CN114155632A - Encryption communication key distribution method for electronic door lock of networked hotel - Google Patents

Encryption communication key distribution method for electronic door lock of networked hotel Download PDF

Info

Publication number
CN114155632A
CN114155632A CN202111445393.3A CN202111445393A CN114155632A CN 114155632 A CN114155632 A CN 114155632A CN 202111445393 A CN202111445393 A CN 202111445393A CN 114155632 A CN114155632 A CN 114155632A
Authority
CN
China
Prior art keywords
key
position information
door lock
electronic door
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111445393.3A
Other languages
Chinese (zh)
Other versions
CN114155632B (en
Inventor
彭爱民
缪丹
凌彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Locstar Technology Co ltd
Original Assignee
Shenzhen Locstar Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Locstar Technology Co ltd filed Critical Shenzhen Locstar Technology Co ltd
Priority to CN202111445393.3A priority Critical patent/CN114155632B/en
Publication of CN114155632A publication Critical patent/CN114155632A/en
Application granted granted Critical
Publication of CN114155632B publication Critical patent/CN114155632B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00857Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C9/00904Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for hotels, motels, office buildings or the like
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/3013Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the discrete logarithm problem, e.g. ElGamal or Diffie-Hellman systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention relates to the field of hotel informatization management, in particular to a networked hotel electronic door lock encryption communication key distribution method, wherein the adopted system comprises a management server, an electronic door lock and an electronic key, and the method comprises the following steps: the method comprises the following steps: the electronic door lock obtains the position information of the electronic key by reading corresponding electronic key information, encrypts the position information to form first encrypted position information, and sends the first encrypted position information to the management server; step two: the management server encrypts the communication key to form an encrypted communication key, and the encrypted communication key is sent to the electronic door lock; step three: the electronic door lock restores the encrypted communication key, encrypts the restored communication key and the position information to form second encrypted position information, and sends the second encrypted position information and the position information to the management server; step four: the management server compares whether the position information is consistent with the position information restored by the second encrypted position information, and if so, the key distribution is successful.

Description

Encryption communication key distribution method for electronic door lock of networked hotel
Technical Field
The invention relates to the field of hotel informatization management, in particular to a method for distributing an encryption communication key of a networked hotel electronic door lock.
Background
The electronic door lock of the hotel guest room adopts a specific electronic storage medium as an electronic key, the electronic key is programmed through a special read-write device according to the dynamic information of the time period of each guest to live in and the room to live in, and the electronic door lock completes unlocking authorization by identifying and comparing the time period of the live in and the room to live in the electronic key and the current time and position information of the door lock.
With the development of the internet of things technology, the networking type electronic door lock is widely adopted in the hotel industry, data interactive communication is carried out between the networking type electronic door lock and a hotel guest room door lock remote management server through the internet, set information issuing, remote control and state reporting of the electronic door lock are achieved, meanwhile, corresponding application software is operated on a smart phone to store electronic key information of guests on the mobile phone, the mobile phone is made to be a corresponding electronic key, the guests use the mobile phone to carry out non-contact identification and interconnection with the existing guest room door lock of the hotel, and unlocking authorization can be completed.
At present, a communication link between an electronic door lock and a hotel guest room door lock remote management server generally adopts a public internet and an internet of things platform to reduce operation cost, interactive data is sensitive data of a system, and in order to ensure the safety of the hotel guest room door lock system, a necessary encryption mode is needed to realize encryption processing on the interactive data.
Disclosure of Invention
The invention provides a method for distributing encryption communication keys of electronic door locks of networked hotels, aiming at solving the defects and shortcomings processed by the prior art.
In order to achieve the above object, the technical solution adopted by the present invention is a method for distributing encrypted communication keys for electronic door locks of networked hotels, the adopted system comprises a management server, an electronic door lock and an electronic key, wherein the management server is internally provided with a first public key, a first private key and a communication key corresponding to the electronic door lock, the management server writes position information and the first public key of a designated electronic door lock into the corresponding electronic key, and the electronic door lock is provided with a second public key and a second private key, the method comprises the following steps:
the method comprises the following steps: the electronic door lock obtains the position information of the electronic key by reading corresponding electronic key information, encrypts the position information to form first encrypted position information, and sends a first data packet containing the first encrypted position information to the management server;
step two: the management server encrypts the communication key to form an encrypted communication key and sends a second data packet containing the encrypted communication key to the electronic door lock;
step three: the electronic door lock receives the second data packet, restores the encrypted communication key, encrypts the restored communication key and the position information to form second encrypted position information, and sends a third data packet containing the second encrypted position information and the position information to the management server;
step four: and the management server receives the third data packet, compares whether the position information is consistent with the position information restored by the second encrypted position information, and if so, successfully distributes the key.
In the first step, the electronic door lock obtains the position information and the first public key of the electronic key by reading corresponding electronic key information, the electronic door lock generates a shared secret key through the second private key and the first public key, then encrypts the position information through the shared secret key to form first encrypted position information, and the electronic door lock sends the first encrypted position information and the second public key to the management server.
In the second step, the management server obtains the shared secret key through reduction of a second public key and a first private key, then obtains the position information through decryption of the first encrypted position information through the shared secret key, and encrypts the communication secret key corresponding to the position information through the shared secret key to form the encrypted communication secret key and sends the encrypted communication secret key to the electronic door lock.
In the third step, the electronic door lock obtains the communication key through the recovery of the shared key and the encrypted communication key, encrypts the position information through the communication key to form the second encrypted position information, and sends the second encrypted position information and the position information to the management server.
In the fourth step, the management server decrypts the second encrypted location information through the communication key to obtain location information, compares the location information obtained through decryption with existing location information, if the location information obtained through decryption is consistent with the existing location information, confirms that the encrypted communication key is successfully distributed, and if the location information obtained through decryption is not consistent with the existing location information, repeats the first step to the fourth step.
The first private key, the second private key and the communication key are random numbers with fixed length, and the first public key and the second public key are formed by selecting the same prime number and primitive root through a Diffie-Hellman key exchange algorithm.
The position information comprises a hotel number, a building number, a floor room number, a floor sub-room number and a current timestamp.
In the fourth step, if the timestamp of the third data packet is greater than the timestamp of the second data packet, the key distribution is successful; and if the timestamp of the third data packet is less than the timestamp of the second data packet, redistributing the key.
The invention has the beneficial effects that:
the invention provides a method for distributing an encryption communication key of a networked hotel electronic door lock, which solves the technical problem of data encryption communication key distribution between the hotel electronic door lock and a hotel guest room door lock remote management server, and meanwhile, the method can be compatible with the current popular hotel electronic door lock installation and deployment process, and realizes efficient and convenient installation and deployment.
Drawings
Fig. 1 is a flowchart of an encryption communication key distribution method for an electronic door lock of a networked hotel according to the present invention.
Detailed Description
The invention will be described in further detail with reference to the accompanying drawings, which are simplified schematic drawings and only schematically illustrate the basic structure of the invention, and the direction of the embodiment is based on the direction of fig. 1.
As shown in fig. 1, a method for distributing encrypted communication keys for electronic door locks of networked hotels adopts a system including a management server, an electronic door lock, and an electronic key, wherein the management server is provided with a first public key, a first private key, and a communication key corresponding to the electronic door lock, the management server writes position information and the first public key of a designated electronic door lock into the corresponding electronic key, and the electronic door lock is provided with a second public key and a second private key, and the method includes the following steps:
the method comprises the following steps: the electronic door lock obtains the position information of the electronic key by reading corresponding electronic key information, encrypts the position information to form first encrypted position information, and sends a first data packet containing the first encrypted position information to the management server;
step two: the management server encrypts the communication key to form an encrypted communication key and sends a second data packet containing the encrypted communication key to the electronic door lock;
step three: the electronic door lock receives the second data packet, restores the encrypted communication key, encrypts the restored communication key and the position information to form second encrypted position information, and sends a third data packet containing the second encrypted position information and the position information to the management server;
step four: and the management server receives the third data packet, compares whether the position information is consistent with the position information restored by the second encrypted position information, and if so, successfully distributes the key.
The second public key and the second private key of the electronic door lock are fixedly stored in the electronic door lock before the electronic door lock leaves a factory. And a first public key, a first private key and a communication key corresponding to the electronic door lock in the management server are generated and stored in a database in the management server when software is installed and initialized. The management server programs the specific electronic key through the special read-write equipment and writes the position information of the specified door lock and the first public key into the specific electronic key.
In the first step, the electronic door lock obtains the position information and the first public key of the electronic key by reading corresponding electronic key information, the electronic door lock generates a shared key through a second private key and the first public key, the position information is encrypted through the shared key to form first encrypted position information, and the electronic door lock sends the first encrypted position information and the second public key to the management server.
In the second step, the management server obtains a shared secret key through the reduction of the second public key and the first private key, then obtains position information through the decryption of the first encrypted position information through the shared secret key, encrypts a communication secret key corresponding to the position information through the shared secret key to form an encrypted communication secret key, and sends the encrypted communication secret key to the electronic door lock.
After the management server decrypts and restores the position information, the management server compares the position information and confirms the validity of the position information, and therefore replay attack of third party acting as a middle person can be effectively prevented. Because the position information is generally continuous coded data, if a replay attack is implemented by a third party man in the middle (namely, the man in the middle intercepts the second public key sent by the electronic door lock and replaces the second public key with the third party public key, a correct shared secret key is necessarily modified), the position information decrypted by the management server is necessarily illegal data.
And in the third step, the electronic door lock obtains the communication key through the recovery of the shared key and the encrypted communication key, the electronic door lock encrypts the position information through the communication key to form second encrypted position information, and the electronic door lock sends the second encrypted position information and the position information to the management server.
And step four, the management server decrypts the second encrypted position information through the communication key to obtain the position information, compares the position information obtained by decryption with the existing position information, if the position information is consistent with the existing position information, confirms that the encrypted communication key is successfully distributed, and if the position information is not consistent with the existing position information, repeats the steps from the first step to the fourth step.
The first private key, the second private key and the communication key are random numbers with fixed length, and the first public key and the second public key are formed by selecting the same prime number and primitive root through a Diffie-Hellman key exchange algorithm. The fixed length random number may be 16 bytes or 32 bytes.
deffe-Hellman (DH) key exchange is one of the earliest key exchange algorithms that enable two communicating parties to exchange keys securely in an unsecured channel for use in encrypting subsequent communication messages. Whitfield Diffie and Martin Hellman, 1976, propose the algorithm, which is then applied to the security field, such as TLS (transport Layer Security) of the Https protocol and IKE (Internet Key exchange) of the IPsec protocol, both of which use the DH algorithm as a Key exchange algorithm.
The position information comprises a hotel number, a building number, a floor room number, a floor sub-room number and a current timestamp.
In the fourth step, if the timestamp of the third data packet is greater than the timestamp of the second data packet, the key distribution is successful; the time stamp of the third data packet is less than the time stamp of the second data packet, the key is redistributed.
The electronic door lock and the management server adopt an AES128 symmetric encryption algorithm to encrypt a plaintext by using a communication key, the plaintext comprises a current time stamp, the management server side verifies that the time stamp of the third data packet is more than the time stamp of the second data packet to be valid, otherwise, a new communication key is regenerated, the door lock is requested to repeatedly start the first step, and new communication key distribution is restarted.
The time stamp is data generated by using a digital signature technology, and a signed object comprises original file information, signature parameters, signature time and other information. The main purpose of the time stamp is to authenticate the time of data generation by a certain technical means, so as to verify whether the data is falsified after being generated.
Looking at the development of symmetric ciphers, the DES data encryption standard algorithm has not been adapted to the requirements of data encryption security nowadays, so the IST has collected new data encryption standards in 1997. Upon tumidinodan selection, the Rijndael algorithm filed by Joan Daenan and Vincent Rijner, belgium was proposed as the final algorithm of AES. As a new generation of data encryption standard, AES has converged advantages of strong security, high performance, high efficiency, easy use, flexibility and the like. AES is designed with three key lengths of 128, 192, 256 bits. The method of the invention uses 128 bits.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (8)

1. A method for distributing encryption communication keys of electronic door locks of networked hotels is characterized by comprising the following steps: the adopted system comprises a management server, an electronic door lock and an electronic key, wherein a first public key, a first private key and a communication key which correspond to the electronic door lock are arranged in the management server, the management server writes the position information and the first public key of the appointed electronic door lock into the corresponding electronic key, and the electronic door lock is provided with a second public key and a second private key, and the method comprises the following steps:
the method comprises the following steps: the electronic door lock obtains the position information of the electronic key by reading corresponding electronic key information, encrypts the position information to form first encrypted position information, and sends a first data packet containing the first encrypted position information to the management server;
step two: the management server encrypts the communication key to form an encrypted communication key and sends a second data packet containing the encrypted communication key to the electronic door lock;
step three: the electronic door lock receives the second data packet, restores the encrypted communication key, encrypts the restored communication key and the position information to form second encrypted position information, and sends a third data packet containing the second encrypted position information and the position information to the management server;
step four: and the management server receives the third data packet, compares whether the position information is consistent with the position information restored by the second encrypted position information, and if so, successfully distributes the key.
2. The networked hotel electronic door lock encryption communication key distribution method according to claim 1, wherein: in the first step, the electronic door lock obtains the position information and the first public key of the electronic key by reading corresponding electronic key information, the electronic door lock generates a shared secret key through the second private key and the first public key, then encrypts the position information through the shared secret key to form first encrypted position information, and the electronic door lock sends the first encrypted position information and the second public key to the management server.
3. The networked hotel electronic door lock encryption communication key distribution method according to claim 2, wherein: in the second step, the management server obtains the shared secret key through reduction of a second public key and a first private key, then obtains the position information through decryption of the first encrypted position information through the shared secret key, and encrypts the communication secret key corresponding to the position information through the shared secret key to form the encrypted communication secret key and sends the encrypted communication secret key to the electronic door lock.
4. The networked hotel electronic door lock encryption communication key distribution method according to claim 3, wherein: in the third step, the electronic door lock obtains the communication key through the recovery of the shared key and the encrypted communication key, encrypts the position information through the communication key to form the second encrypted position information, and sends the second encrypted position information and the position information to the management server.
5. The networked hotel electronic door lock encryption communication key distribution method according to claim 4, wherein: in the fourth step, the management server decrypts the second encrypted location information through the communication key to obtain location information, compares the location information obtained through decryption with existing location information, if the location information obtained through decryption is consistent with the existing location information, confirms that the encrypted communication key is successfully distributed, and if the location information obtained through decryption is not consistent with the existing location information, repeats the first step to the fourth step.
6. The networked hotel electronic door lock encryption communication key distribution method according to claim 5, wherein: the first private key, the second private key and the communication key are random numbers with fixed length, and the first public key and the second public key are formed by selecting the same prime number and primitive root through a Diffie-Hellman key exchange algorithm.
7. The networked hotel electronic door lock encryption communication key distribution method according to claim 6, wherein: the position information comprises a hotel number, a building number, a floor room number, a floor sub-room number and a current timestamp.
8. The networked hotel electronic door lock encryption communication key distribution method according to claim 7, wherein: in the fourth step, if the timestamp of the third data packet is greater than the timestamp of the second data packet, the key distribution is successful; and if the timestamp of the third data packet is less than the timestamp of the second data packet, redistributing the key.
CN202111445393.3A 2021-11-30 2021-11-30 Method for distributing encryption communication keys of networking hotel electronic door locks Active CN114155632B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111445393.3A CN114155632B (en) 2021-11-30 2021-11-30 Method for distributing encryption communication keys of networking hotel electronic door locks

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111445393.3A CN114155632B (en) 2021-11-30 2021-11-30 Method for distributing encryption communication keys of networking hotel electronic door locks

Publications (2)

Publication Number Publication Date
CN114155632A true CN114155632A (en) 2022-03-08
CN114155632B CN114155632B (en) 2023-10-31

Family

ID=80455037

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111445393.3A Active CN114155632B (en) 2021-11-30 2021-11-30 Method for distributing encryption communication keys of networking hotel electronic door locks

Country Status (1)

Country Link
CN (1) CN114155632B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006040806A1 (en) * 2004-10-08 2006-04-20 Softbankbb Corp. Cryptographic key distribution system
JP2014179683A (en) * 2013-03-13 2014-09-25 Miwa Lock Co Ltd Key distribution system
CN107040369A (en) * 2016-10-26 2017-08-11 阿里巴巴集团控股有限公司 Data transmission method, apparatus and system
CN107317674A (en) * 2016-04-27 2017-11-03 华为技术有限公司 Key distribution, authentication method, apparatus and system
CN107945350A (en) * 2017-12-21 2018-04-20 美的集团股份有限公司 Door lock communication system and method based on safety chip
CN109495274A (en) * 2018-12-25 2019-03-19 成都三零瑞通移动通信有限公司 A kind of decentralization smart lock electron key distribution method and system
CN109672537A (en) * 2019-01-18 2019-04-23 如般量子科技有限公司 Anti- quantum certificate acquisition system and acquisition methods based on public key pond
CN110224816A (en) * 2019-05-15 2019-09-10 如般量子科技有限公司 Anti- quantum calculation application system and short distance energy-saving communication method and computer equipment based on key card and sequence number
US20200202651A1 (en) * 2018-12-19 2020-06-25 Ranjeev K. Singh Blockchain-controlled and location-validated locking systems and methods
CN111815816A (en) * 2020-06-22 2020-10-23 北京智辉空间科技有限责任公司 Electronic lock security system and key distribution method thereof
CN112291190A (en) * 2020-07-28 2021-01-29 国网思极网安科技(北京)有限公司 Identity authentication method, terminal and server

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006040806A1 (en) * 2004-10-08 2006-04-20 Softbankbb Corp. Cryptographic key distribution system
JP2014179683A (en) * 2013-03-13 2014-09-25 Miwa Lock Co Ltd Key distribution system
CN107317674A (en) * 2016-04-27 2017-11-03 华为技术有限公司 Key distribution, authentication method, apparatus and system
CN107040369A (en) * 2016-10-26 2017-08-11 阿里巴巴集团控股有限公司 Data transmission method, apparatus and system
CN111585749A (en) * 2016-10-26 2020-08-25 阿里巴巴集团控股有限公司 Data transmission method, device, system and equipment
CN107945350A (en) * 2017-12-21 2018-04-20 美的集团股份有限公司 Door lock communication system and method based on safety chip
US20200202651A1 (en) * 2018-12-19 2020-06-25 Ranjeev K. Singh Blockchain-controlled and location-validated locking systems and methods
CN109495274A (en) * 2018-12-25 2019-03-19 成都三零瑞通移动通信有限公司 A kind of decentralization smart lock electron key distribution method and system
CN109672537A (en) * 2019-01-18 2019-04-23 如般量子科技有限公司 Anti- quantum certificate acquisition system and acquisition methods based on public key pond
CN110224816A (en) * 2019-05-15 2019-09-10 如般量子科技有限公司 Anti- quantum calculation application system and short distance energy-saving communication method and computer equipment based on key card and sequence number
CN111815816A (en) * 2020-06-22 2020-10-23 北京智辉空间科技有限责任公司 Electronic lock security system and key distribution method thereof
CN112291190A (en) * 2020-07-28 2021-01-29 国网思极网安科技(北京)有限公司 Identity authentication method, terminal and server

Also Published As

Publication number Publication date
CN114155632B (en) 2023-10-31

Similar Documents

Publication Publication Date Title
CN109495274B (en) Decentralized intelligent lock electronic key distribution method and system
CN111464301B (en) Key management method and system
CN109218825B (en) Video encryption system
CN110401818B (en) Safe communication system for power video transmission
CN108683501B (en) Multiple identity authentication system and method with timestamp as random number based on quantum communication network
CN103795533A (en) Id-based encryption and decryption method, and apparatus for executing same
CN102833246A (en) Social video information security method and system
CN101989984A (en) Electronic document safe sharing system and method thereof
CN109543434B (en) Block chain information encryption method, decryption method, storage method and device
CN109151508B (en) Video encryption method
CN103339958A (en) Key transport protocol
CN103414682A (en) Method for cloud storage of data and system
CN104113409A (en) Secret key managing method and system of SIP (session initiation protocol) video monitoring networking system
CN113472793A (en) Personal data protection system based on hardware password equipment
CN101640785B (en) Encrypting/decrypting system and encrypting/decrypting method for interactive network television
CN105262586B (en) The method for distributing key and device of automobile burglar equipment
CN101697511B (en) Method and system for receiving mobile streaming media conditions
US20160148002A1 (en) Key storage apparatus, key storage method and program therefor
CN1329418A (en) Method for authenticating network user identity and method for overcoming user password loophole in Kerberous authentication system
CN100566239C (en) The key transmission method of multi-stage intelligent key apparatus and system
CN114155632B (en) Method for distributing encryption communication keys of networking hotel electronic door locks
CN106341424B (en) Video encryption system based on identity authentication and implementation method
CN111541652B (en) System for improving security of secret information keeping and transmission
CN110047181B (en) Intelligent door lock safety control method based on Zigbee
CN107749795A (en) A kind of vehicle remote control method of the secondary encryption based on rolling code

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant