CN113298981A - Near field communication unlocking method and request unlocking method for door lock equipment - Google Patents

Near field communication unlocking method and request unlocking method for door lock equipment Download PDF

Info

Publication number
CN113298981A
CN113298981A CN202110530330.1A CN202110530330A CN113298981A CN 113298981 A CN113298981 A CN 113298981A CN 202110530330 A CN202110530330 A CN 202110530330A CN 113298981 A CN113298981 A CN 113298981A
Authority
CN
China
Prior art keywords
door lock
mac address
mobile terminal
lock device
near field
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110530330.1A
Other languages
Chinese (zh)
Inventor
吴艳春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qding Interconnection Technology Co ltd
Original Assignee
Beijing Qding Interconnection Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qding Interconnection Technology Co ltd filed Critical Beijing Qding Interconnection Technology Co ltd
Priority to CN202110530330.1A priority Critical patent/CN113298981A/en
Publication of CN113298981A publication Critical patent/CN113298981A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention provides a door lock equipment near field communication unlocking method and a door lock equipment unlocking request method, wherein the door lock equipment near field communication unlocking method comprises the following steps: after the short-distance communication connection with the mobile terminal is carried out, receiving an encrypted data packet sent by the mobile terminal; acquiring first pairing information from a mobile terminal; matching the first pairing information with an MAC address base to obtain a corresponding first MAC address and a first dynamic key; decrypting the encrypted data packet by using the first dynamic key and a preset decryption algorithm to obtain a second MAC address; and judging whether the first MAC address is consistent with the second MAC address or not, and unlocking the door lock equipment when the first MAC address is determined to be consistent with the second MAC address. The invention can still quickly unlock the door lock equipment in the scene with weak mobile network signals, greatly improve the safety of near-distance communication of the door lock equipment, prevent illegal equipment from unlocking the door lock equipment and further improve the experience degree of users.

Description

Near field communication unlocking method and request unlocking method for door lock equipment
Technical Field
The invention relates to the field of intelligent door locks, in particular to a near field communication unlocking method for door lock equipment, a door lock equipment unlocking request method, door lock equipment and a readable storage medium.
Background
The existing intelligent door lock equipment performs data interaction with a mobile terminal, and is generally realized through internet communication when the door lock equipment is unlocked, but in some environments with poor mobile network signals, the mobile terminal is often limited in unlocking process due to internet connection interruption or connection failure, so that the user experience is influenced.
Disclosure of Invention
In view of the above problems, the present invention provides a door lock device near field communication unlocking method, a door lock device request unlocking method, a door lock device, and a readable storage medium, so that the door lock device can still be unlocked quickly in a scene with weak mobile network signals, the security of near field communication of the door lock device is improved, the door lock device is prevented from being unlocked by an illegal device, and the user experience is improved.
In order to achieve the purpose, the invention adopts the following technical scheme:
a door lock device near field communication unlocking method comprises the following steps:
after the short-distance communication connection with a mobile terminal is carried out, receiving an encrypted data packet sent by the mobile terminal;
acquiring first pairing information from the mobile terminal;
matching the first pairing information with an MAC address base to obtain a corresponding first MAC address and a first dynamic key;
decrypting the encrypted data packet by using the first dynamic key and a preset decryption algorithm to obtain a second MAC address;
and judging whether the first MAC address is consistent with the second MAC address or not, and unlocking the door lock equipment when the first MAC address is determined to be consistent with the second MAC address.
Preferably, the door lock device near field communication unlocking method further includes:
after the door lock equipment is unlocked, updating the first dynamic secret key into a second dynamic secret key;
and after the first dynamic secret key is used for encrypting the second dynamic secret key by a preset encryption algorithm, the second dynamic secret key is sent to the mobile terminal.
Preferably, the door lock device near field communication unlocking method further includes:
the method comprises the steps of receiving first pairing information, a first MAC address and a first dynamic key sent by a server in advance, and storing the first pairing information, the first MAC address and the first dynamic key in an MAC address base in an associated mode.
Preferably, the door lock device near field communication unlocking method further includes:
when a binding request sent by the mobile terminal is received, the first MAC address of the near field communication module of the mobile terminal is obtained;
generating the first dynamic key and the first pairing information, and sending the first dynamic key and the first pairing information to the mobile terminal;
storing the first pairing information, the first MAC address, and the first dynamic key association to the MAC address repository.
Preferably, in the door lock device near field communication unlocking method, the first pairing information is an MAC address of a near field communication module of the mobile terminal, or a pairing code, and after the mobile terminal is bound with the door lock device, the server generates the pairing code and issues the pairing code to the mobile terminal and the door lock device.
Preferably, in the door lock device near field communication unlocking method, the near field communication includes bluetooth communication, Zigbee communication, and NFC communication.
The invention also provides a method for requesting unlocking of the door lock equipment, which comprises the following steps:
after the connection with the door lock device through near field communication, the MAC address of the near field communication module is obtained;
encrypting the MAC address by using a first dynamic key through a preset encryption algorithm to generate an encrypted data packet;
and sending the encrypted data packet to the door lock equipment to request to unlock the door lock equipment.
Preferably, the method for requesting unlocking by the door lock device further includes:
after the door lock equipment is unlocked, receiving an update data packet sent by the door lock equipment;
and decrypting the updated data packet by using the first dynamic key through a preset decryption algorithm to obtain a second dynamic key, and updating the first dynamic key into the second dynamic key.
The invention also provides a door lock device, which comprises a memory and a processor, wherein the memory stores a computer program, and the computer program executes the near field communication unlocking method of the door lock device when running on the processor.
The invention also provides a readable storage medium which stores a computer program which, when running on a processor, executes the door lock device near field communication unlocking method.
The invention provides a near field communication unlocking method for door lock equipment, which comprises the following steps: after the short-distance communication connection with a mobile terminal is carried out, receiving an encrypted data packet sent by the mobile terminal; acquiring first pairing information from the mobile terminal; matching the first pairing information with an MAC address base to obtain a corresponding first MAC address and a first dynamic key; decrypting the encrypted data packet by using the first dynamic key and a preset decryption algorithm to obtain a second MAC address; and judging whether the first MAC address is consistent with the second MAC address or not, and unlocking the door lock equipment when the first MAC address is determined to be consistent with the second MAC address. According to the invention, the door lock equipment can be quickly unlocked in a scene with weak mobile network signals by means of the mode of sending the encrypted data packet through the short-distance communication between the mobile terminal and the door lock equipment for unlocking, and the security of the short-distance communication can be greatly improved by means of the pairing information verification and the MAC address encryption transmission and verification modes, so that the unlocking of the door lock equipment by illegal equipment is prevented, and the user experience is improved.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solution of the present invention, the drawings required to be used in the embodiments will be briefly described below, and it should be understood that the following drawings only illustrate some embodiments of the present invention, and therefore should not be considered as limiting the scope of the present invention. Like components are numbered similarly in the various figures.
Fig. 1 is a flowchart of a door lock device near field communication unlocking method according to embodiment 1 of the present invention;
fig. 2 is a flowchart of a door lock device near field communication unlocking method according to embodiment 2 of the present invention;
fig. 3 is a flowchart of a door lock device near field communication unlocking method according to embodiment 3 of the present invention;
fig. 4 is a flowchart of a door lock device near field communication unlocking method according to embodiment 4 of the present invention;
fig. 5 is a flowchart of a method for requesting unlocking of a door lock device according to embodiment 5 of the present invention;
fig. 6 is a flowchart of another method for requesting unlocking of a door lock device according to embodiment 5 of the present invention;
fig. 7 is a schematic structural diagram of a device for requesting unlocking of a door lock device according to embodiment 6 of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments.
The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
Hereinafter, the terms "including", "having", and their derivatives, which may be used in various embodiments of the present invention, are only intended to indicate specific features, numbers, steps, operations, elements, components, or combinations of the foregoing, and should not be construed as first excluding the existence of, or adding to, one or more other features, numbers, steps, operations, elements, components, or combinations of the foregoing.
Furthermore, the terms "first," "second," "third," and the like are used solely to distinguish one from another and are not to be construed as indicating or implying relative importance.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which various embodiments of the present invention belong. The terms (such as those defined in commonly used dictionaries) should be interpreted as having a meaning that is consistent with their contextual meaning in the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein in various embodiments of the present invention.
Example 1
Fig. 1 is a flowchart of a method for unlocking a door lock device through near field communication according to embodiment 1 of the present invention, where the method includes the following steps:
step S11: and after the short-distance communication connection with the mobile terminal is carried out, receiving the encrypted data packet sent by the mobile terminal.
In the embodiment of the present invention, the door lock device includes an intelligent door lock, an intelligent door control and other electronic devices, and can be in Communication connection with the mobile terminal through Near Field Communication, and the mobile terminal includes a mobile phone, a tablet computer and other portable electronic devices supporting Near Field Communication, where the Near Field Communication includes bluetooth Communication, Zigbee Communication (Zigbee, Zigbee protocol), NFC Communication (NFC, Near Field Communication), and the like. When a user uses a mobile terminal to unlock the door lock device, the user firstly needs to use the mobile terminal to connect with the door lock device through short-distance communication, and particularly in a basement scene with weak network signals, the user directly connects with the door lock device through short-distance communication to unlock the door lock device.
In the embodiment of the invention, after the mobile terminal is connected through the near field communication, a user can send the encrypted data packet for unlocking to the door lock device through an application program in the mobile terminal, the door lock device receives the encrypted data packet, and the encrypted data packet is transmitted only by using the specified near field communication in the process, so that the transmission safety is improved.
Step S12: first pairing information is obtained from the mobile terminal.
In the embodiment of the invention, after the door lock equipment receives the encrypted data, the first pairing information of the mobile terminal is acquired, and whether the mobile terminal is bound and registered with the door lock equipment is judged according to the first pairing information. That is, if the mobile terminal is bound and registered on the door lock device, the corresponding binding registration information is stored in the door lock device, and the corresponding binding registration information is the first pairing information of the mobile terminal. Wherein the first pairing information includes a MAC address of a near field communication module of the mobile terminal. The pairing code can also be a pairing code, namely after the mobile terminal is bound with the door lock device, the server generates the pairing code and sends the pairing code to the mobile terminal and the door lock device. The mobile terminal can be bound and registered with the door lock device through the server, and the server generates a corresponding pairing code. The mobile terminal may also directly perform binding registration with the door lock device, and at this time, the door lock device may generate a corresponding pairing code, and directly transmit the pairing code to the mobile terminal through short-range communication, or after uploading the pairing code to the server, the pairing code is issued to the corresponding mobile terminal by the server through the internet, which is not limited herein.
Step S13: and matching the first pairing information with an MAC address library to obtain a corresponding first MAC address and a first dynamic key.
In the embodiment of the invention, the door lock equipment is provided with the MAC address library, and the MAC address library stores the pairing information, the MAC address and the dynamic key of the mobile terminal after binding and registration in an associated manner. The dynamic key is used for decrypting the encrypted data packet sent by the mobile terminal, the dynamic keys of different mobile terminals are different, the dynamic key can be generated by the door lock device or the server, and after the mobile terminal is bound and registered, the dynamic key is sent to the mobile terminal and the door lock device for storage.
In the embodiment of the invention, after acquiring the first pairing information of the mobile terminal, the door lock device can be matched with the MAC address library to judge whether the mobile terminal connected with the short-distance communication is a device which is registered and bound and has unlocking right. If the mobile terminal is registered and bound with the unlocking right, the corresponding first MAC address and the first dynamic secret key can be matched, otherwise, the mobile terminal is not registered and bound with the door lock device, and the door lock device can refuse to unlock and carry out corresponding prompt. The process of matching the first pairing information and the MAC address may be implemented by using an algorithm or an application program, for example, an application program for matching may be set in the door lock device, and the first pairing information may be input to the application program after being acquired, so as to acquire the corresponding first MAC address and the first dynamic key.
Step S14: and decrypting the encrypted data packet by using the first dynamic key and a preset decryption algorithm to obtain a second MAC address.
In the embodiment of the invention, after the first dynamic key is obtained, the encrypted data packet is decrypted by using the first dynamic key and a preset decryption algorithm to obtain the encrypted information in the encrypted data packet. And the encrypted information is the MAC address of the short-distance communication module of the mobile terminal. That is, after the mobile terminal is connected with the door lock device through near field communication, the MAC address of the near field communication module is acquired through the application program of the door lock device, and encrypted by using the preset encryption algorithm to generate a corresponding encrypted data packet, and then the encrypted data packet is sent to the door lock device to perform verification unlocking.
In the embodiment of the present invention, the process of decrypting the encrypted data packet may be implemented by using an application program, for example, an application program based on a preset decryption algorithm may be set in the door lock device, and after the encrypted data packet and the corresponding first dynamic key are obtained, the application program may be run to decrypt the data encrypted packet by using the first dynamic key, so as to obtain the second MAC address.
Step S15: and judging whether the first MAC address is consistent with the second MAC address or not, and unlocking the door lock equipment when the first MAC address is determined to be consistent with the second MAC address.
In the embodiment of the invention, after the second MAC address of the encrypted data packet is determined to be consistent with the corresponding first MAC address in the door lock device, the mobile terminal is indicated to be registered and bound with the unlocking right, and the door lock device can be unlocked. The process of determining whether the first MAC address and the second MAC address are consistent may be implemented by using an algorithm or an application program, for example, an application program for determining may be set in the door lock device, and after the first MAC address and the second MAC address are obtained, the application program may be input to obtain a result of determining whether the first MAC address and the second MAC address are consistent.
In the embodiment of the invention, the door lock equipment can be quickly unlocked in a scene with weak mobile network signals by means of the mode of sending the encrypted data packet by the mobile terminal through close-range communication with the door lock equipment for unlocking, and the safety of the close-range communication can be greatly improved by means of the pairing information verification and the MAC address encryption transmission and verification modes, so that the door lock equipment is prevented from being unlocked by illegal equipment, and the user experience is improved.
Example 2
Fig. 2 is a flowchart of a method for unlocking a door lock device through near field communication according to embodiment 2 of the present invention, where the method includes the following steps:
step S21: and after the short-distance communication connection with the mobile terminal is carried out, receiving the encrypted data packet sent by the mobile terminal.
This step is identical to step S11 described above, and will not be described herein again.
Step S22: first pairing information is obtained from the mobile terminal.
This step is identical to step S12 described above, and will not be described herein again.
Step S23: and matching the first pairing information with an MAC address library to obtain a corresponding first MAC address and a first dynamic key.
This step is identical to step S13 described above, and will not be described herein again.
Step S24: and decrypting the encrypted data packet by using the first dynamic key and a preset decryption algorithm to obtain a second MAC address.
This step is identical to step S14 described above, and will not be described herein again.
Step S25: and judging whether the first MAC address is consistent with the second MAC address or not, and unlocking the door lock equipment when the first MAC address is determined to be consistent with the second MAC address.
This step is identical to step S15 described above, and will not be described herein again.
Step S26: and after the door lock equipment is unlocked, updating the first dynamic secret key into a second dynamic secret key.
Step S27: and after the first dynamic secret key is used for encrypting the second dynamic secret key by a preset encryption algorithm, the second dynamic secret key is sent to the mobile terminal.
In the embodiment of the invention, after the door lock device is unlocked, the updating operation of the dynamic key can be executed, namely, the current first dynamic key is updated to be the second dynamic key and is stored in association with the corresponding pairing information and the MAC address, wherein the dynamic key can be composed of part of the MAC address of the mobile terminal and the random number so as to verify the validity of the dynamic key. After the door lock device updates the corresponding first dynamic secret key of the door lock device to be the second dynamic secret key, the second dynamic secret key is encrypted by using the first dynamic secret key through a preset encryption algorithm to generate a data packet and the data packet is transmitted to the mobile terminal, so that the mobile terminal can also update the stored first dynamic secret key to be the second dynamic secret key after decrypting the data packet and is used for unlocking the door control device next time.
In the embodiment of the invention, after the door lock equipment is unlocked each time, the corresponding dynamic keys of the door lock equipment and the mobile terminal are synchronously updated, so that the safety of the door lock equipment in the unlocking process can be further improved.
Example 3
Fig. 3 is a flowchart of a method for unlocking a door lock device through near field communication according to embodiment 3 of the present invention, where the method includes the following steps:
step S31: the method comprises the steps of receiving first pairing information, a first MAC address and a first dynamic key sent by a server in advance, and storing the first pairing information, the first MAC address and the first dynamic key in an MAC address base in an associated mode.
In the embodiment of the invention, the mobile terminal can be connected with the server through the Internet to register and bind the door lock equipment, and when the related door lock equipment is registered and bound through the server, the server can acquire the MAC address of the mobile terminal as pairing information or generate the pairing code of a random number as the pairing information. And after the mobile terminal is successfully registered and bound, the server sends the acquired first pairing information, the first MAC address and the first dynamic key of the mobile terminal to the door lock device. And after receiving the first pairing information, the first MAC address and the first dynamic key, the door lock equipment stores the association to the MAC address library.
Step S32: and after the short-distance communication connection with the mobile terminal is carried out, receiving the encrypted data packet sent by the mobile terminal.
This step is identical to step S11 described above, and will not be described herein again.
Step S33: first pairing information is obtained from the mobile terminal.
This step is identical to step S12 described above, and will not be described herein again.
Step S34: and matching the first pairing information with an MAC address library to obtain a corresponding first MAC address and a first dynamic key.
This step is identical to step S13 described above, and will not be described herein again.
Step S35: and decrypting the encrypted data packet by using the first dynamic key and a preset decryption algorithm to obtain a second MAC address.
This step is identical to step S14 described above, and will not be described herein again.
Step S36: and judging whether the first MAC address is consistent with the second MAC address or not, and unlocking the door lock equipment when the first MAC address is determined to be consistent with the second MAC address.
This step is identical to step S15 described above, and will not be described herein again.
Example 4
Fig. 4 is a flowchart of a door lock device near field communication unlocking method according to embodiment 4 of the present invention, where the method includes the following steps:
step S41: and when receiving a binding request sent by the mobile terminal, acquiring the first MAC address of the near field communication module of the mobile terminal.
Step S42: and generating the first dynamic key and the first pairing information, and sending the first dynamic key and the first pairing information to the mobile terminal.
Step S43: storing the first pairing information, the first MAC address, and the first dynamic key association to the MAC address repository.
In the embodiment of the invention, after the mobile terminal is connected with the door lock device through near field communication, the mobile terminal can also send a binding request like the door lock device to acquire the unlocking right of the door lock device. After receiving the binding request sent by the mobile terminal, the door lock device executes a binding registration process after confirming through the operation of an administrator. In the binding process, the door lock device acquires a first MAC address of the mobile terminal, generates a corresponding first dynamic key and first pairing information, and stores the first MAC address, the first dynamic key and the first pairing information in an MAC address library in an associated manner. And sending the first dynamic key and the first pairing information to the mobile terminal so that the mobile terminal can transmit corresponding encrypted data packets in a result process.
Step S44: and after the short-distance communication connection with the mobile terminal is carried out, receiving the encrypted data packet sent by the mobile terminal.
This step is identical to step S11 described above, and will not be described herein again.
Step S45: first pairing information is obtained from the mobile terminal.
This step is identical to step S12 described above, and will not be described herein again.
Step S46: and matching the first pairing information with an MAC address library to obtain a corresponding first MAC address and a first dynamic key.
This step is identical to step S13 described above, and will not be described herein again.
Step S47: and decrypting the encrypted data packet by using the first dynamic key and a preset decryption algorithm to obtain a second MAC address.
This step is identical to step S14 described above, and will not be described herein again.
Step S48: and judging whether the first MAC address is consistent with the second MAC address or not, and unlocking the door lock equipment when the first MAC address is determined to be consistent with the second MAC address.
This step is identical to step S15 described above, and will not be described herein again.
Example 5
Fig. 5 is a flowchart of a method for requesting unlocking of a door lock device according to embodiment 5 of the present invention, where the method includes the following steps:
step S51: and after the connection with the door lock device through near field communication, the MAC address of the near field communication module is acquired.
Step S52: and encrypting the MAC address by using a first dynamic key through a preset encryption algorithm to generate an encrypted data packet.
Step S53: and sending the encrypted data packet to the door lock equipment to request to unlock the door lock equipment.
Fig. 6 is a flowchart of another method for requesting unlocking of a door lock device according to embodiment 5 of the present invention, where the method further includes the following steps:
step S54: and after the door lock equipment is unlocked, receiving an update data packet sent by the door lock equipment.
Step S55: and decrypting the updated data packet by using the first dynamic key through a preset decryption algorithm to obtain a second dynamic key, and updating the first dynamic key into the second dynamic key.
Example 6
Fig. 7 is a schematic structural diagram of a device for requesting unlocking of a door lock device according to embodiment 6 of the present invention.
The door lock apparatus unlocking request device 700 includes:
a data packet receiving module 710, configured to receive an encrypted data packet sent by a mobile terminal after being connected to the mobile terminal through near field communication;
a pairing information obtaining module 720, configured to obtain first pairing information from the mobile terminal;
the address matching module 730 is configured to match the MAC address library with the first pairing information to obtain a corresponding first MAC address and a first dynamic key;
the data packet decryption module 740 is configured to decrypt the encrypted data packet by using the first dynamic key and a preset decryption algorithm to obtain a second MAC address;
and an address determining module 750, configured to determine whether the first MAC address is consistent with the second MAC address, and unlock the door lock device when it is determined that the first MAC address is consistent with the second MAC address.
In the embodiment of the present invention, for more detailed description of functions of the modules, reference may be made to contents of corresponding parts in the foregoing embodiment, which are not described herein again.
In addition, the invention also provides a door lock device, which comprises a memory and a processor, wherein the memory can be used for storing a computer program, and the processor enables the door lock device to execute the method or requests the door lock device to solve the functions of each module in the lock device by running the computer program.
The memory may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the door lock apparatus, and the like. Further, the memory may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The embodiment also provides a computer storage medium for storing a computer program used in the door lock device.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method can be implemented in other ways. The apparatus embodiments described above are merely illustrative and, for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, each functional module or unit in each embodiment of the present invention may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention or a part of the technical solution that contributes to the prior art in essence can be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a smart phone, a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A door lock device near field communication unlocking method is characterized by comprising the following steps:
after the short-distance communication connection with a mobile terminal is carried out, receiving an encrypted data packet sent by the mobile terminal;
acquiring first pairing information from the mobile terminal;
matching the first pairing information with an MAC address base to obtain a corresponding first MAC address and a first dynamic key;
decrypting the encrypted data packet by using the first dynamic key and a preset decryption algorithm to obtain a second MAC address;
and judging whether the first MAC address is consistent with the second MAC address or not, and unlocking the door lock equipment when the first MAC address is determined to be consistent with the second MAC address.
2. The door lock device close range communication unlocking method according to claim 1, characterized by further comprising:
after the door lock equipment is unlocked, updating the first dynamic secret key into a second dynamic secret key;
and after the first dynamic secret key is used for encrypting the second dynamic secret key by a preset encryption algorithm, the second dynamic secret key is sent to the mobile terminal.
3. The door lock device close range communication unlocking method according to claim 1, characterized by further comprising:
the method comprises the steps of receiving first pairing information, a first MAC address and a first dynamic key sent by a server in advance, and storing the first pairing information, the first MAC address and the first dynamic key in an MAC address base in an associated mode.
4. The door lock device close range communication unlocking method according to claim 1, characterized by further comprising:
when a binding request sent by the mobile terminal is received, acquiring the first MAC address of a near field communication module of the mobile terminal;
generating the first dynamic key and the first pairing information, and sending the first dynamic key and the first pairing information to the mobile terminal;
storing the first pairing information, the first MAC address, and the first dynamic key association to the MAC address repository.
5. The door lock device near field communication unlocking method according to claim 1, wherein the first pairing information is an MAC address of a near field communication module of the mobile terminal or a pairing code, and after the mobile terminal is bound to the door lock device, the pairing code is generated by a server and is issued to the mobile terminal and the door lock device.
6. The door lock device near field communication unlocking method according to claim 1, wherein the near field communication includes bluetooth communication, Zigbee communication, and NFC communication.
7. A method for requesting unlocking of a door lock device is characterized by comprising the following steps:
after the connection with the door lock device through near field communication, the MAC address of the near field communication module is obtained;
encrypting the MAC address by using a first dynamic key through a preset encryption algorithm to generate an encrypted data packet;
and sending the encrypted data packet to the door lock equipment to request to unlock the door lock equipment.
8. The door lock device unlocking request method according to claim 7, further comprising:
after the door lock equipment is unlocked, receiving an update data packet sent by the door lock equipment;
and decrypting the updated data packet by using the first dynamic key through a preset decryption algorithm to obtain a second dynamic key, and updating the first dynamic key into the second dynamic key.
9. A door lock device characterized by comprising a memory and a processor, the memory storing a computer program which, when run on the processor, performs the door lock device close range communication unlocking method according to any one of claims 1 to 6.
10. A readable storage medium characterized by storing a computer program which, when executed on a processor, executes the door lock device close range communication unlocking method according to any one of claims 1 to 6.
CN202110530330.1A 2021-05-14 2021-05-14 Near field communication unlocking method and request unlocking method for door lock equipment Pending CN113298981A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110530330.1A CN113298981A (en) 2021-05-14 2021-05-14 Near field communication unlocking method and request unlocking method for door lock equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110530330.1A CN113298981A (en) 2021-05-14 2021-05-14 Near field communication unlocking method and request unlocking method for door lock equipment

Publications (1)

Publication Number Publication Date
CN113298981A true CN113298981A (en) 2021-08-24

Family

ID=77322192

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110530330.1A Pending CN113298981A (en) 2021-05-14 2021-05-14 Near field communication unlocking method and request unlocking method for door lock equipment

Country Status (1)

Country Link
CN (1) CN113298981A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050210283A1 (en) * 2004-02-27 2005-09-22 Oki Electric Industry Co., Ltd. Wireless key system
CN106652106A (en) * 2015-10-29 2017-05-10 中兴通讯股份有限公司 Door lock control method, device and terminal
CN107038777A (en) * 2017-03-29 2017-08-11 云丁网络技术(北京)有限公司 A kind of safety communicating method and its intelligent door lock system based on intelligent door lock system
CN107516364A (en) * 2017-08-30 2017-12-26 上海若禅信息科技有限公司 Method for unlocking, bluetooth lock and the unlocking terminal of bluetooth lock
CN108768628A (en) * 2018-05-11 2018-11-06 星络科技有限公司 Equipment end encryption method, device, system and gateway

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050210283A1 (en) * 2004-02-27 2005-09-22 Oki Electric Industry Co., Ltd. Wireless key system
CN106652106A (en) * 2015-10-29 2017-05-10 中兴通讯股份有限公司 Door lock control method, device and terminal
CN107038777A (en) * 2017-03-29 2017-08-11 云丁网络技术(北京)有限公司 A kind of safety communicating method and its intelligent door lock system based on intelligent door lock system
CN107516364A (en) * 2017-08-30 2017-12-26 上海若禅信息科技有限公司 Method for unlocking, bluetooth lock and the unlocking terminal of bluetooth lock
CN108768628A (en) * 2018-05-11 2018-11-06 星络科技有限公司 Equipment end encryption method, device, system and gateway

Similar Documents

Publication Publication Date Title
US10580240B2 (en) Use of mobile device to configure a lock
US11265319B2 (en) Method and system for associating a unique device identifier with a potential security threat
CN109448195B (en) Authentication method and device for vehicle virtual key
KR100552984B1 (en) Device and method for restricting content access and storage
EP1512307B1 (en) Method and system for challenge-response user authentication
EP2057819B1 (en) Method for synchronising between a server and a mobile device
CN114788226B (en) Unmanaged tool for building decentralized computer applications
KR20180029695A (en) System and method for transmitting data using block-chain
CN106790156B (en) Intelligent device binding method and device
CN110535880B (en) Access control method and system of Internet of things
JP2008519488A (en) System and method for providing multiple credential authentication protocols
CN102017578A (en) Network helper for authentication between a token and verifiers
CN110113355B (en) Internet of things cloud access method and device
CN104952128A (en) Intelligent handheld terminal based electronic unlocking system and unlocking method thereof
CN110690956B (en) Bidirectional authentication method and system, server and terminal
EP3684005A1 (en) Method and system for recovering cryptographic keys of a blockchain network
CN101771992A (en) Method, equipment and system for protection of confidentiality of international mobile subscriber identifier IMSI
EP1770585A2 (en) Security method and system and computer-readable medium storing computer program for executing the security method
EP1626524A1 (en) Method of generating a key for device authentication and apparatus using the method, and device authentication method and device authentication apparatus
CN111522809A (en) Data processing method, system and equipment
CN110753023A (en) Equipment authentication method, equipment access method and device
JP2008124847A (en) Cipher communication system, communication terminal device, cipher communication program, and cipher communication method
JP7489310B2 (en) Electronic Key System
WO2017134759A1 (en) Authentication device, authentication system, and authentication program
CN113298981A (en) Near field communication unlocking method and request unlocking method for door lock equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210824

RJ01 Rejection of invention patent application after publication