CN112425116B - Intelligent door lock wireless communication method, intelligent door lock, gateway and communication equipment - Google Patents

Intelligent door lock wireless communication method, intelligent door lock, gateway and communication equipment Download PDF

Info

Publication number
CN112425116B
CN112425116B CN201880094566.1A CN201880094566A CN112425116B CN 112425116 B CN112425116 B CN 112425116B CN 201880094566 A CN201880094566 A CN 201880094566A CN 112425116 B CN112425116 B CN 112425116B
Authority
CN
China
Prior art keywords
door lock
intelligent door
gateway
control instruction
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201880094566.1A
Other languages
Chinese (zh)
Other versions
CN112425116A (en
Inventor
周培锋
黄灿武
钟智渊
郑权
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lumi United Technology Co Ltd
Original Assignee
Lumi United Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lumi United Technology Co Ltd filed Critical Lumi United Technology Co Ltd
Publication of CN112425116A publication Critical patent/CN112425116A/en
Application granted granted Critical
Publication of CN112425116B publication Critical patent/CN112425116B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Abstract

The invention relates to an intelligent door lock wireless communication method, an intelligent door lock, a gateway and communication equipment. The intelligent door lock wireless communication method comprises the following steps: receiving control instruction data forwarded by a gateway, wherein the control instruction data is obtained by encrypting a control instruction generated by a client according to user triggering operation by the gateway; decrypting the control instruction data according to a symmetric encryption algorithm to obtain decrypted data; performing secondary decryption on the decrypted data according to an encryption algorithm configured in a designated communication protocol, so as to obtain a control instruction, wherein the designated communication protocol is used for establishing communication connection with the gateway; and controlling the intelligent door lock to execute corresponding operation according to the control instruction. The invention solves the problem of poor safety of wireless communication between the intelligent door lock and the gateway in the prior art.

Description

Intelligent door lock wireless communication method, intelligent door lock, gateway and communication equipment
Technical Field
The invention relates to the technical field of intelligent home, in particular to an intelligent door lock wireless communication method, an intelligent door lock, a gateway and communication equipment.
Background
With the rapid development of smart home technology, smart door locks have been developed.
At least one of wireless communication chips such as ZigBee, bluetooth, wiFi, NBIOT and 433 is generally arranged in the existing intelligent door lock, so that a user can interact with a gateway through an intelligent door lock client operated in the terminal, and further the intelligent door lock is remotely controlled through the gateway, for example, unlocking records of the intelligent door lock are checked, and the user experience is improved.
However, the communication process between the smart door lock and the gateway is easily intercepted, resulting in poor security of wireless communication between the two.
In order to improve the safety of wireless communication between the intelligent door lock and the gateway, the prior art generally adopts a hardware encryption scheme to encrypt data transmitted between the intelligent door lock and the gateway in the communication process, but the scheme needs to additionally increase an encryption chip in the intelligent door lock, so that the volume of the intelligent door lock is overlarge, and the production cost of the intelligent door lock is high.
From the above, it is still to be solved how to provide an intelligent door lock with low cost and high wireless communication security.
Disclosure of Invention
Based on the technical problems, the invention provides an intelligent door lock wireless communication method, an intelligent door lock, a gateway and communication equipment.
The technical scheme adopted by the application is as follows:
in a first aspect, an embodiment of the present application provides a method for wireless communication of an intelligent door lock, including: receiving control instruction data forwarded by a gateway, wherein the control instruction data is obtained by encrypting a control instruction generated by a client according to user triggering operation by the gateway; decrypting the control instruction data according to a symmetric encryption algorithm to obtain decrypted data; performing secondary decryption on the decrypted data according to an encryption algorithm configured in a designated communication protocol, so as to obtain a control instruction, wherein the designated communication protocol is used for establishing communication connection with the gateway; and controlling the intelligent door lock to execute corresponding operation according to the control instruction.
In a second aspect, an embodiment of the present application provides a wireless communication method for an intelligent door lock, including: the gateway receives a control instruction sent by a client, wherein the control instruction is generated by the client according to a user triggering operation; encrypting the control instruction according to an encryption algorithm configured in a specified communication protocol to obtain encrypted data; performing secondary encryption on the encrypted data according to a symmetric encryption algorithm to obtain control instruction data; and sending the control instruction data to the intelligent door lock.
In a third aspect, an embodiment of the present application provides an intelligent door lock, including: the control instruction data receiving module is used for receiving control instruction data sent by the gateway, wherein the control instruction data is obtained by encrypting a control instruction generated by the client according to user triggering operation by the gateway; the first decryption module is used for decrypting the control instruction data according to a symmetric encryption algorithm to obtain decrypted data; the second decryption module is used for performing secondary decryption on the decrypted data according to an encryption algorithm configured in a designated communication protocol, so as to obtain a control instruction, wherein the designated communication protocol is used for establishing communication connection with the gateway; and the control instruction execution module is used for controlling the intelligent door lock to execute corresponding operation according to the control instruction.
In a fourth aspect, an embodiment of the present application provides a gateway, including: the control instruction receiving module is used for receiving a control instruction sent by a client, wherein the control instruction is generated by the client according to a user triggering operation; the first encryption module is used for encrypting the control instruction according to an encryption algorithm configured in a specified communication protocol to obtain encrypted data; the second encryption module is used for carrying out second encryption on the encrypted data according to the symmetric encryption algorithm to obtain control instruction data; and the control instruction data sending module is used for sending the control instruction data to the intelligent door lock.
In a fifth aspect, an embodiment of the present application provides a communication device, including a processor and a memory, where the memory stores computer readable instructions that, when executed by the processor, implement a smart door lock wireless communication method as described above.
In the above technical solution, the control instruction data sent to the intelligent door lock by the gateway is obtained by encrypting a control instruction generated by the client according to the user trigger operation by the gateway, and after receiving the control instruction data, the intelligent door lock sequentially decrypts twice according to the symmetric encryption algorithm and the encryption algorithm configured in the designated communication protocol to obtain the control instruction, and further executes the corresponding operation according to the decrypted control instruction. Therefore, the complexity of decrypting the control instruction data is increased through twice encryption, and even if the control instruction data sent to the intelligent door lock by the gateway is eavesdropped, the risk of a third party is reduced due to incapability of being cracked, so that the safety of wireless communication between the intelligent door lock and the gateway is fully ensured, and the wireless communication safety of the intelligent door lock is greatly improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application as claimed.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
Figure 1 shows a schematic diagram of an implementation environment in which embodiments of the present application are involved.
Fig. 2 shows a hardware block diagram of an intelligent door lock according to an embodiment of the present application.
Fig. 3 shows a flowchart of a method for wireless communication of an intelligent door lock according to an embodiment of the present application.
Fig. 4 is a flowchart illustrating step 130 in a method for wireless communication of an intelligent door lock according to an embodiment of the present application.
Fig. 5 shows a flowchart of step 135 in a method for wireless communication of an intelligent door lock according to an embodiment of the present application.
Fig. 6 shows a flowchart of a wireless communication method of an intelligent door lock according to another embodiment of the present application.
Fig. 7 is a flowchart illustrating a wireless communication method of an intelligent door lock according to still another embodiment of the present application.
Fig. 8 shows a flowchart of a wireless communication method for an intelligent door lock according to still another embodiment of the present application.
Fig. 9 shows a flowchart of a wireless communication method of an intelligent door lock according to still another embodiment of the present application.
Fig. 10 shows a block diagram of an intelligent door lock according to an embodiment of the present application.
Fig. 11 shows a block diagram of a gateway according to an embodiment of the present application.
There has been shown in the drawings, and will hereinafter be described, specific embodiments of the application with the understanding that the present disclosure is to be considered in all respects as illustrative, and not restrictive, the scope of the inventive concepts being indicated by the appended claims.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the application. Rather, they are merely examples of apparatus and methods consistent with aspects of the application as detailed in the accompanying claims.
Fig. 1 is a schematic diagram of an implementation environment in accordance with the present application. As shown in fig. 1, the implementation environment is an intelligent door lock wireless communication system in the internet of things, and the intelligent door lock wireless communication system includes a terminal 100, a gateway 200 and an intelligent door lock 300.
The intelligent door lock 300 establishes a wireless or wired network connection with the gateway 200 through a communication module configured by itself, and further realizes communication with the gateway 200 through the network connection. The communication module configured by the intelligent door lock 300 comprises any one or more of a ZigBee communication module, a Bluetooth module and a WiFi communication module.
The gateway 200 may be a router, or any other electronic device capable of establishing a wireless or wired network connection with the smart door lock 300, which is not limited herein.
The terminal 100 may be a smart phone, tablet computer, notebook computer, or any other electronic device that may be operated by a smart door lock client, which is not limited herein. A wireless or wired network connection is previously established between the terminal 100 and the gateway 200 to enable interaction between the terminal 100 and the gateway 200 through the network connection.
Referring to fig. 2, fig. 2 is a block diagram of a hardware structure of an intelligent door lock according to an embodiment of the present application, that is, fig. 2 is a block diagram of a hardware structure of an intelligent door lock according to an exemplary embodiment. It should be noted that the smart door lock is only an example adapted to the present application, and should not be construed as providing any limitation on the scope of use of the present application. The smart door lock should not be construed as necessarily relying on or necessarily having one or more of the components of the exemplary smart door lock shown in fig. 2.
As shown in fig. 2, the intelligent door lock comprises a microprocessor 401, a memory 402, a wireless communication module 403, a pairing module 404, a fingerprint acquisition module 405, an image acquisition module 406 and a power supply module 407. The components communicate with each other via one or more communication buses or signal lines.
The microprocessor 401 is used as a core module for processing data of the intelligent door lock, and is used for calculating data stored in the intelligent door lock memory 402.
The memory 402 is further configured to store computer readable instructions and modules, such as computer readable instructions and modules corresponding to the intelligent door lock wireless communication method and system according to the exemplary embodiment of the present invention, and the processor 401 executes the computer readable instructions stored in the memory 402, thereby performing various functions and data processing, that is, completing the intelligent door lock wireless communication method. Memory 402 may be random access memory, such as high speed random access memory, non-volatile memory, such as one or more magnetic storage devices, flash memory, or other solid state memory. The storage means may be a temporary storage or a permanent storage.
The wireless communication module 403 is configured to establish a communication connection between the intelligent door lock and the gateway according to a specified communication protocol, so that the intelligent door lock and the gateway perform data transmission. For example, the control instruction data sent by the gateway to the intelligent door lock, the data to be sent reported by the intelligent door lock to the gateway, and the like. The wireless communication module 403 may be a wireless communication chip, for example, the wireless communication chip may be any one of a ZigBee chip, a Bluetooth chip, or a WiFi chip.
The pairing module 404 is configured to perform pairing between the intelligent door lock and the gateway, and the pairing module 404 may be a pairing key set on the intelligent door lock, through which a user realizes pairing between the intelligent door lock and the gateway.
The fingerprint acquisition module 405 is used for acquiring the fingerprint of an unlocking person, and can control the intelligent door lock to execute unlocking operation only when the acquired fingerprint of the unlocking person is a valid fingerprint. For example, when the fingerprint of the unlocking person collected by the fingerprint collection module 405 can be matched with the user fingerprint stored in the smart door lock memory 402 in advance, the fingerprint of the unlocking person collected by the fingerprint collection module 405 is a valid fingerprint.
The image acquisition module 406 is used for acquiring image information of the surrounding environment of the intelligent door lock, for example, the image acquisition module 406 is a built-in camera, so as to increase the security of the intelligent door lock. For example, when the fingerprint acquisition module 405 is acquiring the fingerprint of the unlocking person, the image acquisition module 406 performs an image acquisition operation on the face of the unlocking person at the same time, so as to verify the identity of the unlocking person.
Further, the intelligent door lock further includes an image recognition module (not shown in fig. 2), which recognizes the face image of the unlocking person acquired by the image acquisition module 406, and if the face data of the unlocking person obtained by recognition matches with the face data of the user stored in advance in the memory 402 of the intelligent door lock, the unlocking person is a legal user, so as to control the intelligent door lock to perform the unlocking operation.
It will be appreciated that the configuration shown in fig. 2 is merely illustrative, and that the smart door lock may also include more or fewer components than shown in fig. 2, or have different components than shown in fig. 2. The components shown in fig. 2 may be implemented in hardware, software, or a combination thereof.
Fig. 3 is a flowchart of a method for wireless communication of an intelligent door lock according to an embodiment of the present application, where the method is applicable to the intelligent door lock shown in the implementation environment of fig. 1, and the hardware structure of the intelligent door lock is shown in fig. 2.
The intelligent door lock wireless communication method is executed by the intelligent door lock, and can comprise the following steps:
step 110: and receiving control instruction data forwarded by the gateway, wherein the control instruction data is obtained by encrypting a control instruction generated by the client according to user triggering operation by the gateway.
Wherein the user-triggered operation is an operation in a user-triggered client interface. Triggering the operation of the client interface by the user can enable the client to generate a corresponding control instruction, wherein the control instruction is used for controlling the intelligent door lock to execute the corresponding operation. For example, in one embodiment, the client interface adds an unlock user add entry to the user, and if the user wishes to add a new unlock user, the user add entry in the client interface triggers an "add unlock user" operation, so that the intelligent door lock knows that the user wishes to add a new unlock user, and accordingly generates an "add unlock user" control command.
Of course, in other embodiments, the control instruction generated by the client in response to the user triggering operation may further include a "delete unlock user" control instruction, a "synchronize unlock user" control instruction, a "set temporary unlock password" control instruction, a "set user check-in password" control instruction, an "intelligent door lock unlock record acquisition" control instruction, and the like, where the specific type of the control instruction is not limited, and accordingly, the intelligent door lock wireless communication method provided in this embodiment is applicable to different application scenarios according to the type of the control instruction, for example, the "add unlock user" control instruction corresponds to a fingerprint adding application scenario, and the "intelligent door lock unlock record acquisition" control instruction corresponds to an unlock behavior acquisition application scenario.
For the gateway, after the client generates a control instruction according to the user triggering operation and sends the generated control instruction to the gateway, the gateway can receive the control instruction sent by the client and encrypt the control instruction, so that the security of wireless communication between the gateway and the intelligent door lock is ensured.
Specifically, first, the control instruction is encrypted according to an encryption algorithm configured in a specified communication protocol to obtain encrypted data, and then the encrypted data is encrypted for the second time according to a symmetric encryption algorithm to obtain control instruction data.
Thus, for the intelligent door lock, after the gateway encrypts the control instruction sent by the client twice to obtain the control instruction data, the gateway may receive the control instruction data sent by the gateway.
Further, the intelligent door lock and the gateway are respectively provided with a communication module, so that the intelligent door lock and the gateway are respectively connected in a wireless or wired network according to a specified communication protocol supported by the communication module configured by the intelligent door lock and the gateway, and further the communication between the intelligent door lock and the gateway is realized through the network connection.
The specified communication protocol can be any one of a ZigBee protocol, a Bluetooth protocol and a WiFi protocol, and correspondingly, the communication modules configured by the ZigBee protocol, the Bluetooth protocol and the WiFi protocol are consistent with each other, and can be any one or more of the ZigBee communication module, the WiFi communication module and the Bluetooth communication module.
In order to ensure the security of wireless communication between the intelligent door lock and the gateway, the above specified communication protocols are configured with encryption algorithms, for example, the specified communication protocol is a ZigBee protocol, and the configured encryption algorithm is an initial symmetric encryption algorithm, so that the encryption complexity is effectively reduced on the premise of ensuring the security of wireless communication.
Still further, symmetric encryption algorithms include, but are not limited to: the security of wireless communication between the intelligent door lock and the gateway is simply and effectively ensured by a DES algorithm, a 3DES algorithm, a TDEA algorithm, a Blowfish algorithm, an RC5 algorithm, an IDEA algorithm, an ASE algorithm and the like.
Of course, in other application scenarios, an asymmetric encryption algorithm with higher complexity and higher security may also be employed according to the actual processing capability of the intelligent door lock, for example, the asymmetric encryption algorithm includes, but is not limited to: RSA algorithm, elgamal algorithm, knapsack algorithm, rabin algorithm, D-H algorithm, ECC (elliptic curve encryption) algorithm, and the like.
Step 130: and decrypting the control instruction data according to a symmetric encryption algorithm to obtain decrypted data.
The control instruction data is obtained by encrypting the control instruction sent by the client by the gateway twice, namely, the first encryption is according to an encryption algorithm configured in a specified communication protocol, and the second encryption is according to a symmetric encryption algorithm.
It should be understood that symmetric encryption algorithm means that the encryption algorithm employed for encryption and decryption is consistent. Therefore, after receiving the control instruction data sent by the gateway, the intelligent door lock firstly uses a symmetric encryption algorithm to decrypt the control instruction data for the first time.
For example, if the symmetric encryption algorithm used by the gateway to encrypt the encrypted data is the ASE algorithm, the symmetric encryption algorithm used by the smart door lock to decrypt the control instruction data is correspondingly the ASE algorithm.
Step 150: and performing secondary decryption on the decrypted data according to an encryption algorithm configured in a designated communication protocol, and obtaining a control instruction, wherein the designated communication protocol is used for establishing communication connection with the gateway.
After the symmetric encryption algorithm is executed, the intelligent door lock further decrypts the decrypted data for the second time according to the encryption algorithm configured in the appointed communication protocol.
As described above, the intelligent door lock and the gateway are respectively configured with the communication module, so that the intelligent door lock and the gateway are respectively connected by a wireless or wired network according to the specified communication protocol supported by the communication module configured by the intelligent door lock and the gateway, and further the communication between the intelligent door lock and the gateway is realized by the network connection.
Thus, the designated communication protocol adopted by the intelligent door lock is consistent with the designated communication protocol in the gateway so as to realize secondary decryption of the decrypted data.
For example, if the designated communication protocol adopted by the communication module configured by the gateway is the ZigBee protocol and the encryption algorithm configured by the designated communication protocol is the initial symmetric encryption algorithm, in the communication module configured by the smart door lock, the designated communication protocol is also the ZigBee protocol, and accordingly, the encryption algorithm configured by the designated communication protocol is also the initial symmetric encryption algorithm.
Step 170: and controlling the intelligent door lock to execute corresponding operation according to the control instruction.
The intelligent door lock respectively adopts a symmetric encryption algorithm and an encryption algorithm configured in a designated communication protocol to decrypt the control instruction data twice, and after the control instruction generated by the client according to the user triggering operation is obtained, the intelligent door lock can execute corresponding operation according to the control instruction.
In an embodiment, if the control instruction indicates that the intelligent door lock performs the operation of adding the unlocking user, the intelligent door lock correspondingly performs the operation of adding the unlocking user, and the fingerprint obtained at this time is stored in the memory as the user fingerprint, so that the user can conveniently use the fingerprint to control the intelligent door lock to perform the unlocking operation.
In this embodiment, the control instruction data sent to the intelligent door lock by the gateway is encrypted twice by the encryption algorithm configured by the designated communication protocol and the symmetric encryption algorithm, so that the security of the transmission of the control instruction data between the intelligent door lock and the gateway is fully ensured, and the security of wireless communication between the intelligent door lock and the gateway is greatly improved.
In addition, the encryption algorithm and the symmetric encryption algorithm of the appointed communication protocol configuration in the intelligent door lock can be operated in the microprocessor of the intelligent door lock in a client-side mode, namely, the software encryption scheme is adopted to encrypt data transmitted between the intelligent door lock and the gateway in the communication process, the volume of the intelligent door lock is not additionally increased, and the production cost of the intelligent door lock is further reduced.
Fig. 4 is a flowchart illustrating a step 130 in a wireless communication method of an intelligent door lock according to an embodiment of the present application, and fig. 4 is a flowchart illustrating a process of generating a first key for executing a symmetric encryption algorithm by the intelligent door lock according to an exemplary embodiment.
As shown in fig. 4, the process of generating the first key by the smart door lock may include the steps of:
step 131: and receiving the first key base sent by the gateway, and randomly generating a second key base according to the first key base.
It should be noted that, the intelligent door lock applicable to the present embodiment is configured with a two-dimensional code, and the two-dimensional code is regarded as a third key base for generating the first key. The third key base is a random number, and the number of bits of the random number is preset, for example, the number of bits of the random number is 128 bits.
In an embodiment, the two-dimensional code configured by the intelligent door lock is used for being scanned by the intelligent door lock client, or the user inputs the two-dimensional code into the intelligent door lock client, so that the intelligent door lock client identifies the two-dimensional code, and therefore a third key base represented by the two-dimensional code is obtained, and further the third key base is sent to the gateway through interaction between a terminal operated by the intelligent door lock client and the gateway.
After the gateway receives the third key base sent by the intelligent door lock client, the gateway can randomly generate the first key base, store the first key base in the gateway and send the first key base to the intelligent door lock.
For the intelligent door lock, the first key base sent by the gateway can be received, and then the second key base is randomly generated according to the first key base and stored in the intelligent door lock, and meanwhile, the second key base is reported to the gateway.
Step 133: and reading a third key base from a memory of the intelligent door lock.
As described above, the smart door lock is configured with one two-dimensional code, which is regarded as a third key base for generating the first key.
In an embodiment, before the smart door lock leaves the factory, the two-dimensional code is burned into the smart door lock, so that the smart door lock stores the two-dimensional code, for example, the two-dimensional code regarded as the third key base is stored in the memory.
In another embodiment, the two-dimension code is further pasted on the inner side of the battery rear cover of the intelligent door lock in a two-dimension code label mode, for example, so that a user can scan the two-dimension code by means of the client side of the intelligent door lock.
For a smart door lock, the third key base may be read from memory before the first key is generated.
Step 135: and carrying out key operation on the first key base, the second key base and the third key base to obtain a first key for executing the symmetric encryption algorithm.
After the intelligent door lock obtains the first key base, the second key base and the third key base, key operation can be performed according to the three key bases to obtain the first key.
It should be understood that symmetric encryption algorithm means that the encryption algorithm used for encryption and decryption is identical, i.e. the key used for encryption and decryption is symmetric.
Thus, after obtaining the first key base, the second key base and the third key base, the gateway performs a key operation on the obtained three key bases by using a symmetric encryption algorithm, respectively, to obtain a second key symmetric to the first key.
In one embodiment, the key operation is implemented by a message digest algorithm, which may include a hash operation, for example.
Under the action of the embodiment, the first key acquired by the intelligent door lock is obtained by carrying out key calculation on the first key base, the second key base and the third key base, so that the generation of the first key is derived from multiparty data, the complexity of cracking the first key is increased, and the safety of wireless communication between the intelligent door lock and the gateway is further enhanced.
Fig. 5 shows a flowchart of step 135 in a method for wireless communication of an intelligent door lock according to an embodiment of the present application.
As shown in fig. 5, the process of performing key operation by the intelligent door lock according to the three key bases may include the following steps:
step 1351: and operating the first key base, the second key base and the third key base according to a message digest algorithm to obtain message digest data.
The message digest algorithm is preferably an irreversible digest operation, so as to ensure that the generated first key is not easy to crack. The message digest algorithm may employ a hash operation including, but not limited to, a SHA-1 operation or an MD5 operation, with the SHA-1 operation being preferred in this embodiment.
For ease of understanding, for example, assuming that the first key base is A, the second key base is B, and the third key base is C, the operation formula for performing the digest operation on the first key base, the second key base, and the third key base using the SHA-1 operation is SHA-1 (A+B+C). Where "a+b+c" means that the first key base, the second key base, and the third key base are numerically concatenated, for example, "101011011001" is assumed to be a "1010," B "is" 1101, "C" is "1001," and "a+b+c.
In one embodiment, the third key radix is a random number with 128 bits, the first key radix is a random number with 32 bits, the second key radix is a random number with 32 bits, the three key radix are spliced to obtain a random number with 192 bits, and the message digest algorithm operates on the random number with 192 bits to obtain the message digest data.
For example, if SHA-1 operation is employed, message digest data of 160 bits is generated; if MD5 operation is used, message digest data of 128 bits is generated.
Step 1353: specified data is extracted from the message digest data as the first key.
In order to further ensure that the first secret key is not broken, the intelligent door lock extracts specified data from the generated message digest data, the extracted specified data is used as the first secret key, and the generated first secret key is stored so as to be convenient for the intelligent door lock to call in the subsequent wireless communication process between the intelligent door lock and the gateway.
Taking SHA-1 operation as an example for illustration, assuming that 160-bit message digest data is generated, the lower 128-bit in the 160-bit message digest data may be extracted as the first key, the upper 128-bit in the 160-bit message digest data may be extracted as the first key, or the gateway may negotiate with the gateway to randomly extract the 128-bit in the 160-bit message digest data as the first key, which is not limited herein.
In this embodiment, the intelligent door lock adopts a message digest algorithm to generate message digest data, and extracts specified data from the generated message digest data as the first key, and since the message digest algorithm is irreversible, and the extraction of a fixed bit number from the generated message digest data can be randomly specified, the complexity of cracking the first key is fully ensured.
Similarly, in the gateway device, the gateway uses the same message digest algorithm as the intelligent door lock to operate the acquired first key base, second key base and third key base, and extracts the same designated data from the message digest data obtained by operation as the second key to store, so as to ensure that the second key is completely consistent with the first key, and further provide basis for executing the symmetric key algorithm, thereby facilitating the subsequent realization of the security of wireless communication between the intelligent door lock and the gateway.
Fig. 6 shows a flowchart of a wireless communication method of an intelligent door lock according to another embodiment of the present application. As shown in fig. 6, the intelligent door lock wireless communication method may further include the steps of:
step 210: and encrypting the door lock data stored by the intelligent door lock according to an encryption algorithm configured in the appointed communication protocol to obtain encrypted data.
The door lock data stored by the intelligent door lock comprise behavior data generated by the intelligent door lock and state data of an intelligent door lock component. In one embodiment, the behavior data generated by the intelligent door lock includes an unlocking record and an abnormality alarm record.
The unlocking record indicates unlocking behaviors of a user, the unlocking record comprises at least one of unlocking time, unlocking environment and user information, specifically, the unlocking time is the time when the intelligent door lock executes unlocking operation, the unlocking environment is an unlocking person face image shot by a built-in camera when the intelligent door lock executes the unlocking operation, and the user information can be an unlocking person fingerprint acquired by a fingerprint acquisition module when the intelligent door lock executes the unlocking operation or a user account number for controlling a client to execute remote unlocking. As a way, the embodiment of the application can encrypt the unlocking record stored in the intelligent door lock according to the encryption algorithm configured in the appointed communication protocol to obtain the encrypted data.
The abnormal alarm record comprises at least one of abnormal alarm time and abnormal alarm reason, wherein the abnormal alarm time is the time of the intelligent door lock executing the abnormal alarm action, and the abnormal alarm reason is the triggering reason of the intelligent door lock triggering the abnormal alarm action.
In another embodiment, the intelligent door lock assembly includes at least one of a doorbell, a speaker, and a latch, the state data of the intelligent door lock assembly includes at least one of a doorbell state, a speaker volume, a speaker language, and a latch state, specifically, the doorbell state includes a doorbell off/on state, the speaker volume is a volume level state in which the speaker plays a door lock prompt voice, and the speaker language state includes a language type in which the speaker plays the door lock prompt voice, such as chinese voice, english voice, korean voice, and the like.
Behavior data generated by the intelligent door lock and intelligent door lock assembly state data are stored in a self-configured memory.
The reporting of the door lock data may be performed according to the actual requirement of the user, for example, the reporting may be performed automatically in response to a control instruction generated by the client according to the user triggering operation, for example, the unlocking record may be automatically reported to the gateway after the intelligent door lock performs the unlocking operation.
The encryption algorithm configured in the specified communication protocol is the same as the encryption algorithm configured in the specified communication protocol described in step 150, and will not be described here again.
Step 230: and carrying out secondary encryption on the encrypted data according to the symmetric encryption algorithm to obtain data to be transmitted.
After the unlocking record is encrypted for the first time according to an encryption algorithm configured in a specified communication protocol, the intelligent door lock encrypts the encrypted data for the second time according to a symmetric encryption algorithm stored in the communication module, so as to obtain data to be transmitted.
As previously described, the smart door lock performs a symmetric encryption algorithm using the first key to encrypt the encrypted data a second time. The obtained data to be transmitted are data after the intelligent door lock performs secondary encryption on unlocking records according to an encryption algorithm configured by a specified communication protocol and a symmetric encryption algorithm.
Step 250: and reporting the data to be sent to the gateway.
The intelligent door lock reports the data to be sent obtained through secondary encryption to the gateway, so that the gateway decrypts the received data to be sent for the second time and then sends an unlocking record obtained through decryption to the client.
Specifically, for the gateway, after receiving data to be sent by the intelligent door lock, the gateway decrypts the data to be sent according to the same symmetric encryption algorithm as the intelligent door lock to obtain corresponding decrypted data, and then decrypts the decrypted data for the second time according to the encryption algorithm configured by the appointed communication protocol to obtain door lock data.
After the unlocking record sent by the intelligent door lock is decrypted, the gateway sends the door lock data obtained through decryption to the client, so that the client displays the door lock data in a client interface for a user to check.
In this embodiment, the intelligent door lock encrypts the door lock data according to the encryption algorithm configured in the specified communication protocol and the symmetric encryption algorithm, and the data to be transmitted obtained by secondary encryption of the intelligent door lock can be decrypted according to the corresponding secondary decryption method, so that the security of the data transmitted by the intelligent door lock is ensured, and the security of wireless communication of the intelligent door lock is further increased.
Fig. 7 is a flowchart illustrating a wireless communication method of an intelligent door lock according to still another embodiment of the present application. As shown in fig. 7, the intelligent door lock wireless communication method may further include the steps of:
step 310: and receiving an intelligent door lock pairing instruction sent by the gateway, and detecting pairing operation triggered by a user according to the intelligent door lock pairing instruction.
Before the intelligent door lock is connected with the gateway in a communication mode, the intelligent door lock is matched with the gateway, and after the intelligent door lock is successfully matched with the gateway, the intelligent door lock can be connected with the gateway in a communication mode, and data transmission is conducted through the communication connection.
The intelligent door lock pairing instruction which is received by the intelligent door lock and paired with the gateway is generated by the client and forwarded to the intelligent door lock through the gateway.
Specifically, the client adds a pairing portal for the user in the client interface, if the user wants to pair the gateway and the intelligent door lock, namely, triggering related operation at the pairing portal, so that the client generates an intelligent door lock pairing instruction according to the related operation, reports the intelligent door lock pairing instruction to the gateway, and further sends the intelligent door lock pairing instruction to the intelligent door lock through the gateway.
For the intelligent door lock, after receiving an intelligent door lock pairing instruction sent by the gateway, the intelligent door lock pairing instruction is responded to detect a pairing operation triggered by a user in the intelligent door lock.
In an embodiment, the intelligent door lock is configured with a pairing key, and when the user presses the pairing key, the intelligent door lock can detect pairing operation triggered by the user. The pressing operation is the pairing operation triggered by the user in the intelligent door lock.
Here, the pairing operation triggered by the user may be long pressing of the pairing key, or short pressing of the pairing key, which is related to a triggering manner preset by the user on the intelligent door lock, which is not limited herein.
Step 330: and if the pairing operation triggered by the user is detected, performing pairing between the intelligent door lock and the gateway so as to establish communication connection between the intelligent door lock and the gateway.
And if the intelligent door lock detects the pairing operation triggered by the user, the intelligent door lock executes the pairing operation with the gateway so as to be beneficial to establishing communication connection with the gateway.
Further, after the pairing between the intelligent door lock and the gateway is successful, the pairing result can be sent to the client through the gateway, so that the user can obtain the pairing result of the intelligent door lock and the gateway through the client.
Fig. 8 shows a flowchart of a wireless communication method for an intelligent door lock according to still another embodiment of the present application. As shown in fig. 8, the intelligent door lock wireless communication method may further include the steps of:
step 410: and encrypting the verification information stored by the intelligent door lock according to the symmetric encryption algorithm to obtain the verification information.
When the intelligent door lock decrypts/encrypts the received/transmitted data, the first secret key is used for executing a symmetric encryption algorithm, and when the gateway decrypts/encrypts the received/transmitted data, the second secret key is used for executing a symmetric encryption algorithm, so that the first secret key generated by the intelligent door lock and the second secret key generated by the gateway are consistent, and the process of encrypted data transmission between the intelligent door lock and the gateway can be ensured to be accurate.
In order to verify the consistency of the first key and the second key, the intelligent door lock uses the first key as a key of a symmetric encryption algorithm to encrypt the stored verification information, so as to obtain the verification information. The verification information stored by the intelligent door lock can specifically comprise a magic number pre-agreed by the intelligent door lock and the gateway, and the magic number is stored in the intelligent door lock and the gateway.
Step 430: and sending the verification information to the gateway.
The intelligent door lock sends the encrypted verification information to the gateway so that the gateway decrypts the verification information according to a corresponding symmetric encryption algorithm.
Specifically, for the gateway, the gateway decrypts the authentication information using the second key when executing the symmetric encryption algorithm, and verifies the decrypted authentication information. The process of verifying the decrypted verification information by the gateway is specifically a process of comparing values.
For example, the verification information carries the magic number negotiated in advance between the intelligent door lock and the gateway, and if the magic number decrypted by the gateway executing the symmetric encryption algorithm is the same as the magic number stored in the gateway itself, it indicates that the first key is consistent with the second key, and the process described in step 450 is continued.
Otherwise, if the number of the magic tapes obtained by decryption of the gateway is different from the number of the magic tapes stored by the gateway, the verification is not passed, and the first secret key and the second secret key are inconsistent, so that the communication connection between the intelligent door lock and the gateway can be interrupted for preventing the data leakage of the intelligent door lock, and the intelligent door lock and the gateway cannot perform data transmission.
Step 450: and when the verification information indicates that the intelligent door lock passes the verification of the gateway, establishing communication connection between the intelligent door lock and the gateway.
And when the verification information decrypted by the gateway executing the symmetric encryption algorithm is completely consistent with the verification information stored by the gateway, the verification that the intelligent door lock passes through the gateway is indicated. Only after the intelligent door lock passes through the gateway verification, the intelligent door lock can establish communication connection with the gateway, and data transmission can be carried out between the intelligent door lock and the gateway.
In this embodiment, the smart door lock encrypts the authentication information stored in the smart door lock through the symmetric encryption algorithm and sends the encrypted authentication information to the gateway, so that the gateway decrypts the authentication information and performs authentication, and only after the authentication information indicates that the smart door lock passes the authentication of the gateway, the smart door lock can establish communication connection with the gateway, thereby ensuring that the data transmission process between the subsequent smart door lock and the gateway can be performed accurately.
Fig. 9 is a flowchart illustrating a wireless communication method of an intelligent door lock according to still another embodiment of the present application, which is applied to an intelligent door lock system. The intelligent door lock system comprises a gateway and an intelligent door lock.
As shown in fig. 9, the intelligent door lock wireless communication method includes the steps of:
step 510: and the gateway receives a control instruction generated by the client according to the user triggering operation.
The client generates a corresponding control instruction according to the user triggering operation, and sends the generated control instruction to the gateway so that the gateway receives the control instruction.
The control instruction generated by the client is used for controlling the intelligent door lock to execute corresponding operation.
Step 520: and encrypting the control instruction according to an encryption algorithm configured in the appointed communication protocol to obtain encrypted data.
After receiving the control instruction sent by the client, the gateway encrypts the control instruction for the first time according to an encryption algorithm configured in a specified communication protocol to obtain encrypted data.
The specific communication protocol executed by the gateway is configured in the communication module of the gateway, and the specific protocol type is as described above and will not be described herein.
Step 530: and carrying out secondary encryption on the encrypted data according to a symmetric encryption algorithm to obtain control instruction data sent to the intelligent door lock.
After the gateway encrypts the received control instruction for the first time to obtain encrypted data, the gateway encrypts the encrypted data for the second time according to a symmetric encryption algorithm to obtain control instruction data, and sends the obtained control instruction data to the intelligent door lock.
The symmetric encryption algorithm executed by the gateway is also configured in its communication module, the gateway using the second key as a key when executing the symmetric encryption algorithm. In an exemplary embodiment, the symmetric encryption algorithm performed by the gateway may be an ASE128 encryption algorithm.
Step 540: and the intelligent door lock receives control instruction data sent by the gateway.
The gateway sends the control instruction data obtained by the secondary encryption to the intelligent door lock so that the intelligent door lock receives the control instruction data.
Step 550: and decrypting the control instruction data according to a symmetric encryption algorithm to obtain decrypted data.
After receiving the control instruction data sent by the gateway, the intelligent door lock adopts a symmetric encryption algorithm to decrypt the control instruction data for the first time, and decrypted data is obtained.
The symmetric encryption algorithm is configured in a communication module of the intelligent door lock, the communication module configured by the intelligent door lock corresponds to the communication module in the gateway, and the symmetric encryption algorithm executed by the intelligent door lock is the same as the symmetric encryption algorithm executed in the gateway.
And when the intelligent door lock executes the symmetric encryption algorithm, the control instruction data is decrypted by using the first secret key, and the first secret key is the same as the second secret key used by the gateway, so that the intelligent door lock completes the first decryption operation on the control instruction data.
Step 560: and performing secondary decryption on the decrypted data according to an encryption algorithm configured in a designated communication protocol, and obtaining a control instruction, wherein the designated communication protocol is used for establishing communication connection with the gateway.
After the intelligent door lock executes the symmetric encryption algorithm to obtain the decrypted data, the decrypted data is decrypted for the second time according to the encryption algorithm configured in the appointed communication protocol, and the control instruction is obtained.
The appointed communication protocol used by the intelligent door lock is also configured in the communication module of the intelligent door lock and is the same as the appointed communication protocol configured by the communication module in the gateway, so that the intelligent door lock and the gateway are in communication connection, and data transmission is performed. The smart door lock uses the same encryption algorithm that specifies the communication protocol configuration as the gateway.
Step 570: and controlling the intelligent door lock to execute corresponding operation according to the control instruction.
The gateway performs secondary decryption on the control instruction data according to the symmetric encryption algorithm and the encryption algorithm configured in the appointed communication protocol, and the obtained control instruction is a control instruction generated by the client according to the user triggering operation.
After the intelligent door lock obtains the control instruction, corresponding operation indicated by the control instruction is executed, so that the intelligent door lock is controlled by the client through the gateway.
In this embodiment, after performing secondary encryption on the control instruction sent by the client, the gateway sends the control instruction data obtained by encryption to the intelligent door lock, and the intelligent door lock performs corresponding secondary decryption on the control instruction data to obtain the control instruction. Therefore, in the intelligent door lock system, the data transmitted between the gateway and the intelligent door lock is obtained by secondary encryption of the gateway, and the data can be decrypted only by adopting a decryption method which is the same as the secondary encryption, so that the safety of wireless communication between the intelligent door lock and the gateway in the intelligent door lock system is fully ensured.
Fig. 10 shows a block diagram of an intelligent door lock according to an embodiment of the present application. . The intelligent door lock performs all or part of the steps of the intelligent door lock wireless communication method shown in any one of fig. 3, as shown in fig. 10, including but not limited to: a control instruction data receiving module 610, a first decryption module 630, a second decryption module 650, and a control instruction execution module 670.
The control instruction data receiving module 610 is configured to receive control instruction data forwarded by the gateway, where the control instruction data is generated by the client according to an operation triggered by a user and sent to the gateway.
The first decryption module 630 is configured to decrypt the control instruction data according to a symmetric encryption algorithm, to obtain decrypted data.
The second decryption module 650 is configured to decrypt the decrypted data for a second time according to an encryption algorithm configured in a specified communication protocol, to obtain a control instruction, where the specified communication protocol is used to establish a communication connection with the gateway.
The control instruction execution module 670 is configured to control the intelligent door lock to execute a corresponding operation according to the decrypted control instruction.
Fig. 11 shows a block diagram of a gateway according to an embodiment of the present application. As shown in fig. 11, the gateway includes, but is not limited to: a control instruction receiving module 710, a first encrypting module 730, a second encrypting module 750, and a control instruction data transmitting module 770.
The control instruction receiving module 710 is configured to receive a control instruction sent by a client, where the control instruction is generated by the client according to a user trigger operation.
The first encryption module 730 is configured to encrypt the control instruction according to an encryption algorithm configured in the specified communication protocol, so as to obtain encrypted data.
The second encryption module 750 is configured to encrypt the encrypted data for a second time according to the symmetric encryption algorithm, so as to obtain control instruction data.
The control instruction data transmitting module 770 is configured to transmit the control instruction data to the intelligent door lock.
In one exemplary embodiment, a communication device includes: a processor; and a memory having stored thereon computer readable instructions which, when executed by the processor, implement the method of the above embodiments.
The foregoing is merely illustrative of the preferred embodiments of the present invention and is not intended to limit the embodiments of the present invention, and those skilled in the art can easily make corresponding variations or modifications according to the main concept and spirit of the present invention, so that the protection scope of the present invention shall be defined by the claims.

Claims (10)

1. An intelligent door lock wireless communication method is characterized by comprising the following steps:
receiving control instruction data sent by a gateway, wherein the control instruction data is obtained by encrypting a control instruction generated by a client according to user triggering operation by the gateway;
receiving a first key base sent by the gateway, and randomly generating a second key base according to the first key base; based on the identification operation of the two-dimension code of the intelligent door lock, acquiring a preset number of random numbers as a third key base number; the first key base is randomly generated by the gateway based on the third key base; performing key operation on the first key base, the second key base and the third key base by adopting a message digest algorithm to obtain a first key for executing a symmetric encryption algorithm;
Decrypting the control instruction data based on the first key to obtain decrypted data;
performing secondary decryption on the decrypted data according to an encryption algorithm configured in a designated communication protocol, so as to obtain a control instruction, wherein the designated communication protocol is used for establishing communication connection with the gateway;
and controlling the intelligent door lock to execute corresponding operation according to the control instruction.
2. The method of claim 1, wherein the method further comprises:
encrypting the door lock data stored by the intelligent door lock according to an encryption algorithm configured in the appointed communication protocol to obtain encrypted data;
performing secondary encryption on the encrypted data according to the symmetric encryption algorithm to obtain data to be transmitted;
and reporting the data to be sent to the gateway.
3. The method of claim 1, wherein the method further comprises:
receiving an intelligent door lock pairing instruction sent by the gateway, and detecting pairing operation triggered by a user according to the intelligent door lock pairing instruction;
and if the pairing operation triggered by the user is detected, performing pairing between the intelligent door lock and the gateway so as to establish communication connection between the intelligent door lock and the gateway.
4. The method of claim 1, wherein the method further comprises:
encrypting the verification information stored by the intelligent door lock according to the symmetric encryption algorithm to obtain verification information;
sending the verification information to the gateway;
and when the verification information indicates that the intelligent door lock passes the verification of the gateway, establishing communication connection between the intelligent door lock and the gateway.
5. The method of claim 1, wherein the performing a key operation on the first key base, the second key base, and the third key base to obtain a first key comprises:
calculating the first key base, the second key base and the third key base according to a message digest algorithm to obtain message digest data;
specified data is extracted from the message digest data as the first key.
6. An intelligent door lock wireless communication method is characterized by comprising the following steps:
the gateway receives a control instruction sent by a client, wherein the control instruction is generated by the client according to a user triggering operation;
encrypting the control instruction according to an encryption algorithm configured in a specified communication protocol to obtain encrypted data;
The gateway receives a third key base sent by the client and randomly generates a first key base according to the third key base; receiving a second key base sent by the intelligent door lock; performing key operation on the first key base, the second key base and the third key base to obtain a second key for executing a message digest algorithm;
performing secondary encryption on the encrypted data according to the second key to obtain control instruction data;
and sending the control instruction data to the intelligent door lock.
7. The method of claim 6, wherein the method further comprises:
the gateway receives data to be sent reported by the intelligent door lock, wherein the data to be sent is obtained by encrypting the door lock data stored by the intelligent door lock;
decrypting the data to be sent according to a symmetric encryption algorithm to obtain decrypted data;
performing secondary decryption on the decrypted data according to an encryption algorithm configured in the appointed communication protocol to obtain the door lock data;
and sending the door lock data to the client.
8. An intelligent door lock, characterized by comprising:
The control instruction data receiving module is used for receiving control instruction data sent by the gateway, wherein the control instruction data is obtained by encrypting a control instruction generated by the client according to user triggering operation by the gateway;
the first key acquisition module is used for receiving a first key base sent by the gateway and randomly generating a second key base according to the first key base; based on the identification operation of the two-dimension code of the intelligent door lock, acquiring a preset number of random numbers as a third key base number; the first key base is randomly generated by the gateway based on the third key base; performing key operation on the first key base, the second key base and the third key base by adopting a message digest algorithm to obtain a first key for executing a symmetric encryption algorithm;
the first decryption module is used for decrypting the control instruction data according to a symmetric encryption algorithm based on the first key to obtain decrypted data;
the second decryption module is used for performing secondary decryption on the decrypted data according to an encryption algorithm configured in a designated communication protocol, so as to obtain a control instruction, wherein the designated communication protocol is used for establishing communication connection with the gateway;
And the control instruction execution module is used for controlling the intelligent door lock to execute corresponding operation according to the control instruction.
9. A gateway, comprising:
the control instruction receiving module is used for receiving a control instruction sent by a client, wherein the control instruction is generated by the client according to a user triggering operation;
the first encryption module is used for encrypting the control instruction according to an encryption algorithm configured in a specified communication protocol to obtain encrypted data;
the second key acquisition module is used for receiving a third key base sent by the client and randomly generating a first key base according to the third key base; receiving a second key base sent by the intelligent door lock; performing key operation on the first key base, the second key base and the third key base to obtain a second key for executing a message digest algorithm;
the second encryption module is used for carrying out second encryption on the encrypted data according to a symmetric encryption algorithm to obtain control instruction data;
and the control instruction data sending module is used for sending the control instruction data to the intelligent door lock.
10. A communication device, comprising:
A processor; a kind of electronic device with high-pressure air-conditioning system
A memory having stored thereon computer readable instructions which when executed by the processor implement the smart door lock wireless communication method of any one of claims 1 to 7.
CN201880094566.1A 2018-05-18 2018-05-18 Intelligent door lock wireless communication method, intelligent door lock, gateway and communication equipment Active CN112425116B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/087400 WO2019218328A1 (en) 2018-05-18 2018-05-18 Smart door lock wireless communication method, smart door lock, gateway, and communication device

Publications (2)

Publication Number Publication Date
CN112425116A CN112425116A (en) 2021-02-26
CN112425116B true CN112425116B (en) 2023-09-26

Family

ID=68539569

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201880094566.1A Active CN112425116B (en) 2018-05-18 2018-05-18 Intelligent door lock wireless communication method, intelligent door lock, gateway and communication equipment

Country Status (2)

Country Link
CN (1) CN112425116B (en)
WO (1) WO2019218328A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114399854A (en) * 2021-12-30 2022-04-26 荣耀终端有限公司 Unlocking method of intelligent door lock, mobile device and storage medium
CN114513303A (en) * 2022-01-28 2022-05-17 无锡台翔电子技术发展有限公司 Encryption password generation method and device with encryption module
CN116321538A (en) * 2023-02-21 2023-06-23 深圳市丰润达科技有限公司 Method, module, device and medium for dynamically modifying ZigBee device basic information

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101815289A (en) * 2009-02-12 2010-08-25 通用汽车有限责任公司 Utilize the method for micro-certificates protection and appraising datum
CN104680630A (en) * 2014-12-29 2015-06-03 深圳市进林科技有限公司 Method and system for controlling door locks
WO2016107088A1 (en) * 2014-12-29 2016-07-07 张泽 Centralized control method and system for intelligent door lock

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100387798C (en) * 2004-11-01 2008-05-14 华为技术有限公司 Electric key and electric lock device and realization method thereof
CN103617659A (en) * 2013-11-01 2014-03-05 南京物联传感技术有限公司 Wireless unlocking method
CN104537739B (en) * 2014-12-23 2017-04-05 江苏思瑞德物联科技有限公司 Fixed main Crypto Control Unit and the safe unloading system using the controller
CN104618204A (en) * 2015-01-29 2015-05-13 杭州晟元芯片技术有限公司 Intelligent home system for guaranteeing safe and remote control based on security modules and realization method thereof
US10069793B2 (en) * 2015-08-26 2018-09-04 Tatung Company Identity verification method, internet of thins gateway device, and verification gateway device using the same
US9640061B1 (en) * 2015-12-31 2017-05-02 Google Inc. Remote alarm hushing with acoustic presence verification
CN106846573B (en) * 2017-01-17 2019-02-05 宁波耀龙软件科技有限公司 The method of opening electronic lock and corresponding electronic lock in no linking Internet

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101815289A (en) * 2009-02-12 2010-08-25 通用汽车有限责任公司 Utilize the method for micro-certificates protection and appraising datum
CN104680630A (en) * 2014-12-29 2015-06-03 深圳市进林科技有限公司 Method and system for controlling door locks
WO2016107088A1 (en) * 2014-12-29 2016-07-07 张泽 Centralized control method and system for intelligent door lock

Also Published As

Publication number Publication date
CN112425116A (en) 2021-02-26
WO2019218328A1 (en) 2019-11-21

Similar Documents

Publication Publication Date Title
KR102328725B1 (en) Method of using one device to unlock another device
JP7152466B2 (en) Secure communication method and smart lock system based thereon
CN110995642B (en) Providing secure connections using pre-shared keys
CN107864124B (en) Terminal information security protection method, terminal and Bluetooth lock
CN112425116B (en) Intelligent door lock wireless communication method, intelligent door lock, gateway and communication equipment
CN109768979A (en) Data encryption and transmission method, device, computer equipment and storage medium
CN110278083A (en) ID authentication request treating method and apparatus, equipment replacement method and apparatus
KR20120103272A (en) Method for authentication of communication connecting, gateway apparatus thereof, and communication system thereof
CN111901303A (en) Device authentication method and apparatus, storage medium, and electronic apparatus
CN108650219B (en) User identity identification method, related device, equipment and system
CN107888376B (en) NFC authentication system based on quantum communication network
CN107786978B (en) NFC authentication system based on quantum encryption
KR101745482B1 (en) Communication method and apparatus in smart-home system
WO2014177055A1 (en) Establishment of communication connection between mobile device and secure element
TWI675579B (en) Network authentication system and method
CN115171245A (en) HCE-based door lock security authentication method and system
CN114158051B (en) Unlocking method, unlocking device, electronic equipment and computer readable storage medium
CN108768621B (en) Password acquisition method, verification method, related device, equipment and system
KR101298216B1 (en) Authentication system and method using multiple category
TWI633231B (en) Smart lock and smart lock control method
CN115909559A (en) Intelligent lock control method and system based on quantum random number
KR20130030599A (en) Security association method between devices and the devices
CN109951283A (en) Enciphering authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant