CN113593085A - Door lock temporary password generation method, system, equipment and storage medium - Google Patents

Door lock temporary password generation method, system, equipment and storage medium Download PDF

Info

Publication number
CN113593085A
CN113593085A CN202110827680.4A CN202110827680A CN113593085A CN 113593085 A CN113593085 A CN 113593085A CN 202110827680 A CN202110827680 A CN 202110827680A CN 113593085 A CN113593085 A CN 113593085A
Authority
CN
China
Prior art keywords
door lock
temporary password
password
generating
temporary
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110827680.4A
Other languages
Chinese (zh)
Inventor
肖力
刘伯通
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Heiman Technology Co ltd
Original Assignee
Shenzhen Heiman Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Heiman Technology Co ltd filed Critical Shenzhen Heiman Technology Co ltd
Priority to CN202110827680.4A priority Critical patent/CN113593085A/en
Publication of CN113593085A publication Critical patent/CN113593085A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The application discloses a door lock temporary password generation method, a system, equipment and a storage medium, wherein the method comprises the following steps: the lock is bound and connected with a door lock to be unlocked; acquiring password parameters for generating a temporary password; generating a temporary password data set through an encryption algorithm based on the password parameters of the temporary password; the method comprises the steps of obtaining bytes of a preset digit in a temporary password data set, generating a temporary password of a corresponding preset digit, binding a door lock, generating the temporary password data set based on password parameters, generating the temporary password of the preset digit based on the temporary password data set, reducing the risk of password leakage, increasing password safety, and guaranteeing information safety and property safety of a user.

Description

Door lock temporary password generation method, system, equipment and storage medium
Technical Field
The present application relates to the field of key generation, and in particular, to a method, a system, a device, and a storage medium for generating a temporary password of a door lock.
Background
Along with the development of technology, more and more intelligent cabinets are widely used in life, for example, express delivery cabinets, self-service sales cabinets and the like, the intelligent cabinets generally send passwords to mobile phones of users, or the users check unlocking keys through APP and then unlock through the keys, but in the existing scheme, due to the problem of network transmission, equipment passwords can be easily leaked, so that a customer door lock is opened, and loss is caused to customers.
Therefore, the prior art has yet to be improved based on the above problems.
Disclosure of Invention
The purpose of this application is to improve the security of a door lock key.
The technical purpose of the application is realized by the following technical scheme:
in a first aspect of the present application, a method for generating a temporary password of a door lock is disclosed, wherein the method includes:
the lock is bound and connected with a door lock to be unlocked;
acquiring password parameters for generating a temporary password;
generating a temporary password data set through an encryption algorithm based on the password parameters of the temporary password;
and acquiring bytes with a predetermined number of bits in the temporary password data set, and generating a temporary password with a corresponding predetermined number of bits.
According to the scheme, after the temporary password is bound with the door lock to be unlocked, the password parameter for generating the temporary password is acquired firstly, the temporary password data set is generated based on the password parameter, the byte of the password number is acquired from the temporary password data set, the temporary password is generated, the safety of the temporary password is guaranteed, the leakage of the password is avoided, and the safety is guaranteed.
Optionally, the method for generating the temporary password for the door lock includes:
binding a local area network gateway;
acquiring a plurality of pieces of door lock information of a local area network coverage range;
and selecting the door lock to be unlocked, and binding and connecting the door lock to be unlocked with the door lock to be unlocked.
According to the technical scheme, the door lock information in the local area network is acquired by binding the local area network gateway, and the door lock information is bound with the door lock needing to be unlocked, so that the data security and the stability are ensured, the data transmission is stable after the binding, and the data security is improved.
Optionally, the door lock temporary password generating method includes the steps of:
acquiring a door lock secret key of a bound door lock;
acquiring Mac of the bound door lock;
and acquiring the network time.
According to the scheme, the temporary password is generated based on the password parameters, the password parameters specifically comprise the bound door lock secret key, the door lock Mac and the network time, and the door lock secret key, the door lock Mac and the network time are relatively stable.
Optionally, the door lock temporary password generating method, wherein the method for generating the temporary password data set through the encryption algorithm based on the password parameter of the temporary password includes:
performing data migration according to a first preset time based on the time stamp;
and obtaining an MD5 data group for generating the temporary password through an MD5 algorithm based on the door lock key of the bound door lock, the Mac of the bound door lock and the time offset.
According to the scheme, data migration is performed according to the first preset time based on the network time, the safety of the data is further improved, and the uniqueness of the data group of the temporary password can be further ensured through the MD5 algorithm, so that the safety of the data is further ensured.
Optionally, the door lock temporary password generating method further includes:
and automatically updating the temporary password once every second preset time.
According to the scheme, the temporary password is automatically updated once every second preset time, the password is refreshed periodically, the update of the temporary password can be guaranteed, and the password leakage risk is further reduced.
On the other hand, the application also discloses a door lock temporary password generation system, wherein, include:
the binding module is used for binding and connecting with a door lock to be unlocked;
the password parameter acquisition module is used for acquiring password parameters for generating the temporary password;
the temporary password data group generation module is used for generating a temporary password data group through an encryption algorithm based on the password parameters of the temporary password;
and the temporary password generating module is used for acquiring bytes with preset digits in the temporary password data set and generating a temporary password with corresponding preset digits.
According to the scheme, after the temporary password is bound with the door lock to be unlocked, the password parameter for generating the temporary password is acquired firstly, the temporary password data set is generated based on the password parameter, the byte of the password number is acquired from the temporary password data set, the temporary password is generated, the safety of the temporary password is guaranteed, the leakage of the password is avoided, and the safety is guaranteed.
Optionally, the door lock temporary password generating system, wherein the parameters acquired by the password parameter acquiring module include: a door lock key of the bound door lock, Mac of the bound door lock, and network time.
According to the scheme, the temporary password is generated based on the password parameters, the password parameters specifically comprise the bound door lock secret key, the door lock Mac and the network time, and the door lock secret key, the door lock Mac and the network time are relatively stable.
Optionally, the door lock temporary password generating system, wherein the temporary password data set generating module includes:
a time shift unit for shifting data by a first predetermined time based on the time stamp;
and the MD5 data group generating unit is used for obtaining an MD5 data group for generating the temporary password through the MD5 algorithm based on the door lock key of the bound door lock, the Mac of the bound door lock and the time offset.
According to the scheme, data migration is performed according to the first preset time based on the network time, the safety of the data is further improved, and the uniqueness of the data group of the temporary password can be further ensured through the MD5 algorithm, so that the safety of the data is further ensured.
In another aspect of the present application, a door lock temporary password generating device is also disclosed, wherein the door lock temporary password generating device includes a memory and a processor, and the memory stores a computer program which can be loaded by the processor and executes the door lock temporary password generating method.
According to the scheme, the device is disclosed, and the memory stores the computer program which can be loaded by the processor and executes the method, so that interaction between the device and the door lock can be realized, and the safety of unlocking the door lock by a user is improved.
In another aspect of the present application, a storage medium is also disclosed, in which a computer program capable of being loaded by a processor and executing the door lock temporary password generation method as described above is stored.
According to the scheme, the storage medium stores the computer program of the method, and the computer program can be loaded and run after the mobile terminal is installed, so that interaction between the mobile terminal and the door lock is realized, a user can conveniently open the door lock, and the safety of opening the door lock is improved.
In summary, the present application discloses a door lock temporary password generation method, system, device and storage medium, wherein the method includes: the lock is bound and connected with a door lock to be unlocked; acquiring password parameters for generating a temporary password; generating a temporary password data set through an encryption algorithm based on the password parameters of the temporary password; the method comprises the steps of obtaining bytes of a preset digit in a temporary password data set, generating a temporary password of a corresponding preset digit, binding a door lock, generating the temporary password data set based on password parameters, generating the temporary password of the preset digit based on the temporary password data set, reducing the risk of password leakage, increasing password safety, and guaranteeing information safety and property safety of a user.
Drawings
Fig. 1 is a flowchart illustrating steps of a door lock temporary password generation method according to the present application.
Fig. 2 is a flowchart of S1 of the door lock temporary password generation method according to the present application.
Fig. 3 is a flowchart of step S3 of the door lock temporary password generation method according to the present application.
Fig. 4 is a block diagram of a door lock temporary password generation system according to the present application.
Fig. 5 is a block diagram of a temporary password data set generation module of the door lock temporary password generation system according to the present application.
Detailed Description
The present application is described in further detail below with reference to figures 1-5.
This application is based on among the prior art, the lock is opened the in-process, sends key to user terminal through the lock server, and user terminal directly opens the lock according to the key, but in network transmission process, receives the influence of network easily, is cracked by other people to cause the user loss, based on above-mentioned problem, this application discloses a door lock temporary password generation method, can be when the user needs to open the lock, generates the temporary password of lock, and the user can use the door lock is opened to temporary password, perhaps through sharing, shares for other people with the lock temporary password, is replaced by other people and opens the lock, has guaranteed data security. Specifically, in the embodiment of the present application, referring to fig. 1, which is a flowchart of steps of the method, the method for generating a temporary password for a door lock includes:
s1, binding and connecting with a door lock to be unlocked;
s2, acquiring password parameters for generating a temporary password;
s3, generating a temporary password data set through an encryption algorithm based on password parameters of the temporary password;
and S4, acquiring bytes with preset digits in the temporary password data set, and generating a temporary password with corresponding preset digits.
In the embodiment of the application, when a user needs to unlock a door lock, the user firstly binds with the door lock to be unlocked, at the same time, the door lock to be unlocked can only be bound with one user end, uniqueness is ensured, data security is improved, a temporary password needs to be generated after the door lock is bound with the door lock, in the embodiment of the application, data sources are needed for generating the temporary password, the data sources are password parameters, password parameters for generating the temporary password are obtained, data are extracted from the password parameters based on the password parameters, and a temporary password data group is generated, because the data length of the temporary password data group is greater than that of the temporary password, bytes with a preset number of bits are obtained from the data of the temporary password data group to form the temporary password, in the preferred embodiment of the application, the temporary password of the door lock is preferably an 8-bit password, in the embodiment of the application, the door lock is based on the same method, the temporary password is generated, the temporary password at the door lock end is consistent with the temporary password generated by the user side, so that after the temporary password is generated, a user can directly open the door lock through the temporary password, or the user shares the temporary password with other equipment or a mobile terminal, and the door lock can be opened as well.
In the foregoing solution, a user may be bound and connected with a door lock through a mobile terminal, and after the bound and connected, the door lock and the mobile terminal are in one-to-one correspondence, so as to ensure data uniqueness, specifically, in this embodiment of the application, the method for generating a temporary password for a door lock is a flowchart of step S1, referring to fig. 2, where the method for bound and connected with a door lock to be unlocked includes:
s101, binding a local area network gateway;
s102, acquiring a plurality of pieces of door lock information of a local area network coverage range;
s103, selecting the door lock to be unlocked and binding and connecting the door lock to be unlocked.
In the embodiment of the application, when the user side needs to open the door lock, the gateway of the local area network where the door lock is located is firstly bound, all door lock information in the coverage range of the local area network is obtained, the user can select the door lock to be opened, the door lock to be opened is bound and connected with the door lock to be unlocked, when the door lock is bound and connected, verification is needed, the door lock to be bound is ensured to be matched with the user, the user bound with the door lock is also ensured to be matched, the mistaken binding is avoided, the door lock is staggered, after the verification is passed, the user side is also bound with the door lock of the user, data interaction can be realized, and the data security is ensured.
In the foregoing solution, after the user establishes the binding connection with the door lock, the generation of the temporary password is based on the password parameter, and the password parameter is encrypted to generate the temporary password data set.
Acquiring a door lock secret key of a bound door lock;
acquiring Mac of the bound door lock;
and acquiring the network time.
In the embodiment of the application, in order to ensure the security of data, after a user terminal is bound with a door lock to be unlocked, password parameters for generating a temporary password are obtained, wherein the password parameters comprise a door lock secret key of the door lock bound with the user terminal, a Mac of the door lock bound with the user terminal and network time, the door lock secret key of the bound door lock is fixed and unique, the Mac of the bound door lock is fixed and unique, the network time is standard time when the user needs to generate the temporary password, and the standard time is different at different time points, so that the data in a generated temporary password data set is relatively stable and is not easy to be cracked by other people based on the parameters, thereby ensuring the security of the data and ensuring the uniqueness of the temporary password,
in the foregoing solution, based on the bound door lock key of the door lock, the Mac of the door lock, and the network time, the temporary password data set may be generated by encryption, and in order to further ensure the security of the data, the data is encrypted by an encryption algorithm, in this embodiment of the present application, further, the door lock temporary password generation method refers to fig. 3, which is a flowchart of step S3, where the method for generating the temporary password data set by the encryption algorithm based on the password parameter of the temporary password includes:
s301, data migration is carried out according to first preset time based on the time stamp;
s302, obtaining an MD5 data set for generating a temporary password through an MD5 algorithm based on the door lock key of the bound door lock, the Mac of the bound door lock and the time offset.
In the embodiment of the present application, it is mentioned in the foregoing solution that the door lock key and the door lock Mac of the bound door lock are fixed and unique, and the network time may be that other users request to unlock at the same time, so in the present application, in order to further prevent the data from being decrypted, a data offset manner is adopted, and based on the acquired network time, the timestamp is subjected to data offset according to the first predetermined time based on the acquired network time, in the embodiment of the present application, for example, the timestamp is offset backwards by 30 minutes, for example, the current network time 08:30 is acquired, and the current network time is offset backwards by 30 minutes, that is, the timestamp becomes 09:00, in the embodiment of the present application, optionally, the number of bits of the temporary password may be set, and in order to expand the data amount of the temporary password data group, the byte length of the network time may be increased, for example, the timestamp 08:30 may be selected, the date 05/10/08:30, namely 8:30 of 5 month 30, further, the year 21/05/30/08:30, for example, can be selected, the byte length of the temporary password data group is further increased, of course, the specific temporary password adopts a 10-system mode, and the door lock key and the door lock Mac can be converted into decimal data according to needs.
In this embodiment of the application, further, in order to implement timeliness of the temporary password, the method for generating the temporary password for the door lock further includes:
and automatically updating the temporary password once every second preset time.
In this embodiment of the application, the temporary password is automatically updated once every second predetermined time, so as to further ensure the security of the data, where the second predetermined time is preferably 5 minutes, and in a specific implementation, the method further includes, for the timestamp, obtaining the remainder according to the second predetermined time, for example, in an embodiment, the second predetermined time is 5 minutes, obtaining the remainder according to 5 minutes, and displaying the remainder at the user end, after the temporary password is generated, the user end displays the password expiration time, and when the network time reaches the password expiration time, the temporary password is automatically updated, the method for generating the temporary password at the user end is consistent with the method for generating the temporary password at the device, that is, the door lock key, the device Mac, and the timestamp, and the offset are consistent, that is, the temporary password at the door lock end is consistent with and synchronous with the temporary password at the user end, so as to achieve the unlocking of the temporary password, and updating the temporary passwords of the door lock end and the user end every 5 minutes until the next 5 minutes, and sharing the temporary passwords by the user after obtaining the temporary passwords.
In the embodiment of the application, the user side can set the verification mode, when the user quits the temporary password interface and then enters the temporary password display interface again, the user needs to pass the verification, such as fingerprint verification and/or password verification, and after the verification passes, the user enters the temporary password display interface, so that the data security is further ensured.
In another aspect of the present application, a door lock temporary password generating system is further disclosed, referring to fig. 4, which is a block diagram of the structure of the system, where the system includes:
the binding module 100 is used for binding and connecting with a door lock to be unlocked;
a password parameter obtaining module 200, configured to obtain a password parameter for generating a temporary password;
a temporary password data group generating module 300, configured to generate a temporary password data group through an encryption algorithm based on a password parameter of the temporary password;
the temporary password generating module 400 is configured to obtain bytes with a predetermined number of bits in the temporary password data set, and generate a temporary password with a corresponding predetermined number of bits.
In the embodiment of the application, after the door lock to be unlocked is bound, the password parameter for generating the temporary password is acquired firstly, then the temporary password data set is generated based on the password parameter, the byte of the password number is acquired from the temporary password data set, the temporary password is generated, the safety of the temporary password is ensured, the leakage of the password is avoided, and the safety is ensured. The specific implementation of each module is described in the method steps, and therefore, is not described herein.
Further, the door lock temporary password generating system, wherein the parameters acquired by the password parameter acquiring module 200 include: a door lock key of the bound door lock, Mac of the bound door lock, and network time.
According to the scheme, the temporary password is generated based on the password parameters, the password parameters specifically comprise the bound door lock secret key, the door lock Mac and the network time, and the door lock secret key, the door lock Mac and the network time are relatively stable.
Further, the door lock temporary password generating system, referring to fig. 5, is a block diagram of a structure of the temporary password data set generating module 300, and specifically includes:
a time shift unit 301 configured to shift data according to a first predetermined time based on the timestamp;
and the MD5 data group generating unit 302 is used for obtaining an MD5 data group for generating the temporary password through the MD5 algorithm based on the door lock key of the bound door lock, the Mac of the bound door lock and the time offset.
In the above scheme of the present application, data shifting is performed according to the first predetermined time based on the network time, so as to further improve the security of the data, and the uniqueness of the data group of the temporary password can be further ensured through the MD5 algorithm, so as to further ensure the security of the data.
In another aspect of the present application, a door lock temporary password generating device is also disclosed, wherein the door lock temporary password generating device includes a memory and a processor, and the memory stores a computer program which can be loaded by the processor and executes the door lock temporary password generating method.
In another aspect of the present application, a storage medium is also disclosed, in which a computer program capable of being loaded by a processor and executing the door lock temporary password generation method as described above is stored.
The embodiments of the present invention are preferred embodiments of the present application, and the scope of protection of the present application is not limited by the embodiments, so: all equivalent changes made according to the structure, shape and principle of the present application shall be covered by the protection scope of the present application.

Claims (10)

1. A door lock temporary password generation method is characterized by comprising the following steps:
the lock is bound and connected with a door lock to be unlocked;
acquiring password parameters for generating a temporary password;
generating a temporary password data set through an encryption algorithm based on the password parameters of the temporary password;
and acquiring bytes with a predetermined number of bits in the temporary password data set, and generating a temporary password with a corresponding predetermined number of bits.
2. The door lock temporary password generation method according to claim 1, wherein the method of binding and connecting with the door lock to be unlocked includes:
binding a local area network gateway;
acquiring a plurality of pieces of door lock information of a local area network coverage range;
and selecting the door lock to be unlocked, and binding and connecting the door lock to be unlocked with the door lock to be unlocked.
3. The door lock temporary password generation method according to claim 1, wherein the method of acquiring the password parameter for generating the temporary password comprises:
acquiring a door lock secret key of a bound door lock;
acquiring Mac of the bound door lock;
and acquiring the network time.
4. The door lock temporary password generation method according to claim 3, wherein the method of generating the temporary password data set by the encryption algorithm based on the password parameter of the temporary password comprises:
performing data migration according to a first preset time based on the time stamp;
and obtaining an MD5 data group for generating the temporary password through an MD5 algorithm based on the door lock key of the bound door lock, the Mac of the bound door lock and the time offset.
5. The door lock temporary password generation method according to claim 1, further comprising:
and automatically updating the temporary password once every second preset time.
6. A door lock temporary password generation system, comprising:
the binding module is used for binding and connecting with a door lock to be unlocked;
the password parameter acquisition module is used for acquiring password parameters for generating the temporary password;
the temporary password data group generation module is used for generating a temporary password data group through an encryption algorithm based on the password parameters of the temporary password;
and the temporary password generating module is used for acquiring bytes with preset digits in the temporary password data set and generating a temporary password with corresponding preset digits.
7. The door lock temporary password generation system according to claim 6, wherein the parameters acquired by the password parameter acquisition module include: a door lock key of the bound door lock, Mac of the bound door lock, and network time.
8. The door lock temporary password generation system according to claim 7, wherein the temporary password data set generation module includes:
a time shift unit for shifting data by a first predetermined time based on the time stamp;
and the MD5 data group generating unit is used for obtaining an MD5 data group for generating the temporary password through the MD5 algorithm based on the door lock key of the bound door lock, the Mac of the bound door lock and the time offset.
9. A door lock temporary password generation apparatus comprising a memory and a processor, the memory storing a computer program that can be loaded by the processor and executes the door lock temporary password generation method according to any one of claims 1 to 5.
10. A storage medium storing a computer program that can be loaded by a processor and executes the door lock temporary password generation method according to any one of claims 1 to 5.
CN202110827680.4A 2021-07-22 2021-07-22 Door lock temporary password generation method, system, equipment and storage medium Pending CN113593085A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110827680.4A CN113593085A (en) 2021-07-22 2021-07-22 Door lock temporary password generation method, system, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110827680.4A CN113593085A (en) 2021-07-22 2021-07-22 Door lock temporary password generation method, system, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113593085A true CN113593085A (en) 2021-11-02

Family

ID=78248911

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110827680.4A Pending CN113593085A (en) 2021-07-22 2021-07-22 Door lock temporary password generation method, system, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113593085A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114399854A (en) * 2021-12-30 2022-04-26 荣耀终端有限公司 Unlocking method of intelligent door lock, mobile device and storage medium
CN116052307A (en) * 2022-12-28 2023-05-02 广州河东科技有限公司 Unlocking method, unlocking system, intelligent door lock and storage medium
WO2023236503A1 (en) * 2022-06-08 2023-12-14 Oppo广东移动通信有限公司 Password generation method, password verification method and related apparatuses

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105681044A (en) * 2015-12-25 2016-06-15 张晓峰 Verification code recognition system taking password or verification code as sequence number
CN108337090A (en) * 2018-05-21 2018-07-27 上海众人网络安全技术有限公司 A kind of dynamic password acquisition methods, device, terminal and storage medium
CN109410410A (en) * 2018-11-29 2019-03-01 深圳绿米联创科技有限公司 Method, apparatus, system and the electronic equipment of intelligent door lock Cipher Processing
CN109636983A (en) * 2018-12-19 2019-04-16 广东工业大学 A kind of access control method, device and access control system
CN110430055A (en) * 2019-08-13 2019-11-08 北京百佑科技有限公司 Offline cryptogram generation method, offline cryptogram verification method and door lock management server
CN110443925A (en) * 2019-08-06 2019-11-12 深圳市沃特沃德股份有限公司 Generation method, device, storage medium and the computer equipment of temporary password

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105681044A (en) * 2015-12-25 2016-06-15 张晓峰 Verification code recognition system taking password or verification code as sequence number
CN108337090A (en) * 2018-05-21 2018-07-27 上海众人网络安全技术有限公司 A kind of dynamic password acquisition methods, device, terminal and storage medium
CN109410410A (en) * 2018-11-29 2019-03-01 深圳绿米联创科技有限公司 Method, apparatus, system and the electronic equipment of intelligent door lock Cipher Processing
CN109636983A (en) * 2018-12-19 2019-04-16 广东工业大学 A kind of access control method, device and access control system
CN110443925A (en) * 2019-08-06 2019-11-12 深圳市沃特沃德股份有限公司 Generation method, device, storage medium and the computer equipment of temporary password
CN110430055A (en) * 2019-08-13 2019-11-08 北京百佑科技有限公司 Offline cryptogram generation method, offline cryptogram verification method and door lock management server

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114399854A (en) * 2021-12-30 2022-04-26 荣耀终端有限公司 Unlocking method of intelligent door lock, mobile device and storage medium
WO2023236503A1 (en) * 2022-06-08 2023-12-14 Oppo广东移动通信有限公司 Password generation method, password verification method and related apparatuses
CN116052307A (en) * 2022-12-28 2023-05-02 广州河东科技有限公司 Unlocking method, unlocking system, intelligent door lock and storage medium

Similar Documents

Publication Publication Date Title
CN113593085A (en) Door lock temporary password generation method, system, equipment and storage medium
CN110098923B (en) Method and equipment for generating and verifying temporary password
RU2506637C2 (en) Method and device for verifying dynamic password
CN104104517B (en) The method and system of disposal password checking
CN110162936A (en) A kind of use authorization method of software content
CN101183932B (en) Security identification system of wireless application service and login and entry method thereof
CN111787530B (en) Block chain digital identity management method based on SIM card
CN1323538C (en) A dynamic identity certification method and system
US20070257813A1 (en) Secure network bootstrap of devices in an automatic meter reading network
CN103490881B (en) Authentication service system, user authentication method, and authentication information processing method and system
US6529886B1 (en) Authenticating method for an access and/or payment control system
CN105337729B (en) A kind of encryption method of mobile terminal, device and mobile terminal
CN106971442A (en) A kind of safe and intelligent lock system
CN107146307A (en) A kind of method of securely unlocking of intelligent lock system
CN101136750A (en) Network real-name system implementing method
CN102307193A (en) Key updating and synchronizing method, system and device for dynamic token
CN108055129B (en) A kind of method, equipment and system for realizing the unified management of cellphone shield key
CN107221061A (en) A kind of cipher management method of smart lock
CN106936588A (en) A kind of trustship method, the apparatus and system of hardware controls lock
CN104125230A (en) Short message authentication service system and authentication method
CN110570564A (en) single-machine lock and control method thereof
CN110580759A (en) Manageable single-machine lock, realization method thereof and centralized single-machine lock management system
CN104735064A (en) Safety revocation and updating method for identification in identification password system
CN113593094A (en) Apartment intelligent lock management method and system
CN206961200U (en) A kind of safe and intelligent lock system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination