fig. 6, the intelligent door lock wireless communication method may further include the steps of:
in step 210, the door lock data stored in the intelligent door lock is encrypted according to the encryption algorithm configured in the specified communication protocol, so as to obtain encrypted data.
The door lock data stored by the intelligent door lock comprise behavior data generated by the intelligent door lock and state data of the intelligent door lock assembly. In one embodiment, the behavior data generated by the intelligent door lock comprises unlocking records and abnormal alarm records.
The unlocking record comprises at least one of unlocking time, unlocking environment and user information, specifically, the unlocking time is the time of unlocking operation executed by the intelligent door lock, the unlocking environment is the face image of the unlocking person shot by the built-in camera of the intelligent door lock when the unlocking operation is executed, and the user information can be the fingerprint of an unlocking person acquired by the fingerprint acquisition module when the unlocking operation is executed by the intelligent door lock or a user account of a client executing control remote unlocking.
The abnormal alarm records comprise at least one of abnormal alarm time and abnormal alarm reasons, wherein the abnormal alarm time is the time for the intelligent door lock to execute the abnormal alarm action, and the abnormal alarm reasons are the trigger reasons for triggering the abnormal alarm action by the intelligent door lock.
In another embodiment, the intelligent door lock assembly comprises at least one of a doorbell, a speaker and a lock tongue, the state data of the intelligent door lock assembly comprises at least one of a doorbell state, a speaker volume, a speaker language and a lock tongue state, specifically, the doorbell state comprises a doorbell closing/opening state, the speaker volume is a volume level state of the speaker playing the prompt voice of the door lock, and the speaker language state comprises a language type of the speaker playing the prompt voice of the door lock, such as a Chinese voice, an English voice, a Korean voice and the like.
The behavior data generated by the intelligent door lock and the state data of the intelligent door lock assembly are stored in the self-configured memory.
The reporting of the door lock data may be performed according to the actual requirements of the user, for example, the reporting may be performed to the gateway in response to a control instruction generated by the client according to the user trigger operation, or may be performed automatically, for example, the unlocking record may be automatically reported to the gateway after the intelligent door lock has performed the unlocking operation.
The encryption algorithm configured in the specified communication protocol is the same as the encryption algorithm configured in the specified communication protocol in step 150, and is not described herein again.
In step 230, the encrypted data is encrypted for the second time according to the symmetric encryption algorithm to obtain data to be sent.
The intelligent door lock encrypts the unlocking record for the first time according to an encryption algorithm configured in the specified communication protocol, and then encrypts the encrypted data for the second time according to a symmetric encryption algorithm stored in the communication module to obtain data to be sent.
As previously described, the smart door lock performs a symmetric encryption algorithm using the first key to encrypt the encrypted data a second time. The obtained data to be sent are data obtained by secondarily encrypting the unlocking records by the intelligent door lock according to an encryption algorithm and a symmetric encryption algorithm configured by a specified communication protocol.
In step 250, the data to be sent is reported to the gateway.
The intelligent door lock reports the data to be sent obtained through secondary encryption to the gateway, so that the gateway decrypts the received data to be sent for the second time and sends the unlocking record obtained through decryption to the client.
Specifically, for the gateway, after receiving data to be transmitted sent by the intelligent door lock, the gateway decrypts the data to be transmitted according to the same symmetric encryption algorithm as the intelligent door lock to obtain corresponding decrypted data, and then decrypts the decrypted data for the second time according to the encryption algorithm configured by the specified communication protocol to obtain the door lock data.
After the gateway decrypts the unlocking records sent by the intelligent door lock, the decrypted door lock data are sent to the client side, so that the client side can display the door lock data in a client side interface for a user to check.
In this embodiment, the intelligent door lock encrypts the door lock data according to the encryption algorithm and the symmetric encryption algorithm configured in the specified communication protocol, and the data to be sent obtained by the secondary encryption of the intelligent door lock can be decrypted only according to the corresponding secondary decryption method, so that the security of sending the data outwards by the intelligent door lock is ensured, and the security of wireless communication of the intelligent door lock is further improved.
Fig. 7 is a flowchart illustrating a method of wireless communication for an intelligent door lock, according to another exemplary embodiment. As shown in fig. 7, the intelligent door lock wireless communication method may further include the steps of:
in step 310, an intelligent door lock pairing instruction sent by the gateway is received, and pairing operation triggered by a user is detected according to the intelligent door lock pairing instruction.
Before establishing communication connection with the gateway, the intelligent door lock needs to be paired with the gateway, and after the intelligent door lock is successfully paired with the gateway, the intelligent door lock can be in communication connection with the gateway, so that data transmission is performed through communication connection.
The intelligent door lock pairing instruction which is received by the intelligent door lock and paired with the gateway is generated by the client side and is forwarded to the intelligent door lock through the gateway.
Specifically, the client adds a pairing inlet for the user in the client interface, if the user wants to perform pairing between the gateway and the intelligent door lock, related operations are triggered at the pairing inlet, so that the client generates an intelligent door lock pairing instruction according to the related operations, reports the intelligent door lock pairing instruction to the gateway, and sends the intelligent door lock pairing instruction to the intelligent door lock through the gateway.
For the intelligent door lock, after an intelligent door lock pairing instruction sent by a gateway is received, pairing operation triggered by a user in the intelligent door lock is detected in response to the intelligent door lock pairing instruction.
In an embodiment, the intelligent door lock is configured with a pairing key, and when a user presses the pairing key, the intelligent door lock can detect pairing operation triggered by the user. The pressing operation is a pairing operation triggered by a user in the intelligent door lock.
Here, the pairing operation triggered by the user may be a long-time pressing of the pairing key or a short-time pressing of the pairing key, which is related to a preset triggering manner of the smart door lock by the user, and is not limited herein.
In step 330, if the pairing operation triggered by the user is detected, pairing the intelligent door lock and the gateway is performed, so that a communication connection is established between the intelligent door lock and the gateway.
And if the intelligent door lock detects the pairing operation triggered by the user, executing the pairing operation with the gateway so as to facilitate the establishment of communication connection with the gateway.
Further, after the intelligent door lock is successfully paired with the gateway, the pairing result can be sent to the client through the gateway, so that the user can obtain the pairing result of the intelligent door lock and the gateway through the client.
Fig. 8 is a flowchart illustrating a method of wireless communication for an intelligent door lock, according to another exemplary embodiment. As shown in fig. 8, the intelligent door lock wireless communication method may further include the steps of:
in step 410, the verification information stored in the smart door lock is encrypted according to the symmetric encryption algorithm to obtain verification information.
When the intelligent door lock performs decryption/encryption operation on received/transmitted data, the first secret key is used for executing a symmetric encryption algorithm, and when the gateway performs decryption/encryption operation on the received/transmitted data, the second secret key is used for executing the symmetric encryption algorithm.
In order to verify the consistency of the first secret key and the second secret key, the intelligent door lock uses the first secret key as a secret key of a symmetric encryption algorithm to encrypt the stored verification information, and the verification information is obtained. The verification information stored by the intelligent door lock specifically comprises magic numbers agreed by the intelligent door lock and the gateway in advance, and the magic numbers are stored in the intelligent door lock and the gateway.
In step 430, the authentication information is sent to the gateway.
The intelligent door lock sends the encrypted verification information to the gateway, so that the gateway decrypts the verification information according to a corresponding symmetric encryption algorithm.
Specifically, for the gateway, the gateway decrypts the authentication information using the second key when executing the symmetric encryption algorithm, and verifies the decrypted authentication information. The process of verifying the verification information obtained by decrypting by the gateway is specifically a numerical comparison process.
For example, it is described that the verification information carries a magic number negotiated in advance between the smart door lock and the gateway, and if the magic number obtained by the gateway performing the symmetric encryption algorithm decryption is the same as the magic number stored in the gateway, it indicates that the first key and the second key are the same, and the process continues to execute the content described in step 450.
On the contrary, if the magic number obtained by decryption of the gateway is different from the magic number stored in the gateway, the verification is not passed, the first secret key is inconsistent with the second secret key, and in order to prevent data leakage of the intelligent door lock, the communication connection between the intelligent door lock and the gateway can be interrupted, so that the intelligent door lock and the gateway cannot perform data transmission.
In step 450, when the authentication information indicates that the intelligent door lock passes the authentication of the gateway, a communication connection between the intelligent door lock and the gateway is established.
When the verification information obtained by the gateway through executing the symmetric encryption algorithm decryption is completely consistent with the verification information stored in the gateway, the fact that the intelligent door lock passes the verification of the gateway is indicated. Only after the intelligent door lock passes through the gateway verification, the intelligent door lock can establish communication connection with the gateway, and data transmission can be carried out between the intelligent door lock and the gateway.
In this embodiment, the verification information stored in the intelligent door lock is encrypted by the symmetric encryption algorithm and then sent to the gateway, so that the verification is performed after the verification information is decrypted by the gateway, and only after the verification information indicates that the intelligent door lock passes the verification of the gateway, the intelligent door lock can establish communication connection with the gateway, thereby ensuring that the subsequent data transmission process between the intelligent door lock and the gateway can be performed accurately.
Fig. 9 is a flowchart illustrating an intelligent door lock wireless communication method applied to an intelligent door lock system according to an exemplary embodiment. The intelligent door lock system comprises a gateway and an intelligent door lock.
As shown in fig. 9, the wireless communication method for the intelligent door lock includes the following steps:
in step 510, the gateway receives a control command generated by the client according to the user trigger operation.
The client generates a corresponding control instruction according to user trigger operation, and sends the generated control instruction to the gateway so that the gateway receives the control instruction.
And the control instruction generated by the client is used for controlling the intelligent door lock to execute corresponding operation.
In step 520, the control command is encrypted according to an encryption algorithm configured in a specified communication protocol to obtain encrypted data.
After receiving the control instruction sent by the client, the gateway encrypts the control instruction for the first time according to an encryption algorithm configured in a specified communication protocol to obtain encrypted data.
The specified communication protocol executed by the gateway is configured in the communication module of the gateway, and the specific protocol type is as described above, which is not described herein again.
In step 530, the encrypted data is encrypted for the second time according to a symmetric encryption algorithm to obtain control instruction data sent to the intelligent door lock.
And after the gateway encrypts the received control command for the first time to obtain encrypted data, encrypting the encrypted data for the second time according to a symmetric encryption algorithm to obtain control command data, and sending the obtained control command data to the intelligent door lock.
A symmetric encryption algorithm executed by the gateway is also configured in the communication module thereof, and the gateway uses the second key as a key in executing the symmetric encryption algorithm. In an exemplary embodiment, the symmetric encryption algorithm executed by the gateway may be the ASE128 encryption algorithm.
In step 540, the smart door lock receives the control command data sent by the gateway.
And the gateway sends the control instruction data obtained by secondary encryption to the intelligent door lock so that the intelligent door lock receives the control instruction data.
In step 550, the control instruction data is decrypted according to a symmetric encryption algorithm to obtain decrypted data.
After receiving the control instruction data sent by the gateway, the intelligent door lock decrypts the control instruction data for the first time by adopting a symmetric encryption algorithm to obtain decrypted data.
The symmetric encryption algorithm is configured in the communication module of the intelligent door lock, the communication module configured in the intelligent door lock corresponds to the communication module in the gateway, and the symmetric encryption algorithm executed by the intelligent door lock is the same as the symmetric encryption algorithm executed in the gateway.
When the intelligent door lock executes the symmetric encryption algorithm, the first secret key is used for decrypting the control instruction data, and the first secret key is the same as the second secret key used by the gateway, so that the intelligent door lock completes the first decryption operation on the control instruction data.
In step 560, the decrypted data is decrypted for the second time according to the encryption algorithm configured in the specified communication protocol, so as to obtain the control command, where the specified communication protocol is used to establish a communication connection with the gateway.
And after the intelligent door lock executes the symmetric encryption algorithm to obtain decrypted data, the decrypted data is decrypted for the second time according to the encryption algorithm configured in the specified communication protocol to obtain a control instruction.
The specified communication protocol used by the intelligent door lock is also configured in the communication module of the intelligent door lock and is the same as the specified communication protocol configured in the communication module in the gateway, so that the intelligent door lock and the gateway are in communication connection and perform data transmission. The encryption algorithm of the intelligent door lock using the specified communication protocol configuration is also the same as the encryption algorithm of the specified communication protocol configuration in the gateway.
In step 570, the intelligent door lock is controlled to execute corresponding operations according to the control command.
And after the gateway decrypts the control instruction data for the second time according to the symmetric encryption algorithm and the encryption algorithm configured in the specified communication protocol, the obtained control instruction is the control instruction generated by the client according to the user trigger operation.
And after the intelligent door lock obtains the control instruction, executing corresponding operation indicated by the control instruction so as to realize that the client controls the intelligent door lock through the gateway.
In this embodiment, after performing secondary encryption on the control instruction sent by the client, the gateway sends the encrypted control instruction data to the intelligent door lock, and the intelligent door lock performs corresponding secondary decryption on the control instruction data to obtain the control instruction. Therefore, in the intelligent door lock system, the data transmitted between the gateway and the intelligent door lock is obtained by carrying out secondary encryption on the gateway, and the data can be decrypted only by adopting a decryption method which is the same as the secondary encryption, so that the safety of wireless communication between the intelligent door lock and the gateway in the intelligent door lock system is fully ensured.
FIG. 10 is a block diagram illustrating an intelligent door lock, according to an exemplary embodiment. The intelligent door lock performs all or part of the steps of the wireless communication method of the intelligent door lock shown in any one of fig. 3, as shown in fig. 10, the intelligent door lock includes but is not limited to: a control instruction data receiving module 610, a first decryption module 630, a second decryption module 650, and a control instruction execution module 670.
The control instruction data receiving module 610 is configured to receive control instruction data forwarded by the gateway, where the control instruction data is generated by the client according to an operation triggered by the user and is sent to the gateway
The first decryption module 630 is configured to decrypt the control instruction data according to a symmetric encryption algorithm to obtain decrypted data.
The second decryption module 650 is configured to perform secondary decryption on the decrypted data according to an encryption algorithm configured in a specified communication protocol, so as to obtain a control instruction, where the specified communication protocol is used to establish a communication connection with the gateway.
And the control instruction execution module 670 is configured to control the intelligent door lock to execute a corresponding operation according to the decrypted control instruction.
Fig. 11 is a block diagram illustrating a gateway in accordance with an example embodiment. As shown in fig. 11, the gateway includes but is not limited to: a control instruction receiving module 710, a first encryption module 730, a second encryption module 750, and a control instruction data transmitting module 770.
The control instruction receiving module 710 is configured to receive a control instruction sent by a client, where the control instruction is generated by the client according to a user trigger operation.
The first encryption module 730 is configured to encrypt the control instruction according to an encryption algorithm configured in a specified communication protocol, so as to obtain encrypted data.
The second encryption module 750 is configured to encrypt the encrypted data for the second time according to the symmetric encryption algorithm, so as to obtain control instruction data.
The control instruction data sending module 770 is configured to send the control instruction data to the intelligent door lock.
In one exemplary embodiment, a communication device includes:
a processor; and
a memory having computer readable instructions stored thereon which, when executed by the processor, implement the methods in the embodiments described above.
The above-mentioned embodiments are merely preferred examples of the present invention, and are not intended to limit the embodiments of the present invention, and those skilled in the art can easily make various changes and modifications according to the main concept and spirit of the present invention, so that the protection scope of the present invention should be subject to the protection scope of the claims.

Claims (12)

  1. An intelligent door lock wireless communication method is characterized by comprising the following steps:
    receiving control instruction data sent by a gateway, wherein the control instruction data is obtained by encrypting a control instruction generated by a client according to user trigger operation by the gateway;
    decrypting the control instruction data according to a symmetric encryption algorithm to obtain decrypted data;
    performing secondary decryption on the decrypted data according to an encryption algorithm configured in a specified communication protocol to obtain a control instruction, wherein the specified communication protocol is used for establishing communication connection with the gateway;
    and controlling the intelligent door lock to execute corresponding operation according to the control instruction.
  2. The method of claim 1, wherein the method further comprises:
    encrypting the door lock data stored by the intelligent door lock according to an encryption algorithm configured in the specified communication protocol to obtain encrypted data;
    carrying out secondary encryption on the encrypted data according to the symmetric encryption algorithm to obtain data to be sent;
    and reporting the data to be sent to the gateway.
  3. The method of claim 1, wherein the method further comprises:
    receiving an intelligent door lock pairing instruction sent by the gateway, and detecting pairing operation triggered by a user according to the intelligent door lock pairing instruction;
    and if the pairing operation triggered by the user is detected, pairing the intelligent door lock and the gateway so as to establish communication connection between the intelligent door lock and the gateway.
  4. The method of claim 1, wherein the method further comprises:
    encrypting the verification information stored by the intelligent door lock according to the symmetric encryption algorithm to obtain verification information;
    sending the authentication information to the gateway;
    and when the verification information indicates that the intelligent door lock passes the verification of the gateway, establishing communication connection between the intelligent door lock and the gateway.
  5. The method of any of claims 1 to 4, further comprising:
    receiving a first key base number sent by the gateway, and randomly generating a second key base number according to the first key base number;
    reading a third key base from a memory of the smart door lock;
    and performing key operation on the first key base number, the second key base number and the third key base number to obtain a first key for executing the symmetric encryption algorithm.
  6. The method of claim 5, wherein said keying the first key base, the second key base, and the third key base to obtain a first key comprises:
    calculating the first key base number, the second key base number and the third key base number according to a message digest algorithm to obtain message digest data;
    extracting specified data from the message digest data as the first key.
  7. An intelligent door lock wireless communication method is characterized by comprising the following steps:
    a gateway receives a control instruction sent by a client, wherein the control instruction is generated by the client according to a user trigger operation;
    encrypting the control instruction according to an encryption algorithm configured in a specified communication protocol to obtain encrypted data;
    encrypting the encrypted data for the second time according to a symmetric encryption algorithm to obtain control instruction data;
    and sending the control instruction data to the intelligent door lock.
  8. The method of claim 7, wherein the method further comprises:
    the gateway receives data to be sent reported by the intelligent door lock, wherein the data to be sent is obtained by encrypting the door lock data stored by the intelligent door lock;
    decrypting the data to be transmitted according to the symmetric encryption algorithm to obtain decrypted data;
    carrying out second decryption on the decrypted data according to an encryption algorithm configured in the specified communication protocol to obtain the door lock data;
    and sending the door lock data to the client.
  9. The method of claim 7 or 8, wherein the method further comprises:
    the gateway receives a third key base number sent by the client and randomly generates a first key base number according to the third key base number;
    receiving a second key base number sent by the intelligent door lock;
    and carrying out key operation on the first key base, the second key base and the third key base to obtain a second key for executing the symmetric encryption algorithm.
  10. An intelligent door lock, comprising:
    the control instruction data receiving module is used for receiving control instruction data sent by a gateway, wherein the control instruction data is obtained by encrypting a control instruction generated by a client according to user trigger operation by the gateway;
    the first decryption module is used for decrypting the control instruction data according to a symmetric encryption algorithm to obtain decrypted data;
    the second decryption module is used for carrying out secondary decryption on the decrypted data according to an encryption algorithm configured in a specified communication protocol to obtain a control instruction, wherein the specified communication protocol is used for establishing communication connection with the gateway;
    and the control instruction execution module is used for controlling the intelligent door lock to execute corresponding operation according to the control instruction.
  11. A gateway, comprising:
    the control instruction receiving module is used for receiving a control instruction sent by a client, wherein the control instruction is generated by the client according to user trigger operation;
    the first encryption module is used for encrypting the control instruction according to an encryption algorithm configured in a specified communication protocol to obtain encrypted data;
    the second encryption module is used for carrying out second encryption on the encrypted data according to the symmetric encryption algorithm to obtain control instruction data;
    and the control instruction data sending module is used for sending the control instruction data to the intelligent door lock.
  12. A communication device, comprising:
    a processor; and
    a memory having computer readable instructions stored thereon which, when executed by the processor, implement the intelligent door lock wireless communication method of any of claims 1-9.
CN201880094566.1A 2018-05-18 2018-05-18 Intelligent door lock wireless communication method, intelligent door lock, gateway and communication equipment Active CN112425116B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/087400 WO2019218328A1 (en) 2018-05-18 2018-05-18 Smart door lock wireless communication method, smart door lock, gateway, and communication device

Publications (2)

Publication Number Publication Date
CN112425116A true CN112425116A (en) 2021-02-26
CN112425116B CN112425116B (en) 2023-09-26

Family

ID=68539569

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201880094566.1A Active CN112425116B (en) 2018-05-18 2018-05-18 Intelligent door lock wireless communication method, intelligent door lock, gateway and communication equipment

Country Status (2)

Country Link
CN (1) CN112425116B (en)
WO (1) WO2019218328A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114399854A (en) * 2021-12-30 2022-04-26 荣耀终端有限公司 Unlocking method of intelligent door lock, mobile device and storage medium

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114513303B (en) * 2022-01-28 2024-05-28 无锡台翔电子技术发展有限公司 Encryption password generation method and device with encryption module
CN116321538A (en) * 2023-02-21 2023-06-23 深圳市丰润达科技有限公司 Method, module, device and medium for dynamically modifying ZigBee device basic information

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101815289A (en) * 2009-02-12 2010-08-25 通用汽车有限责任公司 Utilize the method for micro-certificates protection and appraising datum
CN104680630A (en) * 2014-12-29 2015-06-03 深圳市进林科技有限公司 Method and system for controlling door locks
WO2016107088A1 (en) * 2014-12-29 2016-07-07 张泽 Centralized control method and system for intelligent door lock
US20170063807A1 (en) * 2015-08-26 2017-03-02 Tatung University Method for automatically establishing wireless connection, gateway device and client device for internet of things using the same

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100387798C (en) * 2004-11-01 2008-05-14 华为技术有限公司 Electric key and electric lock device and realization method thereof
CN103617659A (en) * 2013-11-01 2014-03-05 南京物联传感技术有限公司 Wireless unlocking method
CN104537739B (en) * 2014-12-23 2017-04-05 江苏思瑞德物联科技有限公司 Fixed main Crypto Control Unit and the safe unloading system using the controller
CN104618204A (en) * 2015-01-29 2015-05-13 杭州晟元芯片技术有限公司 Intelligent home system for guaranteeing safe and remote control based on security modules and realization method thereof
US9640061B1 (en) * 2015-12-31 2017-05-02 Google Inc. Remote alarm hushing with acoustic presence verification
CN106846573B (en) * 2017-01-17 2019-02-05 宁波耀龙软件科技有限公司 The method of opening electronic lock and corresponding electronic lock in no linking Internet

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101815289A (en) * 2009-02-12 2010-08-25 通用汽车有限责任公司 Utilize the method for micro-certificates protection and appraising datum
CN104680630A (en) * 2014-12-29 2015-06-03 深圳市进林科技有限公司 Method and system for controlling door locks
WO2016107088A1 (en) * 2014-12-29 2016-07-07 张泽 Centralized control method and system for intelligent door lock
US20170063807A1 (en) * 2015-08-26 2017-03-02 Tatung University Method for automatically establishing wireless connection, gateway device and client device for internet of things using the same

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114399854A (en) * 2021-12-30 2022-04-26 荣耀终端有限公司 Unlocking method of intelligent door lock, mobile device and storage medium

Also Published As

Publication number Publication date
CN112425116B (en) 2023-09-26
WO2019218328A1 (en) 2019-11-21

Similar Documents

Publication Publication Date Title
KR102328725B1 (en) Method of using one device to unlock another device
JP7152466B2 (en) Secure communication method and smart lock system based thereon
EP3633913B1 (en) Provisioning a secure connection using a pre-shared key
CN112425116B (en) Intelligent door lock wireless communication method, intelligent door lock, gateway and communication equipment
CA2706716C (en) Device detection with secure identity authentication
US11671259B2 (en) Neighbor awareness networking password authentication
CN108650219B (en) User identity identification method, related device, equipment and system
CN115909559A (en) Intelligent lock control method and system based on quantum random number

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant