CN114360100A - Control method, device, system and medium for intelligent door lock - Google Patents

Control method, device, system and medium for intelligent door lock Download PDF

Info

Publication number
CN114360100A
CN114360100A CN202011034310.7A CN202011034310A CN114360100A CN 114360100 A CN114360100 A CN 114360100A CN 202011034310 A CN202011034310 A CN 202011034310A CN 114360100 A CN114360100 A CN 114360100A
Authority
CN
China
Prior art keywords
data
door lock
intelligent door
secret key
electronic tag
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011034310.7A
Other languages
Chinese (zh)
Inventor
李振刚
黄臣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BYD Semiconductor Co Ltd
Original Assignee
BYD Semiconductor Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BYD Semiconductor Co Ltd filed Critical BYD Semiconductor Co Ltd
Priority to CN202011034310.7A priority Critical patent/CN114360100A/en
Publication of CN114360100A publication Critical patent/CN114360100A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

The application discloses a control method, a device, a system and a medium for an intelligent door lock, wherein the method comprises the following steps: when the intelligent door lock is in a registration mode, the intelligent door lock acquires the detected user identity of the electronic tag; the intelligent door lock calculates a first secret key and first data based on the random registration data and the user identity; the intelligent door lock writes the first secret key and the first data into the electronic tag. According to the technical scheme, the first secret key and the first data are written into the electronic tag through the intelligent door lock in the registration process, the secret key does not need to be appointed in advance, the first secret key and the first data are calculated by the intelligent door lock according to the random registration data and the user identity, and the secret key is higher in safety.

Description

Control method, device, system and medium for intelligent door lock
Technical Field
The invention relates to the technical field of intelligent door lock control, in particular to a control method, a device, a system and a medium of an intelligent door lock.
Background
The internal data of the electronic tag comprises a preset user identity, the preset user identity is adopted in the simple electronic tag registration process, but the user identity is transmitted in a clear text mode, so that the user identity is easily copied by others, and the safety is not high.
When other users copy the user identification stored in the electronic tag, the intelligent door lock can be unlocked by using the copied user identification. In order to improve the security of unlocking the smart door lock, a secret key of the smart door lock can be appointed on the electronic tag, but the secret key can only be applied to part of the smart door lock.
The method has the disadvantages that firstly, the secret key of the intelligent door lock is appointed in advance, the initial secret key is the same, and the initial secret key stored in the electronic tag is set to be the same by a manufacturer for simplifying the operation, namely, the initial secret keys of a series of products of the same brand and even the intelligent door lock of all the products are the same, and once the initial secret keys are cracked or the internal personnel are leaked, the safety is poor. And secondly, the intelligent door lock can be unlocked only by carrying the electronic tag.
Disclosure of Invention
In view of the above-mentioned drawbacks and deficiencies of the prior art, it is desirable to provide a method, an apparatus, a system and a medium for controlling an intelligent door lock.
In a first aspect, the present invention provides a method for controlling an intelligent door lock, the method comprising: when the intelligent door lock is in a registration mode, the intelligent door lock acquires the detected user identity of the electronic tag; the intelligent door lock calculates a first secret key and first data based on the random registration data and the user identity; and the intelligent door lock writes the first secret key and the first data into the electronic tag.
In a second aspect, the present invention provides a control device for an intelligent door lock, the device comprising: the acquisition module is configured to acquire the user identity of the detected electronic tag when the intelligent door lock is in a registration mode; a calculation module configured to calculate a first key and first data based on the registered random data and the user identity; a writing module configured to write the first key and the first data into the electronic tag.
In a third aspect, the present invention further provides a control system for an intelligent door lock, including the control device for an intelligent door lock described above and at least one electronic tag, where the electronic tag stores a first key and first data written by the control device for the intelligent door lock.
In a fourth aspect, the present invention also provides a computer-readable storage medium having stored thereon a computer program for implementing the method described in the first aspect.
Compared with the prior art, the invention has the beneficial effects that:
the invention provides a control method, a device, a system and a medium of an intelligent door lock, wherein the method comprises the following steps: when the intelligent door lock is in a registration mode, the intelligent door lock acquires the detected user identity of the electronic tag; the intelligent door lock calculates a first secret key and first data based on the random registration data and the user identity; the intelligent door lock writes the first secret key and the first data into the electronic tag. According to the technical scheme, the first secret key and the first data are written into the electronic tag through the intelligent door lock in the registration process, the secret key does not need to be agreed in advance, the electronic tag does not need to be additionally configured, and the application range of the electronic tag is wider. In addition, the first secret key and the first data are calculated by the intelligent door lock according to the random registration data and the user identity, and the first secret key and the first data in each electronic tag are different, so that the safety is higher.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
fig. 1 is a schematic structural diagram illustrating an application scenario according to an embodiment of the present application;
fig. 2 shows an exemplary structural block diagram of an intelligent door lock and an intelligent terminal according to an embodiment of the present application;
fig. 3 is a flowchart illustrating a control method of an intelligent door lock according to an embodiment of the present application;
fig. 4 is a flowchart illustrating a control method of another intelligent door lock according to an embodiment of the present application;
fig. 5 shows a flowchart of the intelligent door lock according to the embodiment of the present application when in the registration mode;
fig. 6 shows a flowchart of the intelligent door lock according to the embodiment of the present application when in the normal standby mode;
fig. 7 is a block diagram showing a configuration of a control device of an intelligent door lock according to an embodiment of the present application;
fig. 8 shows a schematic structural diagram of an intelligent door lock according to an embodiment of the present application.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Referring to fig. 1, fig. 1 shows a schematic structural diagram of an application scenario related to the present application. As shown in fig. 1, the intelligent terminal and the intelligent door lock perform information interaction in a short-distance wireless communication manner, and transmit an unlocking signal to control the intelligent door lock to be unlocked, wherein the intelligent terminal and the intelligent door lock further include respective communication modules (not shown in the figure), for example, the communication modules transmit the unlocking signal. The smart terminal may be, for example, a mobile phone, a wearable electronic device, such as an electronic bracelet, a smart watch, or other electronic devices with a short-range wireless communication function, such as a Radio Frequency Identification (RFID) card. Near Field Communication, such as Near Field Communication (NFC).
Fig. 2 is an exemplary structural block diagram of the intelligent door lock and the intelligent terminal. Taking the NFC communication method as an example, the smart door lock 1 may include: NFC signal identification module 11, processing module 12 including singlechip, storage module 13, electromagnetic lock 14. The smart terminal 2 has an NFC module 21.
In the communication process, the NFC module 21 is queried through the NFC signal identification module 11, and the NFC module 21 replies corresponding data to the NFC signal identification module 11.
The electromagnetic lock 14 of the intelligent door lock 1 includes a relay module 141 and an electromagnet module 142. The relay module 141 controls the electromagnet module 142 to unlock under the action of the control signal output by the processing module 12.
The NFC signal recognition module 11 is configured to receive an NFC signal sent by the NFC module 21 of the smart terminal, and transmit the NFC signal to the processing module 12.
The processing module 12 is configured to process the identification result output by the NFC signal identification module 11, determine whether the identification result is correct, and send a control signal to the relay module 141 when the identification result is correct.
The storage module 13 is configured to store the key and data related to the key. It may be a key library or a list of keys.
In order to realize the registration of different users, a user registration database can be stored in the storage module. The registration of the user and the deletion of the old user are realized by adding and deleting operations to the user registration database.
The NFC module 21 is configured to send a wireless radio frequency signal to the NFC signal identification module 11, where the wireless radio frequency signal includes a user identification of NFC, and the user identification is used as registered user data.
And the processing module 12 is configured to control the NFC signal identification module 11 to periodically detect a radio frequency signal and convert the radio frequency signal into a digital signal to be stored in the storage module 13 in the registration mode. The user program may be configured in the processing module 12 of the intelligent door lock in advance, and the operation mode of the intelligent door lock, such as the registration mode, the normal standby mode, or the like, may be controlled according to the operation of the intelligent door lock.
When the intelligent door lock is in the normal standby mode, the NFC module 21 is close to the NFC signal identification module 11 to send a wireless radio frequency signal to the NFC signal identification module 11. The data signal identified by the NFC signal identification module 11 is compared with the data signal in the storage module through the processing module 12, and when it is determined that the received data signal is the same as the stored data signal, the processing module 12 sends a control signal to the relay module 141, and the relay module 141 controls the electromagnet module 142 to open the intelligent door lock.
Optionally, an NFC activation instruction is configured in the smart terminal, and the NFC activation instruction activates the built-in NFC module of the mobile phone to send the radio frequency signal. The mobile phone generates the NFC activation instruction through the touch key by configuring the key corresponding to the NFC activation instruction, so that the operation of opening a mobile phone interface can be omitted, the unlocking time is saved, and the operation efficiency is improved.
Referring to fig. 3, fig. 3 illustrates a control method of an intelligent door lock provided by the present application. As shown in fig. 3, the method may include:
step 310, when the intelligent door lock is in a registration mode, the intelligent door lock acquires the detected user identity of the electronic tag;
step 320, calculating a first secret key and first data by the intelligent door lock based on the random registration data and the user identity;
step 330, the smart door lock writes the first key and the first data into the electronic tag.
In this embodiment, the electronic tag in the above step may be an NFC module built in the smart terminal to generate an "analog Radio Frequency Identification card (RFID). Other forms of RFID cards may also be employed.
The User id may be a User Identification (UID) of the electronic tag.
The registration random data refers to data extracted at the time of registration. For example, the value may be a millisecond of the registration time, the temperature or humidity of the current environment at the time of registration, or a random number generation algorithm or a random number sequence, which is not limited herein.
In order to ensure that the calculated first key and the first data are random and unpredictable in advance, the security of generating the key is enhanced by introducing the registration random data. Even if the interpreter knows the user identity UID and the calculation formula, the registered random data during registration cannot be decrypted, and the security is very high.
The intelligent door lock calculates a first secret key and first data based on the random registration data and the user identity, then writes the first secret key and the first data into the electronic tag, so that the first secret key and the first data do not need to be agreed in advance, the user identity used for registration is sent to the intelligent door lock through the intelligent terminal with the electronic tag, the intelligent door lock generates the random registration data based on the user identity, and the intelligent door lock can generate the first secret key and the first data used for unlocking based on the user identity and the random registration data of the electronic tag. When the user registers by using the simulated RFID card, the intelligent door lock writes a first secret key and first data into the simulated RFID card. Therefore, keys and data do not need to be appointed in advance, and the application range is wider. The random registration data are generated by the intelligent door lock, the intelligent door lock does not need to send the random registration data out, and the random registration data cannot be intercepted and captured in the transmission process.
When the smart door lock writes the first key and the first data into the electronic tag, the written data may not be complete or may be incorrect due to interference factors existing in the data writing process. The application may also be identified by further checking the written first key and the first data.
On the basis of fig. 3, the present application further provides a control method of the intelligent door lock. As shown in fig. 4, the method includes:
step 410, when the intelligent door lock is in a registration mode, the intelligent door lock acquires the detected user identity of the electronic tag;
step 420, calculating a first secret key and first data by the intelligent door lock based on the random registration data and the user identity;
step 430, the intelligent door lock writes the first secret key and the first data into the electronic tag;
step 440, the smart door lock verifies the first secret key and the first data;
step 450, when the first key and the first data are verified correctly, storing the user identity and the random registration data, which indicates that the user identity is successfully registered.
Wherein the description of steps 410-430 is the same as that of steps 310-330 in FIG. 3. The method further improves the accuracy of writing the first key and the first data through verification.
The verifying the first key and the first data by the smart door lock may include: the intelligent door lock reads the first secret key and the first data from the electronic tag; the intelligent door lock determines whether the read first secret key and the first data are the same as a first secret key and first data which are obtained by calculation based on the user identity and the registration random data and correspond to the electronic tag; the intelligent door lock determines that the read first secret key and the first data are the same as the first secret key and the first data which are obtained through calculation based on the user identity and correspond to the electronic tag, and the verification is correct; and when the intelligent door lock determines that the read first secret key and the first data are different from the first secret key and the first data which are calculated based on the user identity and correspond to the electronic tag, the verification fails.
And when the first secret key and the first data are verified correctly, the intelligent door lock stores the user identity and the random registration data, and the user identity is identified and registered successfully. When the first secret key and the first data are failed to be verified, the intelligent door lock prompts to re-enter the registration mode and re-acquire new random registration data.
The steps 410 to 450 are repeated until the first key and the first data are successfully verified. When the verification is correct, only the user identity and the random data need to be stored, and the first secret key and the first data are calculated in real time and do not need to be stored, so that the storage capacity is less, and the system resources are saved.
After the registration is completed, the electronic tag which completes the registration is close to the intelligent door lock to control the opening of the intelligent door lock.
When the intelligent door lock is in a normal standby mode, the intelligent door lock can detect a target electronic tag close to the intelligent door lock, and then the user identity of the target electronic tag is obtained.
The intelligent door lock determines whether the user identity of the target electronic tag is stored. For example, after the intelligent door lock reads the user identity, a key data list pre-established by the user is inquired through the user identity corresponding to the target electronic tag. If the user identity identification of the target electronic tag is found in the key data list or the user identity identification of the target electronic tag is determined to exist in a comparison mode, the fact that the user identity identification of the target electronic tag is stored in the intelligent door lock is indicated.
And when the intelligent door lock determines that the user identity of the target electronic tag is stored, reading the registration random data corresponding to the user identity according to the user identity of the target electronic tag. It is assumed that registered random data is stored in the key data list corresponding to each registered user id. One or more pieces of registered random number data may be used. For example UID1, the registered random data is 20200821142030; UID2, first registered random data 20200822151520 and second registered random data 23. Wherein the first registration random data is a registration time value. The second registered random data is temperature data of the day. And respectively acquiring first registration random data and second registration random data through a clock system and a temperature detection system of the intelligent door lock.
And the intelligent door lock calculates a second key and second data corresponding to the user identity of the target electronic tag according to the user identity of the target electronic tag and the corresponding random registration data.
The intelligent door lock reads a first secret key and first data stored in a target electronic tag; the intelligent door lock determines whether the first key and the first data are the same as the second key and the second data, and enters an unlocking mode from a normal standby mode when the first key and the first data are the same as the second key and the second data.
When the first secret key and the first data of the intelligent door lock are different from the second secret key and the second data of the intelligent door lock, the intelligent door lock keeps a normal standby mode, and unlocking failure is prompted.
For example, the intelligent door lock checks by reading a secret key and data stored in the target electronic device, if the checking is successful, the intelligent door lock is opened, and if the checking is failed, the intelligent door lock prompts the user that the operation is failed in a voice mode, a subtitle mode, a flashing warning lamp mode or the like, so that the experience degree of the user using the intelligent door lock is improved.
Specifically, the determining, by the smart door lock, whether the first secret key and the first data are the same as the second secret key and the second data includes:
the intelligent door lock compares the second secret key pair with a first secret key stored in the target electronic tag; if the second secret key is the same as the first secret key, the intelligent door lock continues to read the first data stored in the target electronic tag, and the intelligent door lock compares whether the second data is the same as the first data stored in the target electronic tag or not; if the first data is identical to the second data, the first key and the first data are considered to be consistent with the second key and the second data.
If the second key is different from the first key, the first key and the first data are considered to be different from the second key and the second data.
After the second secret key is compared with the first secret key, the first data and the second data are compared, if the first data are different from the second data, the first secret key, the first data, the second secret key and the second data are considered to be different, and when the first secret key, the first data, the second secret key and the second data are different, the intelligent door lock keeps a normal standby mode, and failure unlocking is prompted.
According to the technical scheme, the first secret key and the first data are written into the electronic tag through the intelligent door lock in the registration process, the secret key does not need to be agreed in advance, the electronic tag does not need to be additionally configured, and the application range of the electronic tag is wider. In addition, the first secret key and the first data are calculated by the intelligent door lock according to the random registration data and the user identity, and the first secret key and the first data in each electronic tag are different, so that the safety is higher.
The following takes the NFC function of the mobile phone as an example to specifically describe the control method of the smart door lock. The NFC function of the mobile phone can simulate the mobile phone into an RFID card to register and unlock the door lock. After a customer registers the own mobile phone NFC on the door lock, the mobile phone can be directly close to the door lock to unlock the door lock, and the door lock unlocking device is very convenient.
Referring to fig. 5 and 6, fig. 5 and 6 respectively show the control process of the intelligent door lock provided by the present application when the intelligent door lock is in the registration mode and when the intelligent door lock is in the normal standby mode.
As shown in fig. 5, we first generate an "analog RFID card" using the NFC of the mobile phone, and then set the smart door lock to the registration mode. When the intelligent door lock is in a registration mode, the mobile phone is close to the intelligent door lock, the intelligent door lock detects the simulated RFID card and reads a User Identification (UID) of the simulated RFID card, the intelligent door lock calculates a first secret key and first data of the simulated RFID card through the UID, the intelligent door lock writes the first secret key and the first data back to the simulated RFID card, the intelligent door lock verifies the written first secret key and the written first data, and when the first secret key and the first data are verified correctly, the user identity and the random registration data are stored, and a registration process is completed. And when the first key and the first data are checked incorrectly, prompting that the registration fails and asking the user to execute the operation again.
As shown in fig. 6, when the smart door lock is in the standby mode, the smart door lock will periodically detect the analog RFID card. When the mobile phone simulation RFID card approaches the intelligent door lock, the intelligent door lock detects that the simulation RFID card approaches, reads the UID of the simulation RFID card, judges that the UID stored in the simulation RFID card exists, and prompts that unlocking fails when the UID stored in the simulation RFID card does not exist. When the UID stored in the simulated RFID card is provided with the UID, the intelligent door lock reads out corresponding random data through the UID, the intelligent door lock calculates a second secret key through the UID and the corresponding random number and reads a first secret key of the simulated RFID card through a second data intelligent door lock, whether the second secret key is the same as the first secret key or not is judged, and when the second secret key is different from the first secret key, the unlocking failure is prompted. When the second secret key is the same as the first secret key, the intelligent door lock reads random data corresponding to the second secret key, then the intelligent door lock compares the second data with the first data to judge whether the second data is consistent with the first data, and when the second data is inconsistent with the first data, unlocking failure is prompted. And when the second data is consistent with the first data, prompting that the unlocking is successful.
According to the technical scheme, the first secret key and the first data are written into the electronic tag through the intelligent door lock in the registration process, the secret key does not need to be agreed in advance, the electronic tag does not need to be additionally configured, and the application range of the electronic tag is wider. In addition, the first secret key and the first data are calculated by the intelligent door lock according to the random registration data and the user identity, and the first secret key and the first data in each electronic tag are different, so that the safety is higher.
Referring to fig. 7, fig. 7 is a schematic structural diagram illustrating a control device of an intelligent door lock according to an embodiment of the present application.
As shown in fig. 7, when the smart door lock is in the registration mode, the apparatus includes:
an obtaining module 610 configured to obtain a user identity of the detected electronic tag;
a calculation module 620 configured to calculate a first key and first data based on the registered random data and the user identity;
the writing module 630 is configured to write the first key and the first data into the electronic tag.
Optionally, the apparatus further comprises:
the verification module is configured to verify the first secret key and the first data;
and the storage module is configured to store the user identity identifier and the random registration data when the first secret key and the first data are correctly verified, and identify that the user identity identifier is successfully registered.
Optionally, the verification module may be specifically configured to:
optionally, the verification module may be specifically configured to:
reading a first secret key and first data from the electronic tag; determining whether the read first secret key and first data are the same as a first secret key and first data which are obtained by calculation based on the user identity and the registration random data and correspond to the electronic tag; the read first secret key and the read first data are determined to be the same as the first secret key and the first data which are obtained through calculation based on the user identity and correspond to the electronic tag, and the verification is correct; and when the read first secret key and the first data are determined to be different from the first secret key and the first data which are obtained by calculation based on the user identity and correspond to the electronic tag, the verification fails.
Optionally, the verification module may be further configured to prompt re-entering the registration mode and re-acquiring new registered random data when the verification of the first key and the first data fails.
Optionally, the apparatus further comprises an unlocking module configured to: when the intelligent door lock is in a normal standby mode and an approaching target electronic tag is detected, acquiring a user identity of the target electronic tag; determining whether a user identity of the target electronic tag is stored; when the user identity of the target electronic tag is stored, reading the registration random data corresponding to the user identity according to the user identity of the target electronic tag; calculating a second key and second data corresponding to the user identity of the target electronic tag according to the user identity of the target electronic tag and the corresponding registration random data; reading a first secret key and first data stored in a target electronic tag; and when the first key and the first data are the same as the second key and the second data, the intelligent door lock enters an unlocking mode from a normal standby mode.
Optionally, the unlocking module may be further configured to: comparing the first secret key stored in the target electronic tag with the second secret key; if the second secret key is the same as the first secret key, continuing to read the first data stored in the target electronic tag, and comparing whether the second data is the same as the first data stored in the target electronic tag or not; if the first data is the same as the second data, the first key and the first data are consistent with the second key and the second data; if the second key is different from the first key, or the first data is different from the second data, the first key and the first data are different from the second key and the second data.
The unlocking module may be further configured to: when the first secret key and the first data are different from the second secret key and the second data, the intelligent door lock keeps a normal standby mode, and unlocking failure is prompted.
According to the technical scheme, the first secret key and the first data are written into the electronic tag through the intelligent door lock in the registration process, the secret key does not need to be agreed in advance, the electronic tag does not need to be additionally configured, and the application range of the electronic tag is wider. In addition, the first secret key and the first data are calculated by the intelligent door lock according to the random registration data and the user identity, and the first secret key and the first data in each electronic tag are different, so that the safety is higher.
In another aspect, the present invention provides a control system for an intelligent door lock, which includes the above-described control device for an intelligent door lock and at least one electronic tag, where the electronic tag stores a first key and first data written by the control device for the intelligent door lock.
The control device of the intelligent door lock is used for executing the method described in the figure 3.
According to the technical scheme, the first secret key and the first data are written into the electronic tag through the intelligent door lock in the registration process, the secret key does not need to be agreed in advance, the electronic tag does not need to be additionally configured, and the application range of the electronic tag is wider.
Secondly, the intelligent door lock calculates different keys and data according to different user identity identifications and random data of each electronic tag, and the intelligent door lock is not easy to crack and has higher safety.
And thirdly, only the user identity identification and the random data need to be stored when the intelligent door lock is stored, so that the system resources can be effectively saved, and the cost is lower.
In another aspect, the present application further provides a computer-readable storage medium, which may be a storage module included in the intelligent door lock described in the following embodiments; or the intelligent door lock can be independently arranged and not assembled into the storage module of the intelligent door lock. The memory module may also be referred to as a memory portion. As shown in fig. 8, the smart door lock may include a processing unit 701 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)702 or a program loaded from a storage section into a Random Access Memory (RAM) 704. In the RAM703, various programs and data necessary for system operation are also stored. The processing unit 701, the ROM 702, and the RAM703 are connected to each other by a bus 704. An input/output (I/O) interface 705 is also connected to bus 704.
The following components are connected to the I/O interface 705: an input portion 706 including a keyboard, a mouse, and the like; an output section 707 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 708 including a hard disk and the like; and a communication section 709 including a network interface card such as a LAN card, a modem, or the like. The communication section 709 performs communication processing via a network such as the internet. The drives are also connected to the I/O interface 705 as needed. A removable medium 711 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 710 as necessary, so that a computer program read out therefrom is mounted into the storage section 708 as necessary.
In particular, according to an embodiment of the invention, the process described above with reference to the flowchart of fig. 1 may be implemented as a computer software program. For example, embodiments of the invention include a computer program product comprising a computer program embodied on a computer-readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication section, and/or installed from a removable medium. The computer program, when executed by the processing unit 701, performs the above-described functions defined in the system of the present application.
It should be noted that the computer readable medium shown in the present invention can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present invention, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present invention, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present invention may be implemented by software, or may be implemented by hardware, and the described units may also be disposed in a processor. Wherein the names of the elements do not in some way constitute a limitation on the elements themselves. The described units or modules may also be provided in a processor or in a control processor, and may be described, for example, as: a control processor comprises a detection module, a first key and first data acquisition module, an input module, wherein the names of the units or modules do not in some cases constitute a limitation of the units or modules themselves. For example, the calculation module may also be described as a "module for calculating the first key and the first data based on the registered random data and the user identity".
The computer readable medium carries one or more programs, and when the one or more programs are executed, the method for controlling the intelligent door lock described in the above embodiments is implemented.
For example, as shown in fig. 3: step S310, when the intelligent door lock is in a registration mode, the intelligent door lock acquires the detected user identity of the electronic tag; step S320, the intelligent door lock calculates a first secret key and first data based on the random registration data and the user identity; step S330, the smart door lock writes the first key and the first data into the electronic tag.
It should be noted that although in the above detailed description several modules or units of the device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.
Moreover, although the steps of the methods of the present disclosure are depicted in the drawings in a particular order, this does not require or imply that the steps must be performed in this particular order, or that all of the depicted steps must be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions, etc.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the disclosure herein is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the disclosure. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (14)

1. A control method of an intelligent door lock is characterized by comprising the following steps:
when the intelligent door lock is in a registration mode, the intelligent door lock acquires the detected user identity of the electronic tag;
the intelligent door lock calculates a first secret key and first data based on the random registration data and the user identity;
and the intelligent door lock writes the first secret key and the first data into the electronic tag.
2. The method according to claim 1, wherein after the smart door lock writes the first key and the first data into the electronic tag, the method further comprises:
the intelligent door lock verifies the first secret key and the first data;
when the first secret key and the first data are verified correctly, the intelligent door lock stores the user identity and the random registration data, and the user identity is successfully registered.
3. The method for controlling the intelligent door lock according to claim 2, wherein the verifying the first key and the first data by the intelligent door lock comprises:
the intelligent door lock reads the first secret key and the first data from the electronic tag;
the intelligent door lock determines whether the read first secret key and the first data are the same as a first secret key and first data which are obtained by calculation based on the user identity and the registration random data and correspond to the electronic tag;
the intelligent door lock determines that the read first secret key and the first data are the same as the first secret key and the first data which are obtained through calculation based on the user identity and correspond to the electronic tag, and the verification is correct;
and when the intelligent door lock determines that the read first secret key and the first data are different from the first secret key and the first data which are calculated based on the user identity and correspond to the electronic tag, the verification fails.
4. The method for controlling an intelligent door lock according to claim 2, further comprising:
and when the first secret key and the first data are failed to be verified, the intelligent door lock prompts to reenter the registration mode and reacquire new random registration data.
5. The method for controlling an intelligent door lock according to claim 1, wherein the method further comprises:
when the intelligent door lock is in the normal standby mode,
when the intelligent door lock detects an approaching target electronic tag, acquiring a user identity of the target electronic tag;
the intelligent door lock determines whether the user identity of the target electronic tag is stored or not;
when the intelligent door lock determines that the user identity of the target electronic tag is stored, reading registration random data corresponding to the user identity according to the user identity of the target electronic tag;
the intelligent door lock calculates a second key and second data corresponding to the user identity of the target electronic tag according to the user identity of the target electronic tag and the corresponding random registration data;
the intelligent door lock reads a first secret key and first data stored in the target electronic tag;
the smart door lock determines whether the first key and the first data are identical to the second key and the second data,
and when the first secret key and the first data are the same as the second secret key and the second data, the intelligent door lock enters an unlocking mode from a normal standby mode.
6. The method of claim 5, wherein the smart door lock determining whether the first key and the first data are the same as the second key and the second data comprises:
the intelligent door lock compares the second secret key pair with a first secret key stored in the target electronic tag;
if the second secret key is the same as the first secret key, the intelligent door lock continues to read first data stored in the target electronic tag, and the intelligent door lock compares whether the second data is the same as the first data stored in the target electronic tag or not;
if the first data is the same as the second data, the first key and the first data are consistent with the second key and the second data;
if the second secret key is different from the first secret key, or the first data is different from the second data, the first secret key and the first data are different from the second secret key and the second data.
7. The method for controlling an intelligent door lock according to claim 5, further comprising:
when the first secret key and the first data are different from the second secret key and the second data, the intelligent door lock keeps a normal standby mode, and unlocking failure is prompted.
8. A control device for an intelligent door lock, the device comprising:
the acquisition module is configured to acquire the user identity of the detected electronic tag when the intelligent door lock is in a registration mode;
a calculation module configured to calculate a first key and first data based on the registered random data and the user identity;
a writing module configured to write the first key and the first data into the electronic tag.
9. The control device of claim 8, further comprising:
the verification module is configured to verify the first secret key and the first data;
and the storage module is configured to store the user identity and the random registration data when the first key and the first data are verified correctly, and the storage module represents that the user identity is successfully registered.
10. The control device of claim 9, wherein the verification module is specifically configured to:
the intelligent door lock reads the first secret key and the first data from the electronic tag;
the intelligent door lock determines whether the read first secret key and the first data are the same as a first secret key and first data which are obtained by calculation based on the user identity and the registration random data and correspond to the electronic tag;
the intelligent door lock determines that the read first secret key and the first data are the same as the first secret key and the first data which are obtained through calculation based on the user identity and correspond to the electronic tag, and the verification is correct;
and when the intelligent door lock determines that the read first secret key and the first data are different from the first secret key and the first data which are calculated based on the user identity and correspond to the electronic tag, the verification fails.
11. The control device of claim 8, wherein when the smart door lock is in the normal standby mode, the device further comprises an unlocking module configured to:
when the intelligent door lock is in the normal standby mode,
when the intelligent door lock detects an approaching target electronic tag, acquiring a user identity of the target electronic tag;
the intelligent door lock determines whether the user identity of the target electronic tag is stored or not;
when the intelligent door lock determines that the user identity of the target electronic tag is stored, reading registration random data corresponding to the user identity according to the user identity of the target electronic tag;
the intelligent door lock calculates a second key and second data corresponding to the user identity of the target electronic tag according to the user identity of the target electronic tag and the corresponding random registration data;
the intelligent door lock reads a first secret key and first data stored in the target electronic tag;
the smart door lock determines whether the first key and the first data are identical to the second key and the second data,
and when the first secret key and the first data are the same as the second secret key and the second data, the intelligent door lock enters an unlocking mode from a normal standby mode.
12. A control system of an intelligent door lock, characterized by comprising the control device of the intelligent door lock according to any one of claims 8 to 11 and at least one electronic tag, wherein the electronic tag stores a first key and first data written by the control device of the intelligent door lock.
13. The control system of an intelligent door lock as claimed in claim 12, wherein the electronic tag is a short-range wireless communication tag.
14. A computer-readable storage medium, on which a computer program is stored, the computer program being for implementing the method of any one of claims 1-7.
CN202011034310.7A 2020-09-27 2020-09-27 Control method, device, system and medium for intelligent door lock Pending CN114360100A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011034310.7A CN114360100A (en) 2020-09-27 2020-09-27 Control method, device, system and medium for intelligent door lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011034310.7A CN114360100A (en) 2020-09-27 2020-09-27 Control method, device, system and medium for intelligent door lock

Publications (1)

Publication Number Publication Date
CN114360100A true CN114360100A (en) 2022-04-15

Family

ID=81090335

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011034310.7A Pending CN114360100A (en) 2020-09-27 2020-09-27 Control method, device, system and medium for intelligent door lock

Country Status (1)

Country Link
CN (1) CN114360100A (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1979510A (en) * 2005-12-09 2007-06-13 北京兆维电子(集团)有限责任公司 Method and apparatus for generating and storing key on single-chip machine
CN104727658A (en) * 2015-01-26 2015-06-24 湖南银宝科技发展有限公司 Intelligent lock, intelligent key and control method and device thereof
CN105184931A (en) * 2015-09-30 2015-12-23 上海艾迅士建筑科技有限公司 Bluetooth-based unlocking method, system and hand-held terminal and Bluetooth-based electronic lock
CN106341817A (en) * 2016-09-05 2017-01-18 努比亚技术有限公司 Access control system, access control method, mobile terminals and access server
CN106557283A (en) * 2016-11-16 2017-04-05 郑州云海信息技术有限公司 A kind of solid state hard disc self-destruction method and device
CN107578511A (en) * 2017-09-15 2018-01-12 林海航 A kind of smart lock and its Intelligent key
CN108019881A (en) * 2017-11-10 2018-05-11 青岛海尔空调电子有限公司 Line control machine method for controlling power supply, device and the air conditioner of multi-connected air conditioning system
CN108109245A (en) * 2017-12-29 2018-06-01 惠州Tcl家电集团有限公司 Unlocking method, system, intelligent door lock, mobile terminal and storage medium
CN110298951A (en) * 2019-07-16 2019-10-01 深圳市凯迪仕智能科技有限公司 Encryption method and encryption system for M1 card
CN110442066A (en) * 2019-08-16 2019-11-12 佳源科技有限公司 A kind of Internet of things system based on cloud collaboration
CN110443915A (en) * 2019-06-24 2019-11-12 深圳绿米联创科技有限公司 Control method for door lock, control device, door lock and storage medium
CN111199601A (en) * 2019-09-02 2020-05-26 腾讯科技(深圳)有限公司 Access control method and device, intelligent terminal, server and storage medium

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1979510A (en) * 2005-12-09 2007-06-13 北京兆维电子(集团)有限责任公司 Method and apparatus for generating and storing key on single-chip machine
CN104727658A (en) * 2015-01-26 2015-06-24 湖南银宝科技发展有限公司 Intelligent lock, intelligent key and control method and device thereof
CN105184931A (en) * 2015-09-30 2015-12-23 上海艾迅士建筑科技有限公司 Bluetooth-based unlocking method, system and hand-held terminal and Bluetooth-based electronic lock
CN106341817A (en) * 2016-09-05 2017-01-18 努比亚技术有限公司 Access control system, access control method, mobile terminals and access server
CN106557283A (en) * 2016-11-16 2017-04-05 郑州云海信息技术有限公司 A kind of solid state hard disc self-destruction method and device
CN107578511A (en) * 2017-09-15 2018-01-12 林海航 A kind of smart lock and its Intelligent key
CN108019881A (en) * 2017-11-10 2018-05-11 青岛海尔空调电子有限公司 Line control machine method for controlling power supply, device and the air conditioner of multi-connected air conditioning system
CN108109245A (en) * 2017-12-29 2018-06-01 惠州Tcl家电集团有限公司 Unlocking method, system, intelligent door lock, mobile terminal and storage medium
CN110443915A (en) * 2019-06-24 2019-11-12 深圳绿米联创科技有限公司 Control method for door lock, control device, door lock and storage medium
CN110298951A (en) * 2019-07-16 2019-10-01 深圳市凯迪仕智能科技有限公司 Encryption method and encryption system for M1 card
CN110442066A (en) * 2019-08-16 2019-11-12 佳源科技有限公司 A kind of Internet of things system based on cloud collaboration
CN111199601A (en) * 2019-09-02 2020-05-26 腾讯科技(深圳)有限公司 Access control method and device, intelligent terminal, server and storage medium

Similar Documents

Publication Publication Date Title
US20080022086A1 (en) Methods and system for a key recovery plan
CN105408910A (en) Systems and methods for authenticating access to operating system by user before the operating system is booted using wireless communication token
US11349833B2 (en) Multi-factor authentication utilizing device pairing
CN111130602B (en) Near field communication card data writing system, method, device and medium
CN104156651A (en) Access control method and device for terminal
CN103516518A (en) Safety verification method and device
KR20120070373A (en) Method and apparatus for smart-key management
CN103729903A (en) Authentication system and method using handset as validation terminal
US10372440B1 (en) Tokenized mobile device update systems and methods
CN112084476A (en) Biological identification identity verification method, client, server, equipment and system
US20230325178A1 (en) Tokenized mobile device update systems and methods
CN108305065B (en) Data processing method, terminal equipment and data processing system
CN113360217A (en) Rule engine SDK calling method and device and storage medium
CN111143798A (en) Security verification method and device
CN113826135A (en) System and method for contactless authentication using voice recognition
CN112101945B (en) Method and system for supervising block chain content
CN109858914A (en) Block chain data verification method, device, computer equipment and readable storage medium storing program for executing
CN106775834A (en) Brush machine verification method and device
CN113541741A (en) Analog card switching method and device, electronic equipment and storage medium
CN113055157B (en) Biological characteristic verification method and device, storage medium and electronic equipment
CN114360100A (en) Control method, device, system and medium for intelligent door lock
CN112905437A (en) Method and device for testing case and storage medium
CN110191123A (en) It applies for card on a kind of line method, client and system
CN114531679A (en) Mobile terminal permission interaction system and method based on user identification card
CN104134025B (en) Mobile terminal locking method, device and mobile terminal based on SIM card

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination