CN114155632A - Encryption communication key distribution method for electronic door lock of networked hotel - Google Patents
Encryption communication key distribution method for electronic door lock of networked hotel Download PDFInfo
- Publication number
- CN114155632A CN114155632A CN202111445393.3A CN202111445393A CN114155632A CN 114155632 A CN114155632 A CN 114155632A CN 202111445393 A CN202111445393 A CN 202111445393A CN 114155632 A CN114155632 A CN 114155632A
- Authority
- CN
- China
- Prior art keywords
- key
- position information
- door lock
- electronic door
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000004891 communication Methods 0.000 title claims abstract description 75
- 238000000034 method Methods 0.000 title claims abstract description 28
- 238000011084 recovery Methods 0.000 claims description 3
- 230000009467 reduction Effects 0.000 claims description 3
- 238000013478 data encryption standard Methods 0.000 description 4
- 230000002452 interceptive effect Effects 0.000 description 3
- 238000013475 authorization Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 230000006855 networking Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00857—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
- G07C9/00904—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for hotels, motels, office buildings or the like
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/3013—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the discrete logarithm problem, e.g. ElGamal or Diffie-Hellman systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention relates to the field of hotel informatization management, in particular to a networked hotel electronic door lock encryption communication key distribution method, wherein the adopted system comprises a management server, an electronic door lock and an electronic key, and the method comprises the following steps: the method comprises the following steps: the electronic door lock obtains the position information of the electronic key by reading corresponding electronic key information, encrypts the position information to form first encrypted position information, and sends the first encrypted position information to the management server; step two: the management server encrypts the communication key to form an encrypted communication key, and the encrypted communication key is sent to the electronic door lock; step three: the electronic door lock restores the encrypted communication key, encrypts the restored communication key and the position information to form second encrypted position information, and sends the second encrypted position information and the position information to the management server; step four: the management server compares whether the position information is consistent with the position information restored by the second encrypted position information, and if so, the key distribution is successful.
Description
Technical Field
The invention relates to the field of hotel informatization management, in particular to a method for distributing an encryption communication key of a networked hotel electronic door lock.
Background
The electronic door lock of the hotel guest room adopts a specific electronic storage medium as an electronic key, the electronic key is programmed through a special read-write device according to the dynamic information of the time period of each guest to live in and the room to live in, and the electronic door lock completes unlocking authorization by identifying and comparing the time period of the live in and the room to live in the electronic key and the current time and position information of the door lock.
With the development of the internet of things technology, the networking type electronic door lock is widely adopted in the hotel industry, data interactive communication is carried out between the networking type electronic door lock and a hotel guest room door lock remote management server through the internet, set information issuing, remote control and state reporting of the electronic door lock are achieved, meanwhile, corresponding application software is operated on a smart phone to store electronic key information of guests on the mobile phone, the mobile phone is made to be a corresponding electronic key, the guests use the mobile phone to carry out non-contact identification and interconnection with the existing guest room door lock of the hotel, and unlocking authorization can be completed.
At present, a communication link between an electronic door lock and a hotel guest room door lock remote management server generally adopts a public internet and an internet of things platform to reduce operation cost, interactive data is sensitive data of a system, and in order to ensure the safety of the hotel guest room door lock system, a necessary encryption mode is needed to realize encryption processing on the interactive data.
Disclosure of Invention
The invention provides a method for distributing encryption communication keys of electronic door locks of networked hotels, aiming at solving the defects and shortcomings processed by the prior art.
In order to achieve the above object, the technical solution adopted by the present invention is a method for distributing encrypted communication keys for electronic door locks of networked hotels, the adopted system comprises a management server, an electronic door lock and an electronic key, wherein the management server is internally provided with a first public key, a first private key and a communication key corresponding to the electronic door lock, the management server writes position information and the first public key of a designated electronic door lock into the corresponding electronic key, and the electronic door lock is provided with a second public key and a second private key, the method comprises the following steps:
the method comprises the following steps: the electronic door lock obtains the position information of the electronic key by reading corresponding electronic key information, encrypts the position information to form first encrypted position information, and sends a first data packet containing the first encrypted position information to the management server;
step two: the management server encrypts the communication key to form an encrypted communication key and sends a second data packet containing the encrypted communication key to the electronic door lock;
step three: the electronic door lock receives the second data packet, restores the encrypted communication key, encrypts the restored communication key and the position information to form second encrypted position information, and sends a third data packet containing the second encrypted position information and the position information to the management server;
step four: and the management server receives the third data packet, compares whether the position information is consistent with the position information restored by the second encrypted position information, and if so, successfully distributes the key.
In the first step, the electronic door lock obtains the position information and the first public key of the electronic key by reading corresponding electronic key information, the electronic door lock generates a shared secret key through the second private key and the first public key, then encrypts the position information through the shared secret key to form first encrypted position information, and the electronic door lock sends the first encrypted position information and the second public key to the management server.
In the second step, the management server obtains the shared secret key through reduction of a second public key and a first private key, then obtains the position information through decryption of the first encrypted position information through the shared secret key, and encrypts the communication secret key corresponding to the position information through the shared secret key to form the encrypted communication secret key and sends the encrypted communication secret key to the electronic door lock.
In the third step, the electronic door lock obtains the communication key through the recovery of the shared key and the encrypted communication key, encrypts the position information through the communication key to form the second encrypted position information, and sends the second encrypted position information and the position information to the management server.
In the fourth step, the management server decrypts the second encrypted location information through the communication key to obtain location information, compares the location information obtained through decryption with existing location information, if the location information obtained through decryption is consistent with the existing location information, confirms that the encrypted communication key is successfully distributed, and if the location information obtained through decryption is not consistent with the existing location information, repeats the first step to the fourth step.
The first private key, the second private key and the communication key are random numbers with fixed length, and the first public key and the second public key are formed by selecting the same prime number and primitive root through a Diffie-Hellman key exchange algorithm.
The position information comprises a hotel number, a building number, a floor room number, a floor sub-room number and a current timestamp.
In the fourth step, if the timestamp of the third data packet is greater than the timestamp of the second data packet, the key distribution is successful; and if the timestamp of the third data packet is less than the timestamp of the second data packet, redistributing the key.
The invention has the beneficial effects that:
the invention provides a method for distributing an encryption communication key of a networked hotel electronic door lock, which solves the technical problem of data encryption communication key distribution between the hotel electronic door lock and a hotel guest room door lock remote management server, and meanwhile, the method can be compatible with the current popular hotel electronic door lock installation and deployment process, and realizes efficient and convenient installation and deployment.
Drawings
Fig. 1 is a flowchart of an encryption communication key distribution method for an electronic door lock of a networked hotel according to the present invention.
Detailed Description
The invention will be described in further detail with reference to the accompanying drawings, which are simplified schematic drawings and only schematically illustrate the basic structure of the invention, and the direction of the embodiment is based on the direction of fig. 1.
As shown in fig. 1, a method for distributing encrypted communication keys for electronic door locks of networked hotels adopts a system including a management server, an electronic door lock, and an electronic key, wherein the management server is provided with a first public key, a first private key, and a communication key corresponding to the electronic door lock, the management server writes position information and the first public key of a designated electronic door lock into the corresponding electronic key, and the electronic door lock is provided with a second public key and a second private key, and the method includes the following steps:
the method comprises the following steps: the electronic door lock obtains the position information of the electronic key by reading corresponding electronic key information, encrypts the position information to form first encrypted position information, and sends a first data packet containing the first encrypted position information to the management server;
step two: the management server encrypts the communication key to form an encrypted communication key and sends a second data packet containing the encrypted communication key to the electronic door lock;
step three: the electronic door lock receives the second data packet, restores the encrypted communication key, encrypts the restored communication key and the position information to form second encrypted position information, and sends a third data packet containing the second encrypted position information and the position information to the management server;
step four: and the management server receives the third data packet, compares whether the position information is consistent with the position information restored by the second encrypted position information, and if so, successfully distributes the key.
The second public key and the second private key of the electronic door lock are fixedly stored in the electronic door lock before the electronic door lock leaves a factory. And a first public key, a first private key and a communication key corresponding to the electronic door lock in the management server are generated and stored in a database in the management server when software is installed and initialized. The management server programs the specific electronic key through the special read-write equipment and writes the position information of the specified door lock and the first public key into the specific electronic key.
In the first step, the electronic door lock obtains the position information and the first public key of the electronic key by reading corresponding electronic key information, the electronic door lock generates a shared key through a second private key and the first public key, the position information is encrypted through the shared key to form first encrypted position information, and the electronic door lock sends the first encrypted position information and the second public key to the management server.
In the second step, the management server obtains a shared secret key through the reduction of the second public key and the first private key, then obtains position information through the decryption of the first encrypted position information through the shared secret key, encrypts a communication secret key corresponding to the position information through the shared secret key to form an encrypted communication secret key, and sends the encrypted communication secret key to the electronic door lock.
After the management server decrypts and restores the position information, the management server compares the position information and confirms the validity of the position information, and therefore replay attack of third party acting as a middle person can be effectively prevented. Because the position information is generally continuous coded data, if a replay attack is implemented by a third party man in the middle (namely, the man in the middle intercepts the second public key sent by the electronic door lock and replaces the second public key with the third party public key, a correct shared secret key is necessarily modified), the position information decrypted by the management server is necessarily illegal data.
And in the third step, the electronic door lock obtains the communication key through the recovery of the shared key and the encrypted communication key, the electronic door lock encrypts the position information through the communication key to form second encrypted position information, and the electronic door lock sends the second encrypted position information and the position information to the management server.
And step four, the management server decrypts the second encrypted position information through the communication key to obtain the position information, compares the position information obtained by decryption with the existing position information, if the position information is consistent with the existing position information, confirms that the encrypted communication key is successfully distributed, and if the position information is not consistent with the existing position information, repeats the steps from the first step to the fourth step.
The first private key, the second private key and the communication key are random numbers with fixed length, and the first public key and the second public key are formed by selecting the same prime number and primitive root through a Diffie-Hellman key exchange algorithm. The fixed length random number may be 16 bytes or 32 bytes.
deffe-Hellman (DH) key exchange is one of the earliest key exchange algorithms that enable two communicating parties to exchange keys securely in an unsecured channel for use in encrypting subsequent communication messages. Whitfield Diffie and Martin Hellman, 1976, propose the algorithm, which is then applied to the security field, such as TLS (transport Layer Security) of the Https protocol and IKE (Internet Key exchange) of the IPsec protocol, both of which use the DH algorithm as a Key exchange algorithm.
The position information comprises a hotel number, a building number, a floor room number, a floor sub-room number and a current timestamp.
In the fourth step, if the timestamp of the third data packet is greater than the timestamp of the second data packet, the key distribution is successful; the time stamp of the third data packet is less than the time stamp of the second data packet, the key is redistributed.
The electronic door lock and the management server adopt an AES128 symmetric encryption algorithm to encrypt a plaintext by using a communication key, the plaintext comprises a current time stamp, the management server side verifies that the time stamp of the third data packet is more than the time stamp of the second data packet to be valid, otherwise, a new communication key is regenerated, the door lock is requested to repeatedly start the first step, and new communication key distribution is restarted.
The time stamp is data generated by using a digital signature technology, and a signed object comprises original file information, signature parameters, signature time and other information. The main purpose of the time stamp is to authenticate the time of data generation by a certain technical means, so as to verify whether the data is falsified after being generated.
Looking at the development of symmetric ciphers, the DES data encryption standard algorithm has not been adapted to the requirements of data encryption security nowadays, so the IST has collected new data encryption standards in 1997. Upon tumidinodan selection, the Rijndael algorithm filed by Joan Daenan and Vincent Rijner, belgium was proposed as the final algorithm of AES. As a new generation of data encryption standard, AES has converged advantages of strong security, high performance, high efficiency, easy use, flexibility and the like. AES is designed with three key lengths of 128, 192, 256 bits. The method of the invention uses 128 bits.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.
Claims (8)
1. A method for distributing encryption communication keys of electronic door locks of networked hotels is characterized by comprising the following steps: the adopted system comprises a management server, an electronic door lock and an electronic key, wherein a first public key, a first private key and a communication key which correspond to the electronic door lock are arranged in the management server, the management server writes the position information and the first public key of the appointed electronic door lock into the corresponding electronic key, and the electronic door lock is provided with a second public key and a second private key, and the method comprises the following steps:
the method comprises the following steps: the electronic door lock obtains the position information of the electronic key by reading corresponding electronic key information, encrypts the position information to form first encrypted position information, and sends a first data packet containing the first encrypted position information to the management server;
step two: the management server encrypts the communication key to form an encrypted communication key and sends a second data packet containing the encrypted communication key to the electronic door lock;
step three: the electronic door lock receives the second data packet, restores the encrypted communication key, encrypts the restored communication key and the position information to form second encrypted position information, and sends a third data packet containing the second encrypted position information and the position information to the management server;
step four: and the management server receives the third data packet, compares whether the position information is consistent with the position information restored by the second encrypted position information, and if so, successfully distributes the key.
2. The networked hotel electronic door lock encryption communication key distribution method according to claim 1, wherein: in the first step, the electronic door lock obtains the position information and the first public key of the electronic key by reading corresponding electronic key information, the electronic door lock generates a shared secret key through the second private key and the first public key, then encrypts the position information through the shared secret key to form first encrypted position information, and the electronic door lock sends the first encrypted position information and the second public key to the management server.
3. The networked hotel electronic door lock encryption communication key distribution method according to claim 2, wherein: in the second step, the management server obtains the shared secret key through reduction of a second public key and a first private key, then obtains the position information through decryption of the first encrypted position information through the shared secret key, and encrypts the communication secret key corresponding to the position information through the shared secret key to form the encrypted communication secret key and sends the encrypted communication secret key to the electronic door lock.
4. The networked hotel electronic door lock encryption communication key distribution method according to claim 3, wherein: in the third step, the electronic door lock obtains the communication key through the recovery of the shared key and the encrypted communication key, encrypts the position information through the communication key to form the second encrypted position information, and sends the second encrypted position information and the position information to the management server.
5. The networked hotel electronic door lock encryption communication key distribution method according to claim 4, wherein: in the fourth step, the management server decrypts the second encrypted location information through the communication key to obtain location information, compares the location information obtained through decryption with existing location information, if the location information obtained through decryption is consistent with the existing location information, confirms that the encrypted communication key is successfully distributed, and if the location information obtained through decryption is not consistent with the existing location information, repeats the first step to the fourth step.
6. The networked hotel electronic door lock encryption communication key distribution method according to claim 5, wherein: the first private key, the second private key and the communication key are random numbers with fixed length, and the first public key and the second public key are formed by selecting the same prime number and primitive root through a Diffie-Hellman key exchange algorithm.
7. The networked hotel electronic door lock encryption communication key distribution method according to claim 6, wherein: the position information comprises a hotel number, a building number, a floor room number, a floor sub-room number and a current timestamp.
8. The networked hotel electronic door lock encryption communication key distribution method according to claim 7, wherein: in the fourth step, if the timestamp of the third data packet is greater than the timestamp of the second data packet, the key distribution is successful; and if the timestamp of the third data packet is less than the timestamp of the second data packet, redistributing the key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111445393.3A CN114155632B (en) | 2021-11-30 | 2021-11-30 | Method for distributing encryption communication keys of networking hotel electronic door locks |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111445393.3A CN114155632B (en) | 2021-11-30 | 2021-11-30 | Method for distributing encryption communication keys of networking hotel electronic door locks |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114155632A true CN114155632A (en) | 2022-03-08 |
CN114155632B CN114155632B (en) | 2023-10-31 |
Family
ID=80455037
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111445393.3A Active CN114155632B (en) | 2021-11-30 | 2021-11-30 | Method for distributing encryption communication keys of networking hotel electronic door locks |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114155632B (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006040806A1 (en) * | 2004-10-08 | 2006-04-20 | Softbankbb Corp. | Cryptographic key distribution system |
JP2014179683A (en) * | 2013-03-13 | 2014-09-25 | Miwa Lock Co Ltd | Key distribution system |
CN107040369A (en) * | 2016-10-26 | 2017-08-11 | 阿里巴巴集团控股有限公司 | Data transmission method, apparatus and system |
CN107317674A (en) * | 2016-04-27 | 2017-11-03 | 华为技术有限公司 | Key distribution, authentication method, apparatus and system |
CN107945350A (en) * | 2017-12-21 | 2018-04-20 | 美的集团股份有限公司 | Door lock communication system and method based on safety chip |
CN109495274A (en) * | 2018-12-25 | 2019-03-19 | 成都三零瑞通移动通信有限公司 | A kind of decentralization smart lock electron key distribution method and system |
CN109672537A (en) * | 2019-01-18 | 2019-04-23 | 如般量子科技有限公司 | Anti- quantum certificate acquisition system and acquisition methods based on public key pond |
CN110224816A (en) * | 2019-05-15 | 2019-09-10 | 如般量子科技有限公司 | Anti- quantum calculation application system and short distance energy-saving communication method and computer equipment based on key card and sequence number |
US20200202651A1 (en) * | 2018-12-19 | 2020-06-25 | Ranjeev K. Singh | Blockchain-controlled and location-validated locking systems and methods |
CN111815816A (en) * | 2020-06-22 | 2020-10-23 | 北京智辉空间科技有限责任公司 | Electronic lock security system and key distribution method thereof |
CN112291190A (en) * | 2020-07-28 | 2021-01-29 | 国网思极网安科技(北京)有限公司 | Identity authentication method, terminal and server |
-
2021
- 2021-11-30 CN CN202111445393.3A patent/CN114155632B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006040806A1 (en) * | 2004-10-08 | 2006-04-20 | Softbankbb Corp. | Cryptographic key distribution system |
JP2014179683A (en) * | 2013-03-13 | 2014-09-25 | Miwa Lock Co Ltd | Key distribution system |
CN107317674A (en) * | 2016-04-27 | 2017-11-03 | 华为技术有限公司 | Key distribution, authentication method, apparatus and system |
CN107040369A (en) * | 2016-10-26 | 2017-08-11 | 阿里巴巴集团控股有限公司 | Data transmission method, apparatus and system |
CN111585749A (en) * | 2016-10-26 | 2020-08-25 | 阿里巴巴集团控股有限公司 | Data transmission method, device, system and equipment |
CN107945350A (en) * | 2017-12-21 | 2018-04-20 | 美的集团股份有限公司 | Door lock communication system and method based on safety chip |
US20200202651A1 (en) * | 2018-12-19 | 2020-06-25 | Ranjeev K. Singh | Blockchain-controlled and location-validated locking systems and methods |
CN109495274A (en) * | 2018-12-25 | 2019-03-19 | 成都三零瑞通移动通信有限公司 | A kind of decentralization smart lock electron key distribution method and system |
CN109672537A (en) * | 2019-01-18 | 2019-04-23 | 如般量子科技有限公司 | Anti- quantum certificate acquisition system and acquisition methods based on public key pond |
CN110224816A (en) * | 2019-05-15 | 2019-09-10 | 如般量子科技有限公司 | Anti- quantum calculation application system and short distance energy-saving communication method and computer equipment based on key card and sequence number |
CN111815816A (en) * | 2020-06-22 | 2020-10-23 | 北京智辉空间科技有限责任公司 | Electronic lock security system and key distribution method thereof |
CN112291190A (en) * | 2020-07-28 | 2021-01-29 | 国网思极网安科技(北京)有限公司 | Identity authentication method, terminal and server |
Also Published As
Publication number | Publication date |
---|---|
CN114155632B (en) | 2023-10-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109495274B (en) | Decentralized intelligent lock electronic key distribution method and system | |
CN111464301B (en) | Key management method and system | |
CN109218825B (en) | Video encryption system | |
CN110401818B (en) | Safe communication system for power video transmission | |
CN108683501B (en) | Multiple identity authentication system and method with timestamp as random number based on quantum communication network | |
CN103795533A (en) | Id-based encryption and decryption method, and apparatus for executing same | |
CN102833246A (en) | Social video information security method and system | |
CN101989984A (en) | Electronic document safe sharing system and method thereof | |
CN109543434B (en) | Block chain information encryption method, decryption method, storage method and device | |
CN109151508B (en) | Video encryption method | |
CN103339958A (en) | Key transport protocol | |
CN103414682A (en) | Method for cloud storage of data and system | |
CN104113409A (en) | Secret key managing method and system of SIP (session initiation protocol) video monitoring networking system | |
CN113472793A (en) | Personal data protection system based on hardware password equipment | |
CN101640785B (en) | Encrypting/decrypting system and encrypting/decrypting method for interactive network television | |
CN105262586B (en) | The method for distributing key and device of automobile burglar equipment | |
CN101697511B (en) | Method and system for receiving mobile streaming media conditions | |
US20160148002A1 (en) | Key storage apparatus, key storage method and program therefor | |
CN1329418A (en) | Method for authenticating network user identity and method for overcoming user password loophole in Kerberous authentication system | |
CN100566239C (en) | The key transmission method of multi-stage intelligent key apparatus and system | |
CN114155632B (en) | Method for distributing encryption communication keys of networking hotel electronic door locks | |
CN106341424B (en) | Video encryption system based on identity authentication and implementation method | |
CN111541652B (en) | System for improving security of secret information keeping and transmission | |
CN110047181B (en) | Intelligent door lock safety control method based on Zigbee | |
CN107749795A (en) | A kind of vehicle remote control method of the secondary encryption based on rolling code |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |