CN114882618A - Control method and unlocking method of door lock, storage medium and mobile device - Google Patents

Control method and unlocking method of door lock, storage medium and mobile device Download PDF

Info

Publication number
CN114882618A
CN114882618A CN202210348206.8A CN202210348206A CN114882618A CN 114882618 A CN114882618 A CN 114882618A CN 202210348206 A CN202210348206 A CN 202210348206A CN 114882618 A CN114882618 A CN 114882618A
Authority
CN
China
Prior art keywords
information
door lock
mobile device
encrypted information
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210348206.8A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen TCL New Technology Co Ltd
Original Assignee
Shenzhen Huasheng Software Technology Co ltd
TCL Commercial Information Technology Huizhou Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Huasheng Software Technology Co ltd, TCL Commercial Information Technology Huizhou Co Ltd filed Critical Shenzhen Huasheng Software Technology Co ltd
Priority to CN202210348206.8A priority Critical patent/CN114882618A/en
Publication of CN114882618A publication Critical patent/CN114882618A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/47Security arrangements using identity modules using near field communication [NFC] or radio frequency identification [RFID] modules

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The embodiment of the application discloses a control method of a door lock, which comprises the steps of obtaining equipment identity identification information of the door lock; encrypting the device identification information using an encryption algorithm to generate encrypted information; the encrypted information is stored and transmitted to the mobile device so that the mobile device unlocks the door lock using the received encrypted information. The door lock in the embodiment of the application does not need to open the door through the NFC card number of the mobile device, the failure of identifying the mobile device due to the fact that the NFC card number of part of the mobile device is changed all the time can be avoided, and the stability of the function of the NFC communication module of the mobile device as the access control card is improved.

Description

Control method and unlocking method of door lock, storage medium and mobile device
Technical Field
The application relates to the field of smart home, in particular to a control method and an unlocking method of a door lock, the door lock, a storage medium and mobile equipment.
Background
The mobile phone can use the NFC communication module to realize the function of the access control card to unlock the door lock, when the mobile phone is used for unlocking, the door lock needs to identify the NFC card number of the mobile phone so as to judge whether the mobile phone is authorized, and if the mobile phone is identified to be authorized, the unlocking is successful. However, as part of the NFC card numbers of the mobile phones are changed all the time, the door lock fails to identify the mobile phone, and the unlocking cannot be successfully performed.
Disclosure of Invention
The embodiment of the application provides a control method and an unlocking method of a door lock, the door lock, a storage medium and a mobile device, and can improve the stability of the function of an NFC communication module of the mobile device as an access control card.
In a first aspect, an embodiment of the present application provides a method for controlling a door lock, where the method includes:
acquiring equipment identity identification information of a door lock;
encrypting the device identification information using an encryption algorithm to generate encrypted information;
and storing the encrypted information, and sending the encrypted information to the mobile equipment so that the mobile equipment uses the received encrypted information to unlock the door lock.
Optionally, encrypting the device id information using an encryption algorithm to generate encrypted information includes:
acquiring random data information and incremental data information;
and encrypting the equipment identity identification information, the random data information and the incremental data information by using an encryption algorithm to generate encrypted information.
Optionally, the encrypting the device id information by using an encryption algorithm to generate encrypted information includes:
encrypting the random data information and the incremental data information by using a first encryption algorithm to generate intermediate encryption information;
and encrypting the intermediate encryption information and the equipment identity identification information by using a second encryption algorithm to generate encryption information.
Optionally, the obtaining incremental data information includes:
acquiring stored first data;
obtaining second data after the first data is increased in number, and taking the second data as increasing data information;
storing the second data as new first data.
Optionally, the acquiring the random data information includes:
randomly generating a random number;
and taking the random number as random data information.
Optionally, the sending the encrypted information to the mobile device, so that the mobile device unlocks the door lock by using the received encrypted information, includes:
sending the encrypted information to the mobile device through the NFC communication module;
receiving decryption information sent by the mobile equipment through the NFC communication module;
if the decryption information is matched with the stored encryption information, unlocking the door lock;
and if the decryption information is not matched with the stored encryption information, the door lock is not unlocked.
In a second aspect, an embodiment of the present application provides an unlocking method for a door lock, which is applied to a mobile device, and the method includes:
receiving encrypted information sent by a door lock, wherein the encrypted information is unique mark information generated by the door lock;
storing the encrypted information and using the encrypted information as decryption information;
and when the communication with the door lock is identified, unlocking the door lock by using the decryption information.
In a third aspect, an embodiment of the present application provides a door lock, including:
the acquisition module is used for acquiring equipment identity identification information of the door lock;
an encryption module for encrypting the device identification information using an encryption algorithm to generate encrypted information;
and the sending module is used for sending the encrypted information to the mobile equipment so that the mobile equipment uses the received encrypted information to unlock the door lock.
In a fourth aspect, the present application provides a storage medium having a computer program stored thereon, where the computer program is executed on a computer, so that the computer executes the method provided by the present application.
In a fifth aspect, an embodiment of the present application provides a mobile device, including:
the receiving module is used for receiving encrypted information sent by a door lock, wherein the encrypted information is unique mark information generated by the door lock;
the storage module is used for storing the encrypted information and using the encrypted information as decryption information;
and the communication module is used for unlocking the door lock by using the decryption information when the communication with the door lock is identified.
The embodiment that this application provided in the lock generates only encryption information and sends to mobile device based on equipment identification information, when NFC communication module of mobile device carries out the unblock as entrance guard's card function to the lock, use the encryption information that the lock sent to unblock, consequently, the lock need not unblock through discernment mobile device's NFC card number, thereby can not lead to discerning mobile device failure because part mobile device's NFC card number changes all the time, make mobile device can not successfully unblock, consequently, this application embodiment has improved the stability of mobile device's NFC communication module as entrance guard's card function.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings required to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the description below are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a first flowchart of a method for controlling a door lock according to an embodiment of the present application.
Fig. 2 is a second flowchart of a door lock control method according to an embodiment of the present application.
Fig. 3 is a first scenario diagram of a door lock control method according to an embodiment of the present application.
Fig. 4 is a schematic flowchart of an unlocking method of a door lock according to an embodiment of the present application.
Fig. 5 is a schematic structural diagram of a door lock provided in an embodiment of the present application.
Fig. 6 is a schematic structural diagram of a mobile device according to an embodiment of the present application.
Detailed Description
Referring to the drawings, wherein like reference numbers refer to like elements, the principles of the present application are illustrated as being implemented in a suitable computing environment. The following description is based on illustrated embodiments of the application and should not be taken as limiting the application with respect to other embodiments that are not detailed herein.
With the development of the technology, the image processing capability of the electronic device is stronger. Based on this, users often use electronic devices to take images, such as taking photos or recording videos. However, in the related art, the image processing architecture relied on when the electronic device performs image processing is not favorable for the migration and maintenance of software codes.
Referring to fig. 1, fig. 1 is a schematic flow chart of a door lock control method according to an embodiment of the present application, where the flow of the door lock control method may include:
in 101, device identification information of the door lock is acquired.
Each door lock has a relatively unique serial number, and the serial number is used as unique equipment identification information of the door lock, and the identification information contains a plurality of important information about the door lock, such as various door lock basic information such as production date, manufacturer, configuration, version and the like of the door lock can be inquired through the equipment identification information.
Because the equipment identity identification information of the door lock belongs to the unique and special serial number of the door lock, the equipment identity identification information of each door lock is different. Therefore, the embodiment of the application acquires the equipment identity information of the door lock, and takes the equipment identity information of the door lock as the key factor.
At 102, the device identification information is encrypted using an encryption algorithm to generate encrypted information.
According to the embodiment of the application, after the unique equipment identity identification information of the door lock is obtained, the unique equipment identity identification information of the door lock is encrypted to generate the encrypted information, and the encrypted information obtained by encrypting the unique equipment identity identification information of the door lock is unique because the unique equipment identity identification information of the door lock is unique. Illustratively, the length of the encryption information may be 4 to 10 bytes.
For example, the encryption method may be a hash algorithm, such as: SHA256 algorithm.
It should be noted that the encryption method may also be other hash algorithms, for example: one of SHA224, SHA256, SHA384, SHA512/224, SHA 512/256.
At 103, the encrypted information is stored and transmitted to the mobile device to cause the mobile device to unlock the door lock using the received encrypted information.
After the encrypted information is generated, the door lock stores the encrypted information and sends the encrypted information to the mobile device. After the mobile device receives the encrypted information, the door lock can be unlocked by using the encrypted information. Because the encrypted information generated by different door locks is unique, only the mobile device receiving the encrypted information sent by the door lock can unlock the door lock, and the mobile device not receiving the encrypted information sent by the door lock cannot unlock the door lock. Exemplarily, the mobile device uses the received encrypted information as decryption information, when the mobile device is used for unlocking the door lock, the door lock matches the decryption information sent by the mobile device with the stored encrypted information, and if the decryption information is matched with the stored encrypted information, the door lock is unlocked; and if the decryption information is not matched with the stored encryption information, the door lock is not unlocked.
Exemplarily, the door lock can be unlocked through the NFC communication module between the door lock and the mobile device, for example, the mobile device receives decryption information through the NFC communication module by using decryption information sent by the NFC communication module, and the door lock realizes the access control card function by using the NFC communication module, so that the use mode is simple and convenient. It should be noted that the door lock may be unlocked by using a plurality of mobile devices, and the door lock may send the multiple encrypted information to the plurality of mobile devices, so that the plurality of mobile devices use the received encrypted information to unlock the door lock.
The embodiment that the application provides in the lock generates only encryption information and sends to mobile device based on equipment identity identification information, when NFC communication module of mobile device unlocks the lock as entrance guard's card function, the encryption information that uses the lock to send unlocks, therefore the lock need not unlock through discerning the NFC card number of mobile device, thereby can not lead to discerning the mobile device failure because the NFC card number of part mobile device changes all the time, make the mobile device can not successfully unlock, lead to user complaint, therefore this application embodiment has improved the stability of NFC communication module of mobile device as entrance guard's card function, user's satisfaction has been improved.
Referring to fig. 2 and fig. 3, fig. 2 is a second flowchart illustrating a door lock control method according to an embodiment of the present application. Fig. 3 is a first scenario diagram of a method for controlling a door lock according to an embodiment of the present application.
In 201, device identification information of the door lock is acquired.
Each door lock has a relatively unique serial number, and the serial number is used as unique equipment identity information of the door lock, the identity information contains a plurality of important information about the door lock, for example, the equipment identity information can inquire various equipment substrate information such as the production date, the manufacturer, the configuration, the version and the like of the door lock equipment.
Because the equipment identity identification information of the door lock belongs to the unique and special serial number of the door lock, the equipment identity identification information of each door lock is different. Therefore, the embodiment of the application acquires the equipment identity information of the door lock, and takes the equipment identity information of the door lock as the key factor.
At 202, random data information and incremental data information are obtained.
In the embodiment of the application, random data information can be acquired, specifically, the door lock can randomly generate a random number, and the random number is used as the random data information. For example, the lock may generate a random number using a random number algorithm, such as a Monte Carlo method. For example, a random number of 16 bits, 32 bits, or other numbers may be generated as desired, with random numbers having more bits being more complex and more unpredictable.
Incremental data information is also acquired in the embodiment of the application, and specifically, the door lock acquires the stored first data; obtaining second data after the first data is increased in number, and taking the second data as increasing data information; the second data is stored as new first data. For example, the first data may be 32-bit data, and the second data may be 1, so that on the basis of the first data, each time the door lock acquires the incremental data information, 1 is added to the first data to obtain the incremental data information, so that each time the incremental data information is obtained, the incremental data information is unique. It should be noted that the first data may be data with other bits, and the second data may also be other data, for example, 2 or 3, etc., as required.
At 203, the device identification information, the random data information, and the incremental data information are encrypted using an encryption algorithm to generate encrypted information.
According to the embodiment of the application, after the equipment identity identification information, the random data information and the incremental data information of the door lock are obtained, the MCU of the door lock uses the equipment identity identification information, the random data information and the incremental data information as key factors to encrypt, wherein the equipment identity identification information of the door lock is a unique serial number different from other equipment, the incremental data information obtained by the door lock each time is unique, and the random data information obtained by the door lock each time is unpredictable. For example, the encryption mode may be: the SHA256 algorithm, the encryption method may be other algorithms, for example: one of SHA224, SHA256, SHA384, SHA512/224, SHA 512/256.
For example, the encryption algorithm is used for encrypting the equipment identity information, the random data information and the incremental data information to generate encrypted information, and the first encryption algorithm can also be used for encrypting the random data information and the incremental data information to generate intermediate encrypted information; and encrypting the intermediate encryption information and the equipment identity identification information by using a second encryption algorithm to generate encryption information. The encryption is carried out by using a double encryption algorithm, so that the encrypted information obtained by the door lock can be more secure. The first algorithm and the second algorithm may be the same or different, for example, the first algorithm and the second algorithm may be one or more of SHA224, SHA256, SHA384, SHA512/224, and SHA 512/256.
At 204, the encrypted information is sent to the mobile device through the NFC communication module.
The door lock can be unlocked by using a plurality of mobile devices, each mobile device needs to be authorized by the door lock first, and the door lock generates a unique encrypted message according to the method of the embodiment and sends the unique encrypted message to the mobile device to complete the authorization. The door lock can send the encrypted information to the mobile device through the NFC communication module. It should be noted that the door lock may use another communication module to send the encrypted information to the mobile device, and modules such as WIFI and bluetooth send the encrypted information to the mobile device.
And after receiving the encrypted information sent by the door lock, the mobile equipment stores the encrypted information as decryption information. And when the mobile equipment needs to unlock the door lock, the decryption information is sent to the door lock through the NFC communication module.
In 205, decryption information sent by the mobile device is received by the NFC communication module.
When the mobile device needs to unlock the door lock, the decryption information is sent to the door lock through the NFC communication module. The door lock can receive the decryption information sent by the mobile device through the NFC communication module.
At 206, the door lock is unlocked if the decryption information matches the stored encryption information.
If the decryption information does not match the stored encryption information, the door lock is not unlocked 207.
The door lock can match decryption information sent by the mobile equipment with the stored encryption information, and if the decryption information is matched with the stored encryption information, the door lock is unlocked; and if the decryption information is not matched with the stored encryption information, the door lock is not unlocked.
In the embodiment of the application, mobile devices such as mobile phones can use the NFC communication module to realize the function of the access card after the door lock is authorized, and the use mode is simple and convenient. When the door lock authorizes the mobile device, the door lock generates unique encrypted information and sends the encrypted information to the mobile device, and the mobile device stores the encrypted information and serves as decryption information. When the door lock receives the decryption information sent by the mobile equipment, the decryption information sent by the mobile equipment only needs to be matched with the stored encryption information, and the door lock is unlocked if the decryption information is successfully matched, so that the door lock does not need to be unlocked by identifying the NFC card number of the mobile equipment, failure in identifying the mobile equipment due to the fact that the NFC card numbers of part of the mobile equipment are changed all the time is avoided, the mobile equipment cannot be successfully unlocked, and user complaints are caused.
Referring to fig. 4, fig. 4 is a schematic flowchart illustrating an unlocking method of a door lock according to an embodiment of the present application. The unlocking method of the door lock is applied to mobile equipment, the mobile equipment can be a mobile phone, a tablet personal computer and the like, and the mobile equipment can also be equipment with an NFC card or other equipment with an NFC communication module.
At 301, encrypted information sent by a door lock is received.
According to the embodiment of the application, when the door lock authorizes the mobile device, the door lock generates unique encryption information and sends the encryption information to the mobile device, and the mobile device receives the encryption information sent by the door lock. Illustratively, the door lock can send the encrypted information to the mobile device through the NFC functional module, the mobile device can receive the encrypted information sent by the door lock by using the NFC functional module, and certainly, the door lock and the mobile device can also communicate in other manners, such as in a WIFI manner or a bluetooth manner.
In 302, the encrypted information is stored and used as decryption information.
And after receiving the encrypted information sent by the door lock, the mobile equipment stores the encrypted information and takes the encrypted information as decryption information. Therefore, when the NFC communication module of the mobile device is used as an access card function to unlock the door lock, the NFC card number of the mobile device itself is not required to be used as decryption information, but the encrypted information sent by the door lock is used as decryption information, and the NFC card number of the mobile device itself may change automatically, but the encrypted information stored by the mobile device does not change automatically.
In 303, the door lock is unlocked using the decryption information when communication with the door lock is identified.
When the mobile equipment identifies the communication with the door lock, namely when a user uses the mobile equipment to unlock the door lock, the mobile equipment can send decryption information to the door lock through the NFC function module, the door lock can receive the decryption information sent by the mobile equipment through the NFC communication module and match the decryption information sent by the mobile equipment with the stored encryption information, and if the decryption information is matched with the encryption information stored by the door lock, the door lock is unlocked; if the decryption information does not match the stored encryption information, the door lock is not unlocked, and thus the mobile device can unlock the door lock using the decryption information.
In the embodiment of the application, the mobile device uses the NFC communication module to realize the access control card function, when the door lock is unlocked, the NFC card number of the mobile device does not need to be used as decryption information, but the encryption information sent by the door lock is used as decryption information, the NFC card number of the mobile device may change automatically, but the encryption information stored by the mobile device does not change automatically, so that the door lock does not need to open the door by identifying the NFC card number of the mobile device when identifying whether the mobile device is authorized, and the failure of identifying the mobile device by the door lock due to the fact that the NFC card number of part of the mobile device changes all the time is avoided, so that the mobile device cannot open the door successfully, and the complaint of the user is caused.
Referring to fig. 5, fig. 5 is a schematic structural diagram of a door lock according to an embodiment of the present application. The door lock 400 may include: the system comprises an acquisition module 401, an encryption module 402 and a sending module 403.
The obtaining module 401 is configured to: acquiring equipment identity identification information of a door lock;
the encryption module 402 is configured to: encrypting the device identification information using an encryption algorithm to generate encrypted information;
the sending module 403 is configured to: and sending the encrypted information to the mobile device so that the mobile device unlocks the door lock by using the received encrypted information.
In one embodiment, the encryption module 402 may be configured to:
acquiring random data information and incremental data information;
and encrypting the equipment identity identification information, the random data information and the incremental data information by using an encryption algorithm to generate encrypted information.
In one embodiment, the encryption module 402 may be configured to:
encrypting the random data information and the incremental data information by using a first encryption algorithm to generate intermediate encryption information;
and encrypting the intermediate encryption information and the equipment identity identification information by using a second encryption algorithm to generate encryption information.
In one embodiment, the encryption module 402 may be configured to:
acquiring stored first data;
obtaining second data after the first data is increased in size, and taking the second data as increasing data information;
the second data is stored as new first data.
In one embodiment, the encryption module 402 may be configured to:
randomly generating a random number;
the random number is used as random data information.
In one embodiment, the sending module 403 may be configured to:
sending the encrypted information to the mobile device through the NFC communication module;
receiving decryption information sent by the mobile equipment through an NFC communication module;
if the decryption information is matched with the stored encryption information, unlocking the door lock;
and if the decryption information is not matched with the stored encryption information, the door lock is not unlocked.
The embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed on a computer, the computer is caused to execute the flow in the control method of the door lock provided in the embodiment.
Referring to fig. 6, fig. 6 is a schematic structural diagram of a mobile device according to an embodiment of the present disclosure. The mobile device 500 may include: the device comprises a receiving module 501, a storage module 502 and a communication module 503.
The receiving module 501 may be configured to: receiving encrypted information sent by a door lock, wherein the encrypted information is unique mark information generated by the door lock;
the storage module 502 may be configured to: storing the encrypted information, and using the encrypted information as decryption information;
the communication module 503 may be configured to: and when the communication with the door lock is recognized, unlocking the door lock by using the decryption information.
In the above embodiments, the descriptions of the embodiments have respective emphasis, and a part which is not described in detail in a certain embodiment may refer to the above detailed description of the control method for the door lock, and is not described herein again.
The door lock provided by the embodiment of the application and the control method of the door lock in the embodiment belong to the same concept, any method provided in the embodiment of the control method of the door lock can be operated on the door lock, the specific implementation process is detailed in the embodiment of the control method of the door lock, and details are not repeated here.
The mobile device provided by the embodiment of the application and the unlocking method of the door lock in the embodiments belong to the same concept, and any method provided in the embodiment of the unlocking method of the door lock can be operated on the mobile device.
It should be noted that, for the control method of the door lock in the embodiment of the present application, it can be understood by those skilled in the art that all or part of the process of implementing the control method of the door lock in the embodiment of the present application may be completed by controlling the relevant hardware through a computer program, where the computer program may be stored in a computer readable storage medium, such as a memory, and executed by at least one processor, and during the execution process, the process of the embodiment of the control method of the door lock may be included. The storage medium may be a magnetic disk, an optical disk, a Read Only Memory (ROM), a Random Access Memory (RAM), or the like.
For the door lock or the mobile device according to the embodiment of the present application, each functional module may be integrated into one processing chip, or each module may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium, such as a read-only memory, a magnetic or optical disk, or the like.
The method, the device, the storage medium and the wearable device for controlling the door lock provided by the embodiment of the present application are described in detail above, a specific example is applied in the present application to explain the principle and the implementation of the present application, and the description of the above embodiment is only used to help understand the method and the core idea of the present application; meanwhile, for those skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. A method of controlling a door lock, the method comprising:
acquiring equipment identity identification information of a door lock;
encrypting the device identification information using an encryption algorithm to generate encrypted information;
and storing the encrypted information, and sending the encrypted information to the mobile equipment so that the mobile equipment uses the received encrypted information to unlock the door lock.
2. The method of controlling a door lock according to claim 1, wherein the encrypting the device identification information using an encryption algorithm to generate encrypted information includes:
acquiring random data information and incremental data information;
and encrypting the equipment identity identification information, the random data information and the incremental data information by using an encryption algorithm to generate encrypted information.
3. The method of controlling a door lock according to claim 2, wherein the encrypting the device identification information using an encryption algorithm to generate encrypted information includes:
encrypting the random data information and the incremental data information by using a first encryption algorithm to generate intermediate encryption information;
and encrypting the intermediate encryption information and the equipment identity identification information by using a second encryption algorithm to generate encryption information.
4. The door lock control method according to claim 2, wherein the acquiring incremental data information includes:
acquiring stored first data;
obtaining second data after the first data is increased in number, and taking the second data as increasing data information;
storing the second data as new first data.
5. The door lock control method according to claim 2, wherein the acquiring of the random data information includes:
randomly generating a random number;
and taking the random number as random data information.
6. The method for controlling the door lock according to claim 1, wherein the sending the encrypted information to the mobile device to enable the mobile device to unlock the door lock by using the received encrypted information comprises:
sending the encrypted information to the mobile device through the NFC communication module;
receiving decryption information sent by the mobile equipment through the NFC communication module;
if the decryption information is matched with the stored encryption information, unlocking the door lock;
and if the decryption information is not matched with the stored encryption information, the door lock is not unlocked.
7. An unlocking method of a door lock is applied to mobile equipment, and is characterized by comprising the following steps:
receiving encrypted information sent by a door lock;
storing the encrypted information, and using the encrypted information as decryption information;
and when the communication with the door lock is identified, unlocking the door lock by using the decryption information.
8. A door lock, comprising:
the acquisition module is used for acquiring equipment identity identification information of the door lock;
an encryption module for encrypting the device identification information using an encryption algorithm to generate encrypted information;
and the sending module is used for sending the encrypted information to the mobile equipment so that the mobile equipment uses the received encrypted information to unlock the door lock.
9. A computer-readable storage medium, on which a computer program is stored, which, when executed on a computer, causes the computer to carry out the method according to any one of claims 1 to 7.
10. A mobile device, comprising:
the receiving module is used for receiving encrypted information sent by a door lock, wherein the encrypted information is unique mark information generated by the door lock;
the storage module is used for storing the encrypted information and using the encrypted information as decryption information;
and the communication module is used for unlocking the door lock by using the decryption information when the communication with the door lock is identified.
CN202210348206.8A 2022-04-01 2022-04-01 Control method and unlocking method of door lock, storage medium and mobile device Pending CN114882618A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210348206.8A CN114882618A (en) 2022-04-01 2022-04-01 Control method and unlocking method of door lock, storage medium and mobile device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210348206.8A CN114882618A (en) 2022-04-01 2022-04-01 Control method and unlocking method of door lock, storage medium and mobile device

Publications (1)

Publication Number Publication Date
CN114882618A true CN114882618A (en) 2022-08-09

Family

ID=82669055

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210348206.8A Pending CN114882618A (en) 2022-04-01 2022-04-01 Control method and unlocking method of door lock, storage medium and mobile device

Country Status (1)

Country Link
CN (1) CN114882618A (en)

Similar Documents

Publication Publication Date Title
US20210192090A1 (en) Secure data storage device with security function implemented in a data security bridge
JP6629952B2 (en) Method and apparatus for securing mobile applications
EP3787226B1 (en) A multi-user strong authentication token
EP3257194B1 (en) Systems and methods for securely managing biometric data
CA3030129C (en) Electronic credential management system
US9276753B2 (en) System and method for data authentication among processors
RU2620998C2 (en) Method and authentication device for unlocking administrative rights
CN106603484B (en) Virtual key method, device applying same, background system and user terminal
CN100590639C (en) System and method for managing multiple smart card sessions
US9307403B2 (en) System and method for NFC peer-to-peer authentication and secure data transfer
EP3229400B1 (en) Password push method, push system, and terminal device
CN102792313A (en) Credential-based access to data
TW201706896A (en) Password setting method and system, and lockset matching method and system
US11568082B2 (en) Method and system for securing sensitive information
US20100243736A1 (en) Storage device management systems and methods
CN106650372A (en) open method and device of administrator authority
CN109075974B (en) Binding authentication method of fingerprint algorithm library and fingerprint sensor and fingerprint identification system
CN115935391A (en) Card manufacturing method, card issuing method, device, medium, and program product for IC card
US20100122323A1 (en) Storage device management systems and methods
CN114882618A (en) Control method and unlocking method of door lock, storage medium and mobile device
CN107682161B (en) Offline authentication method and device for two-dimensional code
KR101777042B1 (en) Card for Generating Electronic Signature based on Asynchronous Local Area Radio Communication
KR101777044B1 (en) Card for Generating One Time Password based on Asynchronous Local Area Radio Communication
Wu Investigation into the Key Technologies of Smart Locks and Analysis of Typical Applications
JP4998290B2 (en) Data authentication synchronization system and method between portable terminal and personal computer

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20220824

Address after: 9 / F, building D4, international e city, 1001 Zhongshan Garden Road, Xili street, Nanshan District, Shenzhen City, Guangdong Province

Applicant after: SHENZHEN TCL NEW TECHNOLOGY Co.,Ltd.

Address before: 518101 floor 3, building D1, TCL International e city, No. 1001, Zhongshan Garden Road, Nanshan District, Shenzhen, Guangdong

Applicant before: Shenzhen Huasheng Software Technology Co.,Ltd.

Applicant before: TCL commercial information technology (Huizhou) Co.,Ltd.

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination