CN114220201A - Method and system for binding front lock and back lock based on applet code scanning and intelligent lock - Google Patents

Method and system for binding front lock and back lock based on applet code scanning and intelligent lock Download PDF

Info

Publication number
CN114220201A
CN114220201A CN202210058429.0A CN202210058429A CN114220201A CN 114220201 A CN114220201 A CN 114220201A CN 202210058429 A CN202210058429 A CN 202210058429A CN 114220201 A CN114220201 A CN 114220201A
Authority
CN
China
Prior art keywords
lock
front lock
encryption key
mac information
binding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210058429.0A
Other languages
Chinese (zh)
Inventor
毛宇鹏
白刚
易乾坤
易海平
余俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zhixin Wulian Technology Co ltd
Original Assignee
Shenzhen Zhixin Wulian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhixin Wulian Technology Co ltd filed Critical Shenzhen Zhixin Wulian Technology Co ltd
Priority to CN202210058429.0A priority Critical patent/CN114220201A/en
Publication of CN114220201A publication Critical patent/CN114220201A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/71Hardware identity
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00412Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a method for binding front and back locks based on applet code scanning, which comprises the following steps: the small program scans the MAC bar code of the back lock, establishes wireless connection with the back lock, issues a binding instruction to complete binding with the back lock, and then issues an encryption key AESKey2 communicated with the front lock to the back lock; the small program scans the MAC bar code of the front lock, obtains the MAC information of the equipment contained in the bar code, establishes wireless connection with the front lock after verifying the validity of the MAC information with the server, uses a default encryption key AESkey to communicate with the front lock, and informs the front lock of the rear lock MAC information and the encryption key AESkey2 paired and bound with the small program; after the front lock receives the rear lock MAC information and the encryption key AESkey2 which are sent by the small program and need to be bound, the front lock initiates wireless connection to the rear lock; the method can automatically bind the front lock and the rear lock by scanning the bar code of the front lock and the bar code of the rear lock by virtue of a small program, and has the advantages of high reliability, convenience, quickness, better directivity and no pairing disorder.

Description

Method and system for binding front lock and back lock based on applet code scanning and intelligent lock
Technical Field
The invention relates to the technical field of intelligent locks, in particular to a method and a system for binding front and back locks based on applet code scanning and an intelligent lock.
Background
With the increasing maturity of the internet of things technology and the popularization of intelligent door locks, the shapes of the door locks are various, wherein the intelligent door lock with the split design of the front lock and the rear lock is split, has no wired connection and can only transmit data wirelessly, so that the front lock and the rear lock are bound and paired to form a difficult problem.
At present, the solutions in the industry mainly include the following methods:
firstly, the method comprises the following steps: delivery matching and delivery, namely delivering the matched product to the user before delivery; the disadvantages are that: the factory production management and control need to be strictly controlled, the front lock and the rear lock need to be well paired one by one before the factory, and in addition, if the user has the paired after-sale problem, the front lock and the rear lock can only be returned and replaced.
Secondly, the method comprises the following steps: the rear lock enters a pairing mode by pressing certain shortcut keys, then the front lock is electrified or enters the pairing mode by pressing the shortcut keys, and after the front lock searches that the rear lock enters the pairing mode, the binding of the rear lock is initiated; the disadvantages are that: the problem that a plurality of back locks enter a pairing mode cannot be solved, the front lock searches the plurality of back locks to enter the pairing mode, and the front lock does not know which back lock is connected with the front lock;
therefore, a method for binding front and back locks based on small program code scanning, which has good directivity and high reliability, is needed.
Disclosure of Invention
The invention provides a method for binding front and back locks based on applet code scanning, a system for binding front and back locks based on applet code scanning and an intelligent lock for performing front and back lock pairing by applying the pairing method, aiming at the defects in the prior art.
The technical scheme adopted by the invention for solving the technical problems is as follows:
a method for binding front and back locks based on applet code scanning is constructed, wherein the method comprises the following steps:
the first step is as follows: wireless modules are arranged in a front lock and a rear lock of the intelligent door lock, and a set of private safe communication protocol is defined together with the small program;
the second step is that: marking MAC bar codes corresponding to the equipment when or before the front lock and the rear lock leave a factory respectively;
the third step: the small program scans the MAC bar code of the rear lock, obtains the MAC information of the bar code containing equipment, establishes wireless connection with the rear lock after verifying the validity of the MAC information with the server, uses a default encryption key AESkey to communicate with the rear lock, issues a binding instruction, modifies the communication encryption key of the rear lock into AESkey1 after binding with the rear lock, issues an encryption key AESkey2 communicating with the front lock to the rear lock, and reports the MAC information of the rear lock, the AESkey1 and the AESkey2 information to the server;
the fourth step: the small program scans the MAC bar code of the front lock, obtains the MAC information of the equipment contained in the bar code, establishes wireless connection with the front lock after verifying the validity of the MAC information with the server, uses a default encryption key AESkey to communicate with the front lock, and informs the front lock of the rear lock MAC information and the encryption key AESkey2 paired and bound with the small program;
the fifth step: after the front lock receives the rear lock MAC information and the encryption key AESkey2 which are sent by the small program and need to be bound, the front lock initiates wireless connection to the rear lock;
and a sixth step: after the wireless connection is established, the front lock communicates with the rear lock by using an encryption key AESkey2, a binding instruction is initiated, and the MAC information of the front lock is sent to the rear lock;
the seventh step: after the rear lock receives the communication data initiated by the front lock, the data is decrypted by using an encryption key AESkey2, after the data is correctly decrypted, the MAC information of the front lock is recorded, and the MAC information of the rear lock is informed to the front lock;
eighth step: and after the front lock receives the back lock binding response, checking whether the MAC information returned by the back lock is consistent with the MAC information issued by the applet, and if so, finishing the pairing and binding process of the front lock and the back lock.
The invention relates to a method for binding front and back locks based on applet code scanning, wherein in the first step, the data format of a secure communication protocol is defined as follows:
the data includes: the system comprises a packet head, a packet identifier, a packet length, a data area, a validation bit and a packet tail.
The invention relates to a method for binding front and back locks based on small program code scanning, wherein a data area is encrypted data, and encryption and decryption objects are the data area during communication;
the data area length is an integer multiple of 16 bytes and includes an effective data length, a command cluster ID, a sub-command ID, and data content.
The invention relates to a method for binding front and back locks based on applet code scanning, wherein a wireless module is a Bluetooth module.
The method for binding the front lock and the back lock based on the applet code scanning comprises the following steps:
the applet updates the back lock with the new front lock according to the replace front lock instruction.
The invention discloses a method for binding front and back locks based on applet code scanning, wherein the method for replacing a new front lock comprises the following steps:
the applet obtains the MAC information of the post-lock obtained from the server and the encryption key AESkey2 of the communication;
the small program scans the MAC bar code of the new front lock, after the validity is verified, the default encryption key AESkey is used for communicating with the new front lock, and the MAC information of the rear lock bound with the new front lock in a pairing mode and the communication encryption key AESkey2 are informed;
after the new front lock receives the back lock MAC information which is sent by the small program and needs to be bound and the communication encryption key AESkey2, the new front lock initiates wireless connection to the back lock;
after the connection is established, the new front lock communicates with the back lock by using an encryption key AESkey2, a binding instruction is initiated, and MAC information of the new front lock is sent to the back lock;
after the back lock receives the communication data initiated by the new front lock, the data is decrypted by using an encryption key AESkey2, after the data is correctly decrypted, the MAC information of the new front lock bound with the back lock is recorded, and the MAC information of the back lock is informed to the new front lock;
and after the new front lock receives the back lock binding response, checking whether the MAC information returned by the back lock is consistent with the MAC information issued by the applet, and if so, completing the re-pairing binding process of the front lock and the back lock.
A system for binding front and back locks based on applet code scanning is applied to the method for binding front and back locks based on applet code scanning, wherein the system comprises an applet and a server;
the applet is used for scanning the MAC bar code of the rear lock, acquiring the MAC information of equipment contained in the bar code, verifying the validity of the MAC information with the server, establishing wireless connection with the rear lock, communicating with the rear lock by using a default encryption key AESkey, issuing a binding instruction, modifying the communication encryption key of the rear lock into AESkey1 after binding with the rear lock, issuing an encryption key AESkey2 communicated with the front lock to the rear lock, and reporting the MAC information of the rear lock, the AESkey1 and the AESkey2 to the server; scanning the MAC bar code of the front lock, acquiring the MAC information of the equipment contained in the bar code, verifying the legality of the MAC information with a server, establishing wireless connection with the front lock, communicating with the front lock by using a default encryption key AESkey, and informing the front lock of the MAC information of the rear lock and the encryption key AESkey2 which are paired and bound with the applet.
The system for binding the front lock and the back lock based on the applet code scanning is characterized in that the applet is also used for acquiring MAC information of the back lock acquired from the server and an encryption key AESkey2 of communication; the applet scans the MAC barcode of the new front lock, verifies the validity, and communicates with the new front lock using the default encryption key AESkey to inform the new front lock of the MAC information of the rear lock and the communicated encryption key AESkey2 with which the new front lock is paired.
An intelligent lock comprises a front lock and a rear lock, wherein the front lock and the rear lock are bound by the method for binding the front lock and the rear lock based on the small program code scanning.
The invention has the beneficial effects that: the method can automatically bind the front lock and the rear lock by scanning the bar code of the front lock and the bar code of the rear lock by virtue of a small program, and has the advantages of high reliability, convenience, quickness, better directivity and no pairing disorder.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the present invention will be further described with reference to the accompanying drawings and embodiments, wherein the drawings in the following description are only part of the embodiments of the present invention, and for those skilled in the art, other drawings can be obtained without inventive efforts according to the accompanying drawings:
FIG. 1 is a flow chart of a binding method for binding locks before and after applet code scanning;
FIG. 2 is a flow chart of a lock before change method for binding locks before and after applet code scanning according to a preferred embodiment of the present invention;
FIG. 3 is a table of the data format of the method for binding locks before and after applet code scanning in accordance with the preferred embodiment of the present invention;
FIG. 4 is a table of contents of a data format of a method for binding locks before and after applet code scanning according to a preferred embodiment of the present invention;
FIG. 5 is a block diagram of a system for binding locks before and after applet code scanning according to the preferred embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the following will clearly and completely describe the technical solutions in the embodiments of the present invention, and it is obvious that the described embodiments are some embodiments of the present invention, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without inventive step, are within the scope of the present invention.
The method for binding front and back locks based on applet code scanning according to the preferred embodiment of the present invention, as shown in fig. 1 and referring to fig. 2-4, includes the following steps:
s01: wireless modules are arranged in a front lock and a rear lock of the intelligent door lock, and a set of private safe communication protocol is defined together with the small program;
s02: the front lock and the rear lock are respectively marked (in any modes such as posting, marking and the like) with MAC bar codes corresponding to equipment when or before leaving a factory;
s03: the small program scans the MAC bar code of the rear lock, obtains the MAC information of the bar code containing equipment, establishes wireless connection with the rear lock after verifying the validity of the MAC information with the server, uses a default encryption key AESkey to communicate with the rear lock, issues a binding instruction, modifies the communication encryption key of the rear lock into AESkey1 after binding with the rear lock, issues an encryption key AESkey2 communicating with the front lock to the rear lock, and reports the MAC information of the rear lock, the AESkey1 and the AESkey2 information to the server;
s04: the small program scans the MAC bar code of the front lock, obtains the MAC information of the equipment contained in the bar code, establishes wireless connection with the front lock after verifying the validity of the MAC information with the server, uses a default encryption key AESkey to communicate with the front lock, and informs the front lock of the rear lock MAC information and the encryption key AESkey2 paired and bound with the small program;
s05: after the front lock receives the rear lock MAC information and the encryption key AESkey2 which are sent by the small program and need to be bound, the front lock initiates wireless connection to the rear lock;
s06: after the wireless connection is established, the front lock communicates with the rear lock by using an encryption key AESkey2, a binding instruction is initiated, and the MAC information of the front lock is sent to the rear lock;
s07: after the rear lock receives the communication data initiated by the front lock, the data is decrypted by using an encryption key AESkey2, after the data is correctly decrypted, the MAC information of the front lock is recorded, and the MAC information of the rear lock is informed to the front lock;
s08: after the front lock receives the back lock binding response, checking whether the MAC information returned by the back lock is consistent with the MAC information issued by the applet or not, and if so, finishing the pairing and binding process of the front lock and the back lock;
the method can automatically bind the front lock and the rear lock by scanning the bar code of the front lock and the bar code of the rear lock by virtue of a small program, and has the advantages of high reliability, convenience, quickness, better directivity and no pairing disorder.
The applet referred in this application may be a pairing applet carried on a specially-provided pairing device, or may be an APP applet that can be installed on a mobile terminal device such as a mobile phone;
preferably, in the first step, the data format of the secure communication protocol is defined as follows:
the data includes: the method comprises the following steps of (1) packet header, packet identifier, packet length, data area, validation bit and packet tail; the data area is encrypted data, and encryption and decryption objects are the data area during communication; the length of the data area is integral multiple of 16 bytes and comprises effective data length, command cluster ID, sub-command ID and data content;
of course, it is understood that other data formats and encryption forms are possible, and that simple substitution based on such a form is also within the scope of the present application;
preferably, the wireless module is a bluetooth module, and other existing wireless communication modes can be adopted, and simple replacement based on the mode also belongs to the protection scope of the present application.
Preferably, the method for binding front and back locks based on applet code scanning further comprises:
the method for replacing the new front lock by the back lock by the applet according to the command for replacing the front lock comprises the following steps:
s11: the applet obtains the MAC information of the post-lock obtained from the server and the encryption key AESkey2 of the communication;
s12: the small program scans the MAC bar code of the new front lock, after the validity is verified, the default encryption key AESkey is used for communicating with the new front lock, and the MAC information of the rear lock bound with the new front lock in a pairing mode and the communication encryption key AESkey2 are informed;
s13: after the new front lock receives the back lock MAC information which is sent by the small program and needs to be bound and the communication encryption key AESkey2, the new front lock initiates wireless connection to the back lock;
s14: after the connection is established, the new front lock communicates with the back lock by using an encryption key AESkey2, a binding instruction is initiated, and MAC information of the new front lock is sent to the back lock;
s15: after the back lock receives the communication data initiated by the new front lock, the data is decrypted by using an encryption key AESkey2, after the data is correctly decrypted, the MAC information of the new front lock bound with the back lock is recorded, and the MAC information of the back lock is informed to the new front lock;
s16: after the new front lock receives the back lock binding response, checking whether the MAC information returned by the back lock is consistent with the MAC information issued by the applet, and if so, completing the re-pairing binding process of the front lock and the back lock;
through the simple operation of applet, just can be by oneself bind new preceding lock to the back lock, convenient operation is swift, and directive property is good, is difficult for appearing the chaotic condition.
A system for binding front and back locks based on code scanning of an applet is applied to the method for binding front and back locks based on code scanning of the applet, as shown in FIG. 5, and comprises an applet 1 and a server 2;
the small program 1 is used for scanning the MAC bar code of the rear lock, acquiring the MAC information of equipment contained in the bar code, verifying the legality of the MAC information with a server, establishing wireless connection with the rear lock, communicating with the rear lock by using a default encryption key AESkey, issuing a binding instruction, modifying the communication encryption key of the rear lock into AESkey1 after binding with the rear lock, issuing an encryption key AESkey2 communicated with the front lock to the rear lock, and reporting the MAC information of the rear lock, the AESkey1 and the AESkey2 to the server 2; scanning the MAC bar code of the front lock, acquiring the MAC information of the equipment contained in the bar code, establishing wireless connection with the front lock after verifying the validity of the MAC information by the server 2, communicating with the front lock by using a default encryption key AESkey, and informing the front lock of the rear lock MAC information and the encryption key AESkey2 which are paired and bound with the applet 1;
the method can automatically bind the front lock and the rear lock by scanning the bar code of the front lock and the bar code of the rear lock by virtue of a small program, and has the advantages of high reliability, convenience, quickness, better directivity and no pairing disorder.
Preferably, the applet 1 is further configured to obtain MAC information of the post-lock obtained from the server and an encryption key AESkey2 of the communication; the small program scans the MAC bar code of the new front lock, after the validity is verified, the default encryption key AESkey is used for communicating with the new front lock, and the MAC information of the rear lock bound with the new front lock in a pairing mode and the communication encryption key AESkey2 are informed;
the front lock with the new rear lock can be replaced by the front lock more quickly by using the mode, and the front lock is convenient to maintain and operate.
An intelligent lock comprises a front lock and a rear lock, wherein the front lock and the rear lock are bound by the method for binding the front lock and the rear lock based on the small program code scanning.
It will be understood that modifications and variations can be made by persons skilled in the art in light of the above teachings and all such modifications and variations are intended to be included within the scope of the invention as defined in the appended claims.

Claims (9)

1. A method for binding front and back locks based on applet code scanning is characterized by comprising the following steps:
the first step is as follows: wireless modules are arranged in a front lock and a rear lock of the intelligent door lock, and a set of private safe communication protocol is defined together with the small program;
the second step is that: marking MAC bar codes corresponding to the equipment when or before the front lock and the rear lock leave a factory respectively;
the third step: the small program scans the MAC bar code of the rear lock, obtains the MAC information of the bar code containing equipment, establishes wireless connection with the rear lock after verifying the validity of the MAC information with the server, uses a default encryption key AESkey to communicate with the rear lock, issues a binding instruction, modifies the communication encryption key of the rear lock into AESkey1 after binding with the rear lock, issues an encryption key AESkey2 communicating with the front lock to the rear lock, and reports the MAC information of the rear lock, the AESkey1 and the AESkey2 information to the server;
the fourth step: the small program scans the MAC bar code of the front lock, obtains the MAC information of the equipment contained in the bar code, establishes wireless connection with the front lock after verifying the validity of the MAC information with the server, uses a default encryption key AESkey to communicate with the front lock, and informs the front lock of the rear lock MAC information and the encryption key AESkey2 paired and bound with the small program;
the fifth step: after the front lock receives the rear lock MAC information and the encryption key AESkey2 which are sent by the small program and need to be bound, the front lock initiates wireless connection to the rear lock;
and a sixth step: after the wireless connection is established, the front lock communicates with the rear lock by using an encryption key AESkey2, a binding instruction is initiated, and the MAC information of the front lock is sent to the rear lock;
the seventh step: after the rear lock receives the communication data initiated by the front lock, the data is decrypted by using an encryption key AESkey2, after the data is correctly decrypted, the MAC information of the front lock is recorded, and the MAC information of the rear lock is informed to the front lock;
eighth step: and after the front lock receives the back lock binding response, checking whether the MAC information returned by the back lock is consistent with the MAC information issued by the applet, and if so, finishing the pairing and binding process of the front lock and the back lock.
2. The applet code scanning based lock-before-lock binding method according to claim 1, wherein in the first step, the data format of the secure communication protocol is defined as follows:
the data includes: the system comprises a packet head, a packet identifier, a packet length, a data area, a validation bit and a packet tail.
3. The applet code-scanning based lock-before-lock binding method according to claim 2, wherein the data area is encrypted data, and both the encrypted and decrypted objects in communication are the data area;
the data area length is an integer multiple of 16 bytes and includes an effective data length, a command cluster ID, a sub-command ID, and data content.
4. The applet code-scanning based method for binding front and back locks according to claim 1, characterized in that the wireless module is a bluetooth module.
5. The method for binding locks-before-lock based on code scanning of an applet according to any one of claims 1-4, wherein the method for binding locks-before-lock based on code scanning of an applet further comprises:
the applet updates the back lock with the new front lock according to the replace front lock instruction.
6. The applet code scanning based method for binding locks and relocks according to claim 5, characterized in that the method for replacing a new lock comprises the steps of:
the applet obtains the MAC information of the post-lock obtained from the server and the encryption key AESkey2 of the communication;
the small program scans the MAC bar code of the new front lock, after the validity is verified, the default encryption key AESkey is used for communicating with the new front lock, and the MAC information of the rear lock bound with the new front lock in a pairing mode and the communication encryption key AESkey2 are informed;
after the new front lock receives the back lock MAC information which is sent by the small program and needs to be bound and the communication encryption key AESkey2, the new front lock initiates wireless connection to the back lock;
after the connection is established, the new front lock communicates with the back lock by using an encryption key AESkey2, a binding instruction is initiated, and MAC information of the new front lock is sent to the back lock;
after the back lock receives the communication data initiated by the new front lock, the data is decrypted by using an encryption key AESkey2, after the data is correctly decrypted, the MAC information of the new front lock bound with the back lock is recorded, and the MAC information of the back lock is informed to the new front lock;
and after the new front lock receives the back lock binding response, checking whether the MAC information returned by the back lock is consistent with the MAC information issued by the applet, and if so, completing the re-pairing binding process of the front lock and the back lock.
7. A system for binding front and back locks based on applet code scanning is applied to the method for binding front and back locks based on applet code scanning according to any one of claims 1-6, and is characterized by comprising an applet and a server;
the applet is used for scanning the MAC bar code of the rear lock, acquiring the MAC information of equipment contained in the bar code, verifying the validity of the MAC information with the server, establishing wireless connection with the rear lock, communicating with the rear lock by using a default encryption key AESkey, issuing a binding instruction, modifying the communication encryption key of the rear lock into AESkey1 after binding with the rear lock, issuing an encryption key AESkey2 communicated with the front lock to the rear lock, and reporting the MAC information of the rear lock, the AESkey1 and the AESkey2 to the server; scanning the MAC bar code of the front lock, acquiring the MAC information of the equipment contained in the bar code, verifying the legality of the MAC information with a server, establishing wireless connection with the front lock, communicating with the front lock by using a default encryption key AESkey, and informing the front lock of the MAC information of the rear lock and the encryption key AESkey2 which are paired and bound with the applet.
8. The applet code scanning based system for binding lock-back locks according to claim 7, characterized in that the applet is also adapted to obtain the MAC information of the lock-back obtained from the server and the encryption key AESkey2 of the communication; the applet scans the MAC barcode of the new front lock, verifies the validity, and communicates with the new front lock using the default encryption key AESkey to inform the new front lock of the MAC information of the rear lock and the communicated encryption key AESkey2 with which the new front lock is paired.
9. An intelligent lock, characterized by comprising a front lock and a rear lock, wherein the front lock and the rear lock are bound by the method for binding the front lock and the rear lock based on the applet code scanning according to any one of claims 1 to 6.
CN202210058429.0A 2022-01-19 2022-01-19 Method and system for binding front lock and back lock based on applet code scanning and intelligent lock Pending CN114220201A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210058429.0A CN114220201A (en) 2022-01-19 2022-01-19 Method and system for binding front lock and back lock based on applet code scanning and intelligent lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210058429.0A CN114220201A (en) 2022-01-19 2022-01-19 Method and system for binding front lock and back lock based on applet code scanning and intelligent lock

Publications (1)

Publication Number Publication Date
CN114220201A true CN114220201A (en) 2022-03-22

Family

ID=80708448

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210058429.0A Pending CN114220201A (en) 2022-01-19 2022-01-19 Method and system for binding front lock and back lock based on applet code scanning and intelligent lock

Country Status (1)

Country Link
CN (1) CN114220201A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102026198A (en) * 2009-09-16 2011-04-20 中兴通讯股份有限公司 System and method for rapid authentication of Bluetooth equipment
CN106102184A (en) * 2016-07-15 2016-11-09 杭州赫智电子科技有限公司 A kind of for managing the system and method that bluetooth equipment binding connects
CN106331990A (en) * 2016-08-19 2017-01-11 广东美的厨房电器制造有限公司 Bluetooth pairing system, pairing method for Bluetooth devices and intelligent terminal
CN108399687A (en) * 2017-10-21 2018-08-14 广州市沃希信息科技有限公司 It is a kind of that shared umbrella system and method is leased based on Quick Response Code
CN110611905A (en) * 2019-08-09 2019-12-24 华为技术有限公司 Information sharing method, terminal device, storage medium, and computer program product
CN112446991A (en) * 2020-11-16 2021-03-05 珠海格力电器股份有限公司 Control method of main door lock, control method of auxiliary door lock and intelligent door lock

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102026198A (en) * 2009-09-16 2011-04-20 中兴通讯股份有限公司 System and method for rapid authentication of Bluetooth equipment
CN106102184A (en) * 2016-07-15 2016-11-09 杭州赫智电子科技有限公司 A kind of for managing the system and method that bluetooth equipment binding connects
CN106331990A (en) * 2016-08-19 2017-01-11 广东美的厨房电器制造有限公司 Bluetooth pairing system, pairing method for Bluetooth devices and intelligent terminal
CN108399687A (en) * 2017-10-21 2018-08-14 广州市沃希信息科技有限公司 It is a kind of that shared umbrella system and method is leased based on Quick Response Code
CN110611905A (en) * 2019-08-09 2019-12-24 华为技术有限公司 Information sharing method, terminal device, storage medium, and computer program product
CN112446991A (en) * 2020-11-16 2021-03-05 珠海格力电器股份有限公司 Control method of main door lock, control method of auxiliary door lock and intelligent door lock

Similar Documents

Publication Publication Date Title
US10768918B2 (en) Method and device for downloading profile of operator
KR102398276B1 (en) Method and apparatus for downloading and installing a profile
JP5189066B2 (en) User authentication method, authentication system, terminal device and authentication device in terminal device
CN113271579B (en) Bluetooth device control method, client, computer device and readable storage medium
CN104093139B (en) Air card-writing method, server and smart card
US9485648B2 (en) Method for distributing virtual user identification data, method for acquiring virtual user identification data, and device
CN103702389B (en) Communication equipment and its communication means
US20170161721A1 (en) Method and system for opening account based on euicc
CN107547573B (en) authentication method applied to eSIM, RSP terminal and management platform
US20040255243A1 (en) System for creating and editing mark up language forms and documents
KR102657876B1 (en) Apparatus and methods for ssp device and server to negociate digital certificates
US11449319B2 (en) Method and apparatus for downloading bundle to smart secure platform by using activation code
US20220337582A1 (en) Device Engagement Connection System with Verification
US11950320B2 (en) Apparatus and methods for linkage of or profile transfer between devices
CN114598555A (en) Broadcast implementation method and system with switchable different platforms
KR20220100886A (en) A method for authenticating users on a network slice
CN114220201A (en) Method and system for binding front lock and back lock based on applet code scanning and intelligent lock
CN103108316A (en) Authentication method, device and system for aerial card writing
KR20120126468A (en) Method and System for Relaying Authentication Number, Program
CN114513758B (en) Automatic binding front-back locking method and system based on key exchange and intelligent door lock
US20230136288A1 (en) Method and device for online moving of bundles or profiles between devices
US20220385670A1 (en) Method and device for setting state of bundle after transfer of bundle between apparatuses
CN107528739B (en) Terminal monitoring management method and device
CN116916280A (en) Communication method, device and communication system of vehicle-mounted device and mobile phone
KR20210116169A (en) Apparatus and methods for device to device bundle or profile online transfer

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination