CN113538739B - Pairing method of intelligent lock, electronic device and storage medium - Google Patents

Pairing method of intelligent lock, electronic device and storage medium Download PDF

Info

Publication number
CN113538739B
CN113538739B CN202110643695.5A CN202110643695A CN113538739B CN 113538739 B CN113538739 B CN 113538739B CN 202110643695 A CN202110643695 A CN 202110643695A CN 113538739 B CN113538739 B CN 113538739B
Authority
CN
China
Prior art keywords
client
intelligent lock
cloud platform
communication
login
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110643695.5A
Other languages
Chinese (zh)
Other versions
CN113538739A (en
Inventor
许春波
徐永强
马仁智
张楠
朱龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Huacheng Software Technology Co Ltd
Original Assignee
Hangzhou Huacheng Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Huacheng Software Technology Co Ltd filed Critical Hangzhou Huacheng Software Technology Co Ltd
Priority to CN202110643695.5A priority Critical patent/CN113538739B/en
Publication of CN113538739A publication Critical patent/CN113538739A/en
Application granted granted Critical
Publication of CN113538739B publication Critical patent/CN113538739B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0025Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The application relates to a pairing method of an intelligent lock, an electronic device and a storage medium, wherein the pairing method of the intelligent lock comprises the following steps: the client acquires the identification information of the intelligent lock based on near-field communication, and the client sends the identification information to the cloud platform based on long-distance communication; responding to a root key factor corresponding to the identification information provided by the cloud platform, and generating a two-dimensional code graph carrying the root key factor by the client; responding to the two-dimension code graph scanned by the intelligent lock, requesting binding authentication from the intelligent lock by the client, and acquiring a binding authentication result based on close-range communication, wherein the binding authentication result is encrypted by a root key corresponding to the root key factor; the client sends a binding authentication result to the cloud platform based on remote communication; and responding to the verification of the binding authentication result by the cloud platform, and successfully pairing the client and the intelligent lock. Through the intelligent lock binding method and device, the problem that the intelligent lock is bound by mistake in the related technology is solved, and the accuracy of intelligent lock binding is improved.

Description

Pairing method of intelligent lock, electronic device and storage medium
Technical Field
The application relates to the technical field of access control, in particular to a pairing method of an intelligent lock, an electronic device and a storage medium.
Background
With the development of scientific technology, the door lock is not limited to the traditional mechanical key mode for opening the door, and intelligent locks are selected in more and more occasions, particularly in household occasions. At present, the door can be directly opened by means of the smart phone terminal and the matched application program. The trouble brought by carrying the key can be avoided, and the unlocking process is more convenient.
At present, the client device is mainly used for controlling the lock through close-range communication such as Bluetooth, NFC and the like, and the communication protocol can be subjected to plaintext transmission, so that each communication can be encrypted, if the encryption key of each communication is unchanged, the security problems such as packet grabbing, monitoring, cracking and replaying exist, most of the existing intelligent lock binding is realized by searching nearby devices through an APP for connection, but when the number of the devices is large, the binding speed is greatly reduced, and the problem of false binding also occurs.
At present, no effective solution is proposed for the problem of error binding of the intelligent lock in the related technology.
Disclosure of Invention
The embodiment of the application provides a pairing method of an intelligent lock, an electronic device and a storage medium, so as to at least solve the problem that the intelligent lock is wrongly bound in the related technology.
In a first aspect, an embodiment of the present application provides a pairing method of an intelligent lock, including:
the method comprises the steps that a client establishes close-range communication with an intelligent lock, and the client establishes remote-range communication with a cloud platform;
the client acquires identification information of the intelligent lock based on the near-field communication, and the client sends the identification information to a cloud platform based on the far-field communication;
responding to a root key factor corresponding to the identification information provided by the cloud platform, and generating a two-dimensional code graph carrying the root key factor by the client;
responding to the intelligent lock to scan the two-dimensional code graph, requesting binding authentication from the intelligent lock by the client, and acquiring a binding authentication result based on the near field communication, wherein the binding authentication result is encrypted by a root key corresponding to the root key factor;
the client sends the binding authentication result to the cloud platform based on the remote communication;
and responding to the verification of the binding authentication result by the cloud platform, and successfully pairing the client and the intelligent lock.
In some of these embodiments, the client establishing close range communication with the smart lock, and the client establishing remote range communication with the cloud platform comprises:
the client acquires a login account input by a user;
and under the condition that the login account performs login, the client establishes close-range communication with the intelligent lock, and the client establishes remote-range communication with the cloud platform.
In some embodiments, before the client generates the two-dimensional code graph carrying the root key factor in response to the root key factor corresponding to the identification information provided by the cloud platform, the method further includes:
the cloud platform is used for acquiring the identification information sent by the client through the long-distance communication;
the cloud platform is used for inquiring whether the intelligent lock corresponding to the identification information is bound or not;
under the condition that the cloud platform does not inquire that the intelligent lock corresponding to the identification information is bound, the cloud platform is used for generating a root key factor corresponding to the identification information according to a preset algorithm and the identification information and returning the root key factor to the client, wherein the preset algorithm comprises one of the following steps: symmetric encryption algorithm, asymmetric encryption algorithm.
In some embodiments, before the client requests binding authentication from the smart lock in response to the smart lock scanning the two-dimensional code pattern and obtaining a binding authentication result based on the near field communication, the method further includes:
and the client generates a scanning instruction corresponding to the two-dimensional code graph, wherein the scanning instruction is used for instructing a user to scan the two-dimensional code graph for the intelligent lock.
In some embodiments, in response to the smart lock scanning the two-dimensional code pattern, the client requesting binding authentication from the smart lock and obtaining a binding authentication result based on the near field communication includes:
after the two-dimensional code graph is scanned, the intelligent lock is used for generating a binding authentication result according to a root key factor carried in the two-dimensional code graph and a preset algorithm, and sending the binding authentication result to the client based on near field communication under the condition that the request sent by the client is bound and identified, wherein the preset algorithm comprises one of the following steps: symmetric encryption algorithm, asymmetric encryption algorithm.
In some of these embodiments, after the client sends the binding authentication result to the cloud platform based on the long-range communication, the method further includes:
the cloud platform is used for storing binding relation information of successful pairing of the client and the intelligent lock, wherein the binding relation information comprises: pairing information between the client and the intelligent lock, and the root key factor.
In some of these embodiments, after the client successfully pairs with the smart lock in response to the cloud platform verifying the binding authentication result, the method further comprises:
the client acquires binding relation information of the intelligent lock from the cloud platform based on remote communication;
the client sends the binding relation information and unlocking information of the intelligent lock to the intelligent lock based on close range communication, wherein the unlocking information carries a login request message;
responding to a temporary login challenge code provided by the intelligent lock according to the login request message, and sending the temporary login challenge code to the cloud platform by the client through long-distance communication;
and responding to login information generated by the cloud platform according to the temporary login challenge code, and logging in the intelligent lock by the client according to the login information so that the intelligent lock can execute unlocking operation according to the unlocking message.
In some embodiments, before the client logs in to the smart lock according to the login information generated by the cloud platform according to the temporary login challenge code, so that the smart lock performs an unlocking operation according to the unlocking message, the method further includes:
the cloud platform is used for acquiring the temporary login challenge code and generating a communication key according to a preset algorithm, wherein the preset algorithm comprises: a symmetric encryption algorithm, an asymmetric encryption algorithm;
the cloud platform is used for generating the login information based on the communication key and sending the login information to the client, wherein the login information carries the communication key.
In some embodiments, after the cloud platform is configured to generate the login information based on the communication key and send the login information to the client, the method further includes:
the intelligent lock is used for receiving login information sent by the client;
the intelligent lock is used for verifying the communication key in the login information according to the preset algorithm;
and under the condition that the intelligent lock verifies the communication key successfully according to a preset algorithm, the intelligent lock executes unlocking operation.
In a second aspect, an embodiment of the present application provides an electronic device, including a memory, a processor, and a computer program stored on the memory and capable of running on the processor, where the processor implements the pairing method of the smart lock according to the first aspect when executing the computer program.
In a second aspect, an embodiment of the present application provides a storage medium having stored thereon a computer program, which when executed by a processor implements a pairing method for a smart lock as described in the first aspect above.
Compared with the related art, the pairing method, the electronic device and the storage medium of the intelligent lock provided by the embodiment of the application have the advantages that the close-range communication with the intelligent lock is established through the client, and the long-range communication with the cloud platform is established through the client; the client acquires the identification information of the intelligent lock based on near-field communication, and the client sends the identification information to the cloud platform based on long-distance communication; responding to a root key factor corresponding to the identification information provided by the cloud platform, and generating a two-dimensional code graph carrying the root key factor by the client; responding to the two-dimension code graph scanned by the intelligent lock, requesting binding authentication from the intelligent lock by the client, and acquiring a binding authentication result based on close-range communication, wherein the binding authentication result is encrypted by a root key corresponding to the root key factor; the client sends a binding authentication result to the cloud platform based on remote communication; and in response to the verification of the binding authentication result by the cloud platform, the client and the intelligent lock are successfully paired, so that the problem that the intelligent lock is wrongly bound in the related technology is solved, and the binding accuracy of the intelligent lock is improved.
The details of one or more embodiments of the application are set forth in the accompanying drawings and the description below to provide a more thorough understanding of the other features, objects, and advantages of the application.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute an undue limitation to the application. In the drawings:
fig. 1 is a hardware block diagram of a terminal of a pairing method of an intelligent lock according to an embodiment of the present application;
FIG. 2 is a flow chart of a pairing method of smart locks according to embodiments of the present application;
FIG. 3 is a block diagram of the pairing system of the smart lock according to the preferred embodiment of the present application;
FIG. 4 is a flow chart of a pairing method of the smart lock according to the preferred embodiment of the present application;
FIG. 5 is a timing diagram of a pairing method of smart locks according to a preferred embodiment of the present application;
FIG. 6 is a flow chart of a method of unlocking a smart lock according to a preferred embodiment of the present application;
fig. 7 is a timing diagram of an unlocking method of the smart lock according to a preferred embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described and illustrated below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden on the person of ordinary skill in the art based on the embodiments provided herein, are intended to be within the scope of the present application. Moreover, it should be appreciated that while such a development effort might be complex and lengthy, it would nevertheless be a routine undertaking of design, fabrication, or manufacture for those of ordinary skill having the benefit of this disclosure, and thus should not be construed as having the benefit of this disclosure.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is to be expressly and implicitly understood by those of ordinary skill in the art that the embodiments described herein can be combined with other embodiments without conflict.
Unless defined otherwise, technical or scientific terms used herein should be given the ordinary meaning as understood by one of ordinary skill in the art to which this application belongs. Reference to "a," "an," "the," and similar terms herein do not denote a limitation of quantity, but rather denote the singular or plural. The terms "comprising," "including," "having," and any variations thereof, are intended to cover a non-exclusive inclusion; for example, a process, method, system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to only those steps or elements but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. The terms "connected," "coupled," and the like in this application are not limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. The term "plurality" as used herein means greater than or equal to two. "and/or" describes an association relationship of an association object, meaning that there may be three relationships, e.g., "a and/or B" may mean: a exists alone, A and B exist together, and B exists alone. The terms "first," "second," "third," and the like, as used herein, are merely distinguishing between similar objects and not representing a particular ordering of objects.
The method embodiment provided in this embodiment may be executed in a terminal, a computer or a similar computing device. Taking the operation on the terminal as an example, fig. 1 is a block diagram of a hardware structure of a terminal of a pairing method of an intelligent lock according to an embodiment of the present application. As shown in fig. 1, the terminal may include one or more processors 102 (only one is shown in fig. 1) (the processor 102 may include, but is not limited to, a microprocessor MCU or a processing device such as a programmable logic device FPGA) and a memory 104 for storing data, and optionally, a transmission device 106 for communication functions and an input-output device 108. It will be appreciated by those skilled in the art that the structure shown in fig. 1 is merely illustrative and not limiting on the structure of the terminal described above. For example, the terminal may also include more or fewer components than shown in fig. 1, or have a different configuration than shown in fig. 1.
The memory 104 may be used to store a computer program, for example, a software program of application software and a module, such as a computer program corresponding to a pairing method of the smart lock in an embodiment of the present invention, and the processor 102 executes the computer program stored in the memory 104, thereby performing various functional applications and data processing, that is, implementing the above-mentioned method. Memory 104 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory remotely located relative to the processor 102, which may be connected to the terminal via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device 106 is used to receive or transmit data via a network. The specific example of the network described above may include a wireless network provided by a communication provider of the terminal. In one example, the transmission device 106 includes a network adapter (Network Interface Controller, simply referred to as NIC) that can connect to other network devices through a base station to communicate with the internet. In one example, the transmission device 106 may be a Radio Frequency (RF) module, which is configured to communicate with the internet wirelessly.
The embodiment provides a pairing method of an intelligent lock, and fig. 2 is a flowchart of the pairing method of the intelligent lock according to the embodiment of the application, as shown in fig. 2, the flowchart includes the following steps:
in step S201, the client establishes close range communication with the smart lock, and the client establishes remote range communication with the cloud platform.
In the step, communication between the intelligent lock and the cloud platform is established through the client side so as to conveniently realize information interaction between the cloud platform and the intelligent lock.
Note that, the manner of near field communication may include, but is not limited to: near field communication (Near Field Communication, NFC for short), bluetooth, softap. Means of remote communication may include, but are not limited to: GPRS/CDMA wireless communication, data transmission radio station, spread spectrum microwave, wireless bridge and satellite communication, short wave communication technology.
Step S202, the client acquires the identification information of the intelligent lock based on the near-field communication, and the client sends the identification information to the cloud platform based on the far-field communication.
In this step, after the user logs in on the client using the login account, the user clicks to start adding the intelligent lock, and then the user can start close-range pairing according to the prompt on the client to pair to the intelligent lock, and obtain the identification information of the intelligent lock.
In some embodiments, the client establishing close range communication with the smart lock, and the client establishing remote range communication with the cloud platform may include: the client acquires a login account input by a user; under the condition that the login account is logged in, the client establishes close-range communication with the intelligent lock, and the client establishes remote communication with the cloud platform.
In this embodiment, after the user inputs the login account, the client establishes communication with the intelligent lock and the cloud platform, so that the client establishes communication with the intelligent lock and the cloud platform according to the login account, and meanwhile, the cloud platform and the intelligent lock are also convenient to determine the login account of the client.
Before step S203, the cloud platform may be configured to acquire, through long-range communication, identification information sent by the client; the cloud platform is used for inquiring whether the intelligent lock corresponding to the identification information is bound or not; under the condition that the cloud platform does not inquire that the intelligent lock corresponding to the identification information is bound, the cloud platform is used for generating a root key factor corresponding to the identification information according to a preset algorithm and the identification information and returning the root key factor to the client, wherein the preset algorithm comprises one of the following steps: symmetric encryption algorithm, asymmetric encryption algorithm.
In this embodiment, when the cloud platform does not query that the intelligent lock corresponding to the identification information is bound, the cloud platform generates the root key factor corresponding to the identification information according to the preset algorithm and the identification information and returns the root key factor to the client, so that the uniqueness of the binding of the intelligent lock can be ensured, the problem that the intelligent lock is bound, wrapped, broken and retried by a plurality of clients to cause the problem of reduced security of the intelligent lock is prevented, and meanwhile, the root key factors corresponding to different intelligent locks can be different by generating the corresponding root key factors according to the identification information, so that the security of the intelligent lock is improved.
It should be noted that, the cloud platform may pre-store some databases bound by the historical intelligent locks, and may query the databases for whether the intelligent locks are bound. The cloud platform can also pre-generate a pre-binding relation between the login account and the intelligent lock under the condition that the intelligent lock corresponding to the identification information is not bound.
In some embodiments, the cloud platform may further encrypt the root key factor, where encryption of the root key factor is implemented through one or more combinations of the foregoing preset algorithms, so as to ensure security of the root key factor.
Step S203, the client generates a two-dimensional code graph carrying the root key factor in response to the root key factor corresponding to the identification information provided by the cloud platform.
In this embodiment, the two-dimensional code pattern may carry a login account of the client user, in addition to the root key factor.
In some embodiments, the client may generate a two-dimensional code pattern carrying a root key factor, and also generate a scan instruction corresponding to the two-dimensional code pattern, where the scan instruction is used to instruct a user to scan the two-dimensional code pattern for the intelligent lock.
In this embodiment, by generating the scan indication, the two-dimensional code pattern may be scanned, so that the intelligent lock may obtain information such as a root key factor in the two-dimensional code pattern.
And step S204, responding to the two-dimension code graph scanned by the intelligent lock, requesting binding authentication from the intelligent lock by the client, and acquiring a binding authentication result based on close range communication, wherein the binding authentication result is encrypted by a root key corresponding to the root key factor.
In this step, the client may request binding authentication from the smart lock in a round-robin procedure, for example, it may be configured to send a request binding authentication to the smart lock for 2 seconds, but not limited to, until the binding is successful.
It should be noted that, the binding authentication result may be generated by encrypting a root key corresponding to the root key factor, the root key may be generated by a preset algorithm, and the preset algorithm may include, but is not limited to, a symmetric encryption algorithm and an asymmetric encryption algorithm.
In some embodiments, in step S203, after the smart lock scans the two-dimensional code pattern, the smart lock is configured to generate a binding authentication result according to a root key factor carried in the two-dimensional code pattern and a preset algorithm, and send the binding authentication result to the client based on near field communication when receiving a request binding identification sent by the client, where the preset algorithm includes one of: symmetric encryption algorithm, asymmetric encryption algorithm.
In the embodiment, the client generates the two-dimensional code graph and the verification indication of the two-dimensional code graph according to the root key factor, and indicates the user to verify the two-dimensional code graph for the intelligent lock through the verification indication of the two-dimensional code graph, so that the intelligent lock scans the two-dimensional code graph and acquires the root key factor in the two-dimensional code graph, the intelligent lock generates a binding authentication result according to the root key factor through a preset algorithm, and then the binding authentication result is returned to the client, and the acquisition and verification of the root key factor by the intelligent lock are realized.
It should be noted that, the intelligent lock can save the root key factor so as to be convenient for the next direct use, and save the unlocking operation time of the user.
In step S205, the client sends a binding authentication result to the cloud platform based on the remote communication.
And step S206, the client side and the intelligent lock are successfully paired in response to the verification of the binding authentication result by the cloud platform.
In this step, when the cloud platform obtains the binding authentication result, an algorithm corresponding to a preset algorithm may be adopted to determine binding authentication result information, and verification is performed, and after verification is passed, it is determined that the client and the intelligent lock are successfully paired, so that pairing between the intelligent lock and the client is achieved.
In some embodiments, when the verification is passed, the cloud platform is configured to store binding relationship information of successful pairing between the client and the intelligent lock, where the binding relationship information includes: pairing information between the client and the smart lock, and a root key factor. In this embodiment, by the above manner, the cloud platform stores binding relationship information of successful pairing between the client and the intelligent lock, so as to facilitate subsequent operation of the intelligent lock.
Based on the steps S201 to S206, the client sends the identification information of the intelligent lock to the cloud platform, so that the cloud platform generates a root key factor according to the identification information and returns the root key factor to the client, the client generates a two-dimensional code graph according to the root key factor, then the two-dimensional code graph generated on the client is displayed to the intelligent lock by a user for scanning, so that the intelligent lock obtains the root key factor information in the two-dimensional code graph, generates a binding authentication result according to the root key factor information and returns the binding authentication result to the client, and finally sends the binding authentication result to the cloud platform, so that the cloud platform completes the binding of the intelligent lock and the login account according to the binding authentication result, the root key factor is transferred through the two-dimensional code graph, then the binding between the intelligent lock and the login account is realized according to the root key factor, the problem that the intelligent lock is in error binding in the related technology is solved, and the binding accuracy of the intelligent lock is improved.
In some embodiments, after the client and the intelligent lock are successfully paired in response to verification of the binding authentication result by the cloud platform, the client may acquire binding relationship information of the intelligent lock from the cloud platform based on long-distance communication; the client sends binding relation information and unlocking information of the intelligent lock to the intelligent lock based on near field communication, wherein the unlocking information carries login request information; responding to the temporary login challenge code provided by the intelligent lock according to the login request message, and transmitting the temporary login challenge code to the cloud platform by the client through long-distance communication; and responding to the login information generated by the cloud platform according to the temporary login challenge code, and logging in the intelligent lock by the client according to the login information so that the intelligent lock performs unlocking operation according to the unlocking information.
In this embodiment, the client may directly obtain the binding relationship information of the intelligent lock from the cloud platform according to the identification information of the intelligent lock, then obtain the temporary login challenge code from the intelligent lock according to the login request message, and then send the temporary login challenge code to the cloud platform to obtain the login information, so as to realize unlocking of the intelligent lock.
In some embodiments, before the client logs in to the smart lock according to the login information in response to the login information generated by the cloud platform according to the temporary login challenge code, so that the smart lock performs an unlocking operation according to the unlocking message, the cloud platform is configured to acquire the temporary login challenge code and generate the communication key according to a preset algorithm, where the preset algorithm includes: a symmetric encryption algorithm, an asymmetric encryption algorithm; the cloud platform is used for generating login information based on the communication key and sending the login information to the client, wherein the login information carries the communication key.
In this embodiment, the cloud platform generates the communication key according to the preset algorithm by temporarily logging in the challenge code, and generates the login information by using the communication key, so that the security of communication key interaction is improved.
It should be noted that the temporary login challenge code may be a character string randomly generated by the smart lock through a preset algorithm, and the randomness of the communication key can be realized through a mode that the randomly generated temporary login challenge code and the root key factor generate the communication key through the preset algorithm, so that the problem that risks exist when the communication key is stolen is prevented, and the security of the smart lock is improved.
In some embodiments, the smart lock may also encrypt the communication key, thereby ensuring the security of the communication key.
In some embodiments, after the cloud platform is configured to generate login information based on the communication key and send the login information to the client, the smart lock is configured to receive the login information sent by the client; the intelligent lock is used for verifying the communication key in the login information according to a preset algorithm; under the condition that the intelligent lock verifies the communication key successfully according to a preset algorithm, the intelligent lock executes unlocking operation.
In this embodiment, the intelligent lock verifies the communication key through the preset algorithm, and in the case that the intelligent lock verifies the communication key according to the preset algorithm, the unlocking operation is performed by the intelligent lock, so that the unlocking safety of the intelligent lock is improved.
The embodiments of the present application are described and illustrated below by means of preferred embodiments.
Fig. 3 is a block diagram of the pairing system of the smart lock according to the preferred embodiment of the present application. As shown in fig. 3, the system includes: the intelligent lock comprises a client, a cloud platform and an intelligent lock, wherein the client is in direct close range communication with the intelligent lock, the client is in direct communication with the cloud platform, and the intelligent lock is not in communication with the cloud platform. Wherein, the liquid crystal display device comprises a liquid crystal display device,
the client, configured to provide an operation interface for binding, controlling, etc. of the end user visualization, may include the following modules:
a first service control module: the system comprises a user interaction interface and control business logic such as equipment pairing, binding, unlocking and the like;
and a close-range communication module: acquiring unique identification information of the intelligent lock through close-range communication with the intelligent lock, wherein the unique identification information at least comprises information such as a unique identification of the Bluetooth lock by taking the Bluetooth lock as an example;
two-dimensional code graph management module: and when pairing authentication is bound, acquiring information such as a root key factor and the like from the cloud platform to generate a two-dimensional code pattern, wherein the two-dimensional code pattern is used for scanning by a two-dimensional code pattern scanning module of the intelligent lock.
The cloud platform is used for providing equipment binding relation data storage, key management and service control logic, and can comprise the following modules:
and a second service control module: the method mainly comprises the steps of managing business logic of operation instructions such as authentication binding and unlocking of locks, including but not limited to control and management of business logic such as various encryption and hash algorithms;
device binding module: managing the binding relation between the user account and the intelligent lock, wherein the binding relation at least comprises the persistent storage of two associated data of the unique identification (serial number SN or physical address MAC and the like) of the intelligent lock and the user account (mobile phone number or user name and the like), including but not limited to storage media such as mysql, mongoDB and the like;
a key management module: the method is mainly responsible for generating information such as root key factors and managing the root key generation algorithm and the communication key life cycle.
The intelligent lock can comprise the following modules:
and a third service control module: the method mainly comprises the steps of managing business logic of operation instructions such as authentication binding, unlocking and the like, including but not limited to control and management of business logic such as various encryption, hash algorithms and the like;
and a close-range communication module: providing close range point-to-point data interaction functions with clients, including but not limited to bluetooth, NFC, softap, etc. protocols;
two-dimensional code graph scanning module: the two-dimensional code pattern in the APP can be scanned and identified, and the control of the service is completed together with the service control module, wherein the module can be a camera or other devices, and the device capable of completing the two-dimensional code pattern identification can be used.
Fig. 4 is a flow chart of a pairing method of the smart lock according to the preferred embodiment of the present application. As shown in fig. 4, the method comprises the steps of:
step S401, after the user registers and logs in the account, the user prepares to start adding the intelligent lock, and the user controls the intelligent lock to enter a pairing mode according to prompts such as APP and a specification to prepare close-range pairing.
Step S402, the client acquires the identification information of the equipment in a short distance and uploads the identification information to the cloud platform.
Step S403, the cloud platform judges whether the intelligent lock is already bound, and if so, step S409 is executed; if not, step S404 is executed.
Step S404, the cloud platform generates a pre-binding relation between the user account and the intelligent lock, generates and stores information such as root key factors of the intelligent lock, and finally returns the information such as root key factors to the client.
It should be noted that, the root key factor is guaranteed to be different for each device by the cloud platform.
Step S405, the client acquires information such as a root key factor and the like, then generates a two-dimensional code pattern, prompts a user to aim the two-dimensional code pattern at a two-dimensional code pattern scanning module of the intelligent lock, and requests binding authentication from the round robin device.
The two-dimensional code graphic content includes, but is not limited to, information such as a root key factor, a user unique ID, and the like. The round robin interval is defined by the client and may be, but is not limited to, every 2 seconds.
Step S406, after the intelligent lock successfully scans the two-dimension code graph, generating information such as a root key according to a preset algorithm through the information such as the root key factor, and returning a binding authentication result through the algorithms such as hash, encryption and the like.
Step S407, the client forwards the binding authentication result returned by the intelligent lock to the cloud platform.
In step S408, the cloud platform calculates and verifies the binding authentication result information by adopting the same algorithm according to the information such as the key factor, and stores the binding relationship between the user account and the intelligent lock and the information such as the root key factor of the intelligent lock after the verification is successful.
In step S409, the client prompts the user to bind the result.
Fig. 5 is a timing chart of a pairing method of the smart lock according to the preferred embodiment of the present application, and as shown in fig. 5, the timing corresponds to the steps in fig. 4 one by one, which will not be described herein.
Fig. 6 is a flowchart of an unlocking method of the smart lock according to the preferred embodiment of the present application, as shown in fig. 6, the flowchart includes:
and step S601, after the user acquires the bound intelligent lock information from the cloud platform through the client, the user communicates with the intelligent lock in a short distance, and a temporary login challenge code is acquired.
Step S602, the intelligent lock generates and returns a temporary login challenge code, and information such as a communication key of the time is locally generated through a preset algorithm according to the information such as the temporary login challenge code and a root key factor.
And step S603, after the client acquires the temporary login challenge code returned by the intelligent lock, requesting to acquire the encrypted information for generating the login intelligent lock from the cloud platform.
It should be noted that, in some embodiments, the request for obtaining from the cloud platform is not limited to the generation of the encrypted information of the login smart lock, but may be hash information generated by a hash algorithm, and so on.
Step S604, after completing the permission verification, the cloud platform generates information such as a communication key and the like and generates encryption information of a login lock according to the information such as the temporary login challenge code and the root key factor.
It should be noted that, the cloud platform may also store the communication key while generating the communication key.
Step S605, after the client acquires the encrypted information of the login lock returned by the cloud platform, a login instruction is issued to the intelligent lock.
Step S606, after the intelligent lock receives the request, the intelligent lock decrypts and verifies according to the local communication key and other information, and after verification is successful, the real login is completed.
In step S607, after the login is successful, the operation of the client on the intelligent lock is requested to the cloud platform, the cloud platform encrypts the information according to the communication key and the like, the client issues the encrypted information to the intelligent lock, and after the intelligent lock is verified, the corresponding operation is completed, and the operation of the intelligent lock includes but is not limited to the operation of control instructions such as unlocking.
Fig. 7 is a timing chart of an unlocking method of the smart lock according to the preferred embodiment of the present application, and as shown in fig. 7, the timing corresponds to the steps in fig. 6 one by one, which will not be described here.
Through the mode, the method and the device realize the transmission of the information such as the root key factor, the unique ID of the user and the like through the two-dimensional code graphic scanning, solve the security problem of the intelligent lock binding process, generate the temporary key of each communication through the information such as the temporary login challenge code and the root key factor, solve the various problems such as the key fixation, hijacking decryption and replay of each communication process and the like, and greatly improve the security of the intelligent lock.
The present embodiment also provides an electronic device comprising a memory having stored therein a computer program and a processor arranged to run the computer program to perform the steps of any of the method embodiments described above.
Optionally, the electronic apparatus may further include a transmission device and an input/output device, where the transmission device is connected to the processor, and the input/output device is connected to the processor.
Alternatively, in the present embodiment, the above-described processor may be configured to execute the following steps by a computer program:
in step S201, the client establishes close range communication with the smart lock, and the client establishes remote range communication with the cloud platform.
Step S202, the client acquires the identification information of the intelligent lock based on the near-field communication, and the client sends the identification information to the cloud platform based on the far-field communication.
Step S203, the client generates a two-dimensional code graph carrying the root key factor in response to the root key factor corresponding to the identification information provided by the cloud platform.
And step S204, responding to the two-dimension code graph scanned by the intelligent lock, requesting binding authentication from the intelligent lock by the client, and acquiring a binding authentication result based on close range communication, wherein the binding authentication result is encrypted by a root key corresponding to the root key factor.
In step S205, the client sends a binding authentication result to the cloud platform based on the remote communication.
And step S206, the client side and the intelligent lock are successfully paired in response to the verification of the binding authentication result by the cloud platform.
It should be noted that, specific examples in this embodiment may refer to examples described in the foregoing embodiments and alternative implementations, and this embodiment is not repeated herein.
In addition, in combination with the pairing method of the intelligent lock in the above embodiment, the embodiment of the application may provide a storage medium to be implemented. The storage medium has a computer program stored thereon; the computer program, when executed by a processor, implements the pairing method of any of the smart locks of the above embodiments.
It should be understood by those skilled in the art that the technical features of the above-described embodiments may be combined in any manner, and for brevity, all of the possible combinations of the technical features of the above-described embodiments are not described, however, they should be considered as being within the scope of the description provided herein, as long as there is no contradiction between the combinations of the technical features.
The above examples merely represent a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the invention. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application is to be determined by the claims appended hereto.

Claims (10)

1. A pairing method of an intelligent lock, comprising:
the method comprises the steps that a client establishes close-range communication with an intelligent lock, and the client establishes remote-range communication with a cloud platform;
the client acquires identification information of the intelligent lock based on the near-field communication, and the client sends the identification information to a cloud platform based on the far-field communication;
responding to a root key factor corresponding to the identification information provided by the cloud platform, and generating a two-dimensional code graph carrying the root key factor by the client;
responding to the intelligent lock to scan the two-dimensional code graph, requesting binding authentication from the intelligent lock by the client, and acquiring a binding authentication result based on the near field communication, wherein the binding authentication result is encrypted by a root key corresponding to the root key factor;
the client sends the binding authentication result to the cloud platform based on the remote communication;
responding to the verification of the binding authentication result by the cloud platform, and successfully pairing the client and the intelligent lock;
the client acquires binding relation information of the intelligent lock from the cloud platform based on remote communication;
the client sends the binding relation information and unlocking information of the intelligent lock to the intelligent lock based on close range communication, wherein the unlocking information carries a login request message;
responding to a temporary login challenge code provided by the intelligent lock according to the login request message, and sending the temporary login challenge code to the cloud platform by the client through long-distance communication;
and responding to login information generated by the cloud platform according to the temporary login challenge code, and logging in the intelligent lock by the client according to the login information so that the intelligent lock can execute unlocking operation according to the unlocking message.
2. The pairing method of the smart lock according to claim 1, wherein the client establishes close range communication with the smart lock, and the client establishes remote range communication with the cloud platform comprises:
the client acquires a login account input by a user;
and under the condition that the login account performs login, the client establishes close-range communication with the intelligent lock, and the client establishes remote-range communication with the cloud platform.
3. The pairing method of the intelligent lock according to claim 1, wherein before the client generates the two-dimensional code pattern carrying the root key factor in response to the root key factor corresponding to the identification information provided by the cloud platform, the method further comprises:
the cloud platform is used for acquiring the identification information sent by the client through the long-distance communication;
the cloud platform is used for inquiring whether the intelligent lock corresponding to the identification information is bound or not;
under the condition that the cloud platform does not inquire that the intelligent lock corresponding to the identification information is bound, the cloud platform is used for generating a root key factor corresponding to the identification information according to a preset algorithm and the identification information and returning the root key factor to the client, wherein the preset algorithm comprises one of the following steps: symmetric encryption algorithm, asymmetric encryption algorithm.
4. The pairing method of the smart lock according to claim 1, wherein before the client requests binding authentication from the smart lock in response to the smart lock scanning the two-dimensional code pattern and obtains a binding authentication result based on the near field communication, the method further comprises:
and the client generates a scanning instruction corresponding to the two-dimensional code graph, wherein the scanning instruction is used for instructing a user to scan the two-dimensional code graph for the intelligent lock.
5. The pairing method of the intelligent lock according to claim 1, wherein in response to the intelligent lock scanning the two-dimensional code pattern, the client requesting binding authentication from the intelligent lock and obtaining a binding authentication result based on the near field communication comprises:
after the two-dimensional code graph is scanned, the intelligent lock is used for generating a binding authentication result according to a root key factor carried in the two-dimensional code graph and a preset algorithm, and sending the binding authentication result to the client based on near field communication under the condition that the request sent by the client is bound and identified, wherein the preset algorithm comprises one of the following steps: symmetric encryption algorithm, asymmetric encryption algorithm.
6. The pairing method of the smart lock according to claim 1, wherein after the client transmits the binding authentication result to the cloud platform based on the long-range communication, the method further comprises:
the cloud platform is used for storing binding relation information of successful pairing of the client and the intelligent lock, wherein the binding relation information comprises: pairing information between the client and the intelligent lock, and the root key factor.
7. The pairing method of the smart lock according to claim 1, wherein before the client logs in to the smart lock according to login information generated by the cloud platform according to the temporary login challenge code in response to the login information, so that the smart lock performs an unlocking operation according to the unlocking message, the method further comprises:
the cloud platform is used for acquiring the temporary login challenge code and generating a communication key according to a preset algorithm, wherein the preset algorithm comprises: a symmetric encryption algorithm, an asymmetric encryption algorithm;
the cloud platform is used for generating the login information based on the communication key and sending the login information to the client, wherein the login information carries the communication key.
8. The pairing method of the smart lock according to claim 7, wherein after the cloud platform is configured to generate the login information based on the communication key and send the login information to the client, the method further comprises:
the intelligent lock is used for receiving login information sent by the client;
the intelligent lock is used for verifying the communication key in the login information according to the preset algorithm;
and under the condition that the intelligent lock verifies the communication key successfully according to a preset algorithm, the intelligent lock executes unlocking operation.
9. An electronic device comprising a memory and a processor, wherein the memory has stored therein a computer program, the processor being arranged to run the computer program to perform the pairing method of the smart lock of any one of claims 1 to 7.
10. A storage medium having a computer program stored therein, wherein the computer program is arranged to perform the pairing method of the smart lock of any one of claims 1 to 7 at run-time.
CN202110643695.5A 2021-06-09 2021-06-09 Pairing method of intelligent lock, electronic device and storage medium Active CN113538739B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110643695.5A CN113538739B (en) 2021-06-09 2021-06-09 Pairing method of intelligent lock, electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110643695.5A CN113538739B (en) 2021-06-09 2021-06-09 Pairing method of intelligent lock, electronic device and storage medium

Publications (2)

Publication Number Publication Date
CN113538739A CN113538739A (en) 2021-10-22
CN113538739B true CN113538739B (en) 2023-06-20

Family

ID=78124752

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110643695.5A Active CN113538739B (en) 2021-06-09 2021-06-09 Pairing method of intelligent lock, electronic device and storage medium

Country Status (1)

Country Link
CN (1) CN113538739B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114245386A (en) * 2021-12-06 2022-03-25 广东好太太智能家居有限公司 Intelligent equipment binding method and system applying honeycomb module
CN114189863B (en) * 2021-12-16 2024-03-22 青岛海尔科技有限公司 Binding method and device of intelligent door lock, storage medium and electronic device
CN114422216B (en) * 2021-12-31 2024-01-09 杭州华橙软件技术有限公司 Internet of things equipment binding method, device and storage medium
CN114999030A (en) * 2022-05-25 2022-09-02 杭州萤石软件有限公司 Unlocking method, system, electronic equipment and storage medium
CN115862192B (en) * 2022-11-07 2023-11-03 北京深盾科技股份有限公司 Control method, control system, electronic device and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018046426A1 (en) * 2016-09-08 2018-03-15 BSH Hausgeräte GmbH Laundry room management method and management system
CN108447149A (en) * 2018-02-05 2018-08-24 西安太极航空科技有限公司 A kind of unlocking method and device in shared house
CN110276574A (en) * 2019-03-27 2019-09-24 比奥香港有限公司 A kind of safe delivery system, method, cloud server and electronic equipment
CN210006113U (en) * 2019-07-23 2020-01-31 广东科徕尼智能科技有限公司 intelligent lock system using two-dimensional code for safe pairing
CN110992528A (en) * 2019-11-20 2020-04-10 广东科徕尼智能科技有限公司 Intelligent door lock binding method and equipment based on identification code and storage medium

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102638790A (en) * 2012-03-15 2012-08-15 华为终端有限公司 Password control method, device and system
CN103530924B (en) * 2013-10-25 2016-06-01 北京金储自动化技术有限公司 A kind of dynamic puzzle-lock system for Possum network management and method
CN105761340B (en) * 2016-01-29 2018-05-01 北京三快在线科技有限公司 A kind of network control method of door lock, device, server and PMS
CN107093228B (en) * 2016-02-17 2020-09-01 腾讯科技(深圳)有限公司 Authorization method, device and system applied to electronic lock
CN106790156B (en) * 2016-12-29 2020-12-22 海尔优家智能科技(北京)有限公司 Intelligent device binding method and device
CN107643693A (en) * 2017-09-25 2018-01-30 四川长虹电器股份有限公司 Intelligent peephole household Internet of Things network method
CN110288745A (en) * 2019-07-17 2019-09-27 移康智能科技(上海)股份有限公司 A kind of structure of intelligent door
WO2021023276A1 (en) * 2019-08-06 2021-02-11 云丁网络技术(北京)有限公司 Smart lock control method and device
CN112489250B (en) * 2019-09-12 2022-02-18 同方威视技术股份有限公司 Intelligent lock, intelligent supervision system and intelligent supervision method
CN111508111A (en) * 2020-04-13 2020-08-07 广东科徕尼智能科技有限公司 Method, equipment and storage medium for binding intelligent lock

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018046426A1 (en) * 2016-09-08 2018-03-15 BSH Hausgeräte GmbH Laundry room management method and management system
CN108447149A (en) * 2018-02-05 2018-08-24 西安太极航空科技有限公司 A kind of unlocking method and device in shared house
CN110276574A (en) * 2019-03-27 2019-09-24 比奥香港有限公司 A kind of safe delivery system, method, cloud server and electronic equipment
CN210006113U (en) * 2019-07-23 2020-01-31 广东科徕尼智能科技有限公司 intelligent lock system using two-dimensional code for safe pairing
CN110992528A (en) * 2019-11-20 2020-04-10 广东科徕尼智能科技有限公司 Intelligent door lock binding method and equipment based on identification code and storage medium

Also Published As

Publication number Publication date
CN113538739A (en) 2021-10-22

Similar Documents

Publication Publication Date Title
CN113538739B (en) Pairing method of intelligent lock, electronic device and storage medium
CN104601590B (en) A kind of login method, server and mobile terminal
KR102398276B1 (en) Method and apparatus for downloading and installing a profile
CN109756447A (en) A kind of safety certifying method and relevant device
CN110798833A (en) Method and device for verifying user equipment identification in authentication process
EP2879421B1 (en) Terminal identity verification and service authentication method, system, and terminal
CN108762791A (en) Firmware upgrade method and device
CN109716724A (en) The method and system authenticated with double nets of the communication equipment of server communication
US20160227412A1 (en) Wireless Terminal Configuration Method, Apparatus, and Wireless Terminal
CN104247485B (en) Network application function authorization in Generic Bootstrapping Architecture
CN102143492B (en) Method for establishing virtual private network (VPN) connection, mobile terminal and server
CN107211265B (en) Method and device for secure interaction between terminals
WO2023279897A1 (en) Secure binding method and system, storage medium, and electronic apparatus
CN112566119A (en) Terminal authentication method and device, computer equipment and storage medium
CN113162917A (en) Internet of things equipment access method, system, device and storage medium
CN112040484A (en) Password updating method and device, storage medium and electronic device
CN113613227B (en) Data transmission method and device of Bluetooth equipment, storage medium and electronic device
CN110167191B (en) Communication method and device
CN111357305B (en) Communication method, equipment, system and storage medium of movable platform
CN114338132B (en) Secret-free login method, client application, operator server and electronic equipment
CN108495292B (en) Intelligent household short-distance equipment communication method
CN114422216B (en) Internet of things equipment binding method, device and storage medium
CN112995090B (en) Authentication method, device and system for terminal application and computer readable storage medium
KR102263053B1 (en) A database structure capable of synchronizing data between devices in a local area network environment and a data synchronization method using the same
KR20220155867A (en) Method and apparatus for performing uwb (ultra wide band) secure ranging

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant