CN114882620A - Identity authentication method and system of intelligent door lock - Google Patents

Identity authentication method and system of intelligent door lock Download PDF

Info

Publication number
CN114882620A
CN114882620A CN202210372322.3A CN202210372322A CN114882620A CN 114882620 A CN114882620 A CN 114882620A CN 202210372322 A CN202210372322 A CN 202210372322A CN 114882620 A CN114882620 A CN 114882620A
Authority
CN
China
Prior art keywords
equipment
door lock
key
random number
symmetric encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210372322.3A
Other languages
Chinese (zh)
Inventor
李红卫
余祥鑫
张鸿
方坤烁
叶品元
刘芳
洪志云
宋嘉鑫
李明霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Haizhichuang Technology Co ltd
Original Assignee
Shenzhen Haizhichuang Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Haizhichuang Technology Co ltd filed Critical Shenzhen Haizhichuang Technology Co ltd
Priority to CN202210372322.3A priority Critical patent/CN114882620A/en
Publication of CN114882620A publication Critical patent/CN114882620A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B49/00Electric permutation locks; Circuits therefor ; Mechanical aspects of electronic locks; Mechanical keys therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses an identity authentication method and system of an intelligent door lock, which comprises the steps of obtaining a door lock device, generating a first random number by the door lock device, and registering in a gateway; the method comprises the steps that door lock equipment logs in a cloud end, and the cloud end decrypts the current door lock equipment based on an equipment key to obtain a first random number; the cloud generates a second random number and a symmetric encryption key; the door lock equipment analyzes and obtains a second random number based on the equipment key, and generates a symmetric encryption key according to the first random number, the second random number and the equipment key; in the subsequent communication process of the door lock and the gateway, the communication protocol is encrypted and decrypted by using the symmetric encryption keys stored at each end, and the identity of the opposite side is legal if the decryption is successful.

Description

Identity authentication method and system of intelligent door lock
Technical Field
The invention relates to the field of secret key configuration of intelligent door locks, in particular to an identity authentication method and an identity authentication system of an intelligent door lock.
Background
At wisdom house field, begin to dispose various types of intelligent house in user's the house environment, make the life more intelligent, for example set up the smart lamp, open and report pronunciation automatically when the user goes home, intelligence robot of sweeping the floor opens the function of sweeping etc. automatically when unmanned when home.
The control of the smart home is generally performed through related software on the mobile device of the user, for example, through an APP on a mobile phone, a connection is first established with each smart home, and after login through a password, the smart home can enter a control interface to perform operation. This kind of mode adopts traditional communication encryption mode, and all information are synchronous through the high in the clouds, to the intelligent household equipment of same model, have same certificate and public key, when the private key leaks, mean that all intelligent households of same model can both be broken the unblock, and the security is not enough, especially intelligent door lock equipment, to the indoor environment of same householder, the lock of the same model or producer of generally unified ordering, also in intelligent door lock equipment, there is great potential safety hazard in the equipment that the model is the same.
Disclosure of Invention
The invention provides an identity authentication method and system of an intelligent door lock, and aims to solve the problem that potential safety hazards are large due to the fact that existing intelligent door lock certificates are the same.
According to the embodiment of the application, an identity authentication method of an intelligent door lock is provided, which comprises the following steps:
step S1: acquiring zigbee door lock equipment which is pre-provided with an equipment ID, an equipment key and a physical address;
step S2: the zigbee door lock equipment generates a first random number, and registers in the gateway based on the equipment ID, the equipment key and the first random number;
step S3: the method comprises the steps that zigbee door lock equipment logs in a cloud end, and the cloud end decrypts the current zigbee door lock equipment based on an equipment key to obtain a first random number;
step S4: the cloud generates a second random number, generates a symmetric encryption key based on the first random number, the second random number and the equipment key, and feeds back the symmetric encryption key and the second random number to the gateway;
step S5: the zigbee door lock equipment decrypts a message returned by the gateway based on the equipment key to obtain a second random number, and generates the symmetric encryption key according to the first random number, the second random number and the equipment key;
step S6: the zigbee door lock equipment is in information communication with the gateway, the information sending end symmetrically encrypts the information based on the symmetric encryption key, the information receiving end decrypts the information based on the symmetric encryption key, and if the decryption is successful, the identity authentication is passed.
Preferably, step S3 specifically includes:
step S31: the zigbee door lock device logs in the cloud through a symmetric encryption method based on the device ID and the device key;
step S32: the cloud end finds a corresponding device key according to the current device ID, and decrypts the device key to obtain a first random number.
Preferably, the symmetric encryption key is generated at the cloud end through a hash signature algorithm, and the symmetric encryption key is generated at the zigbee door lock device.
The invention also provides an identity authentication system of the intelligent door lock, which comprises:
the equipment configuration unit is used for acquiring zigbee door lock equipment which is pre-manufactured with an equipment ID, an equipment key and a physical address;
the gateway registration unit is used for generating a first random number by the zigbee door lock equipment and registering in the gateway based on the equipment ID, the equipment key and the first random number;
the cloud login unit is used for logging in a cloud by the zigbee door lock equipment, and the cloud decrypts the current zigbee door lock equipment based on the equipment key to obtain a first random number;
the first key generation unit is used for generating a second random number at the cloud end, generating a symmetric encryption key based on the first random number, the second random number and the equipment key, and feeding the symmetric encryption key back to the gateway;
the second key generation unit is used for decrypting a message returned by the gateway by the zigbee door lock equipment based on the equipment key to obtain a second random number, and generating the symmetric encryption key according to the first random number, the second random number and the equipment key;
and the key matching unit is used for carrying out information communication between the zigbee door lock equipment and the gateway, the information sending end carries out symmetric encryption on the information based on the symmetric encryption key, the information receiving end carries out decryption on the information based on the symmetric encryption key, and the successful decryption indicates that the identity authentication is passed.
Compared with the prior art, the identity authentication method and the identity authentication system for the intelligent door lock have the following beneficial effects that:
the intelligent door lock device has the advantages that one machine and one secret key are realized, the secret keys of the zigbee door lock devices of the same model or the same batch can be distinguished and independently managed, so that when the secret key of one zigbee door lock device leaks, the normal use of other zigbee door lock devices cannot be influenced, and the safety of the intelligent door lock device is improved. Meanwhile, multiple types of keys of the equipment are avoided by generating random numbers to obtain the symmetric encryption keys, so that the keys of the zigbee door lock equipment can be uniformly managed, further, the identity is verified through the symmetric encryption keys negotiated when the zigbee door lock equipment accesses the network, the identity verification performance is improved, and the time delay is reduced.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a flowchart of an identity authentication method for an intelligent door lock according to a first embodiment of the present invention.
Fig. 2 is a flowchart of step S3 in the method for authenticating an identity of an intelligent door lock according to a first embodiment of the present invention.
Fig. 3 is a block diagram of an identity authentication system of an intelligent door lock according to a second embodiment of the present invention.
Description of reference numerals:
1. a device configuration unit; 2. a gateway registration unit; 3. a cloud login unit; 4. a first key generation unit; 5. a second key generation unit; 6. and a key matching unit.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
Referring to fig. 1, the invention discloses an identity authentication method of an intelligent door lock, comprising the following steps:
step S1: acquiring zigbee door lock equipment which is pre-manufactured with an equipment ID, an equipment key and a physical address;
step S2: the zigbee door lock equipment generates a first random number, and registers in the gateway based on the equipment ID, the equipment key and the first random number;
step S3: the method comprises the steps that zigbee door lock equipment logs in a cloud end, and the cloud end decrypts the current zigbee door lock equipment based on an equipment key to obtain a first random number;
step S4: the cloud generates a second random number, generates a symmetric encryption key based on the first random number, the second random number and the equipment key, and feeds back the symmetric encryption key and the second random number to the gateway;
step S5: the zigbee door lock equipment decrypts a message returned by the gateway based on the equipment key to obtain a second random number, and generates the symmetric encryption key according to the first random number, the second random number and the equipment key;
step S6: the zigbee door lock equipment is in information communication with the gateway, the information sending end symmetrically encrypts the information based on the symmetric encryption key, the information receiving end decrypts the information based on the symmetric encryption key, and if the decryption is successful, the identity authentication is passed.
It is understood that in step S1, the zigbee door lock device is manufactured, i.e. pre-manufactured with a unique device ID, a unique device key, and a unique physical address, and each smart door lock device manufactured in the same batch under the same brand has a device ID, a device key, and a physical address independently.
It is understood that, in step S2, when the zigbee door lock device enters the gateway for registration, a first random number RA is automatically generated, and the device registration is performed in the gateway based on the device ID and the device key of the device itself.
It can be understood that, in step S3, after the registration is completed, the cloud performs the device login operation on the corresponding cloud again through the device ID and the device key, and after the cloud logs in the device, the cloud decrypts the device key of the current login device to obtain the first random number corresponding to the device key.
It can be understood that, in step S4, after obtaining the first random number by parsing, the cloud generates a second random number RB for the current zigbee door lock device, generates a symmetric encryption key by using a hash signature algorithm according to the first random number RA, the second random number RB, and 3 pieces of information of the device key in total, and feeds back the symmetric encryption key to the gateway.
It is to be understood that, in step S5, the zigbee door lock device is also parsed to obtain a second random number, and the second symmetric encryption key is generated by using the hash signature algorithm to perform a total of 3 pieces of information including the first random number RA, the second random number RB, and the device key.
It can be understood that, in step S6, the control request is encrypted by the symmetric encryption key, and the gateway decrypts the control request based on the symmetric encryption key previously stored in the cloud, and when the decryption succeeds, the authentication succeeds. In this embodiment, when the same (non-same type or same batch) zigbee door lock device is used, the device key and the device ID are not changed, the device key is the same, and the generated symmetric encryption key is the same, so that decryption is successful, and the symmetric encryption key is a communication encryption means for encrypting communication information between the smart home and the user mobile terminal, and has a unique encryption mode, so that one device and one secret are realized.
Referring to fig. 2, step S3 specifically includes:
step S31: the zigbee door lock device logs in the cloud through a symmetric encryption method based on the device ID and the device key;
step S32: the cloud end finds a corresponding device key according to the current device ID, and decrypts the device key to obtain a first random number.
It is understood that in step S32, the device key is decrypted to obtain the first random number corresponding to the device key.
Referring to fig. 3, a second embodiment of the present invention provides an identity authentication system for an intelligent door lock, which adopts the identity authentication method for an intelligent door lock provided in the first embodiment, and the system mainly includes:
a device configuration unit 1, configured to implement step S1 described above, configured to obtain a zigbee door lock device, where the zigbee door lock device is pre-manufactured with a device ID, a device key, and a physical address;
a gateway registration unit 2, configured to implement step S2, where the zigbee door lock device generates a first random number, and registers in the gateway based on the device ID, the device key, and the first random number;
the cloud login unit 3 is configured to implement the step S3, and is configured to log in the cloud by the zigbee door lock device, and the cloud decrypts the current zigbee door lock device based on the device key to obtain the first random number;
the first key generation unit 4 is configured to implement the step S4, and is configured to generate a second random number at the cloud, generate a symmetric encryption key based on the first random number, the second random number, and the device key, and feed back the symmetric encryption key to the gateway;
a second key generating unit 5, configured to implement step S5 described above, configured to decrypt, by the zigbee door lock device, the message returned by the gateway based on the device key to obtain a second random number, and generate the symmetric encryption key according to the first random number, the second random number, and the device key;
and a key matching unit 6, configured to implement step S6 described above, configured to perform information communication between the zigbee door lock device and the gateway, where the information sending end performs symmetric encryption on information based on the symmetric encryption key, the information receiving end decrypts the information based on the symmetric encryption key, and if the decryption is successful, it indicates that the identity authentication passes.
Compared with the prior art, the identity authentication method and the identity authentication system for the intelligent door lock have the following beneficial effects that:
the intelligent door lock device has the advantages that one machine and one secret key are realized, the secret keys of the zigbee door lock devices of the same model or the same batch can be distinguished and independently managed, so that when the secret key of one zigbee door lock device leaks, the normal use of other zigbee door lock devices cannot be influenced, and the safety of the intelligent door lock device is improved. Meanwhile, multiple types of keys of the equipment are avoided by generating random numbers to obtain the symmetric encryption keys, so that the keys of the zigbee door lock equipment can be uniformly managed, further, the identity is verified through the symmetric encryption keys negotiated when the zigbee door lock equipment accesses the network, the identity verification performance is improved, and the time delay is reduced.
While the invention has been described with reference to specific embodiments, the invention is not limited thereto, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (4)

1. An identity authentication method of an intelligent door lock is characterized by comprising the following steps:
step S1: acquiring zigbee door lock equipment which is pre-manufactured with an equipment ID, an equipment key and a physical address;
step S2: the zigbee door lock equipment generates a first random number, and registers in the gateway based on the equipment ID, the equipment key and the first random number;
step S3: the method comprises the steps that zigbee door lock equipment logs in a cloud end, and the cloud end decrypts the current zigbee door lock equipment based on an equipment key to obtain a first random number;
step S4: the cloud generates a second random number, generates a symmetric encryption key based on the first random number, the second random number and the equipment key, and feeds back the symmetric encryption key and the second random number to the gateway;
step S5: the zigbee door lock equipment decrypts a message returned by the gateway based on the equipment key to obtain a second random number, and generates the symmetric encryption key according to the first random number, the second random number and the equipment key;
step S6: the zigbee door lock equipment is in information communication with the gateway, the information sending end symmetrically encrypts the information based on the symmetric encryption key, the information receiving end decrypts the information based on the symmetric encryption key, and if the decryption is successful, the identity authentication is passed.
2. The identity authentication method of the intelligent door lock according to claim 1, wherein: step S3 specifically includes:
step S31: the zigbee door lock device logs in the cloud through a symmetric encryption method based on the device ID and the device key;
step S32: the cloud end finds a corresponding device key according to the current device ID, and decrypts the device key to obtain a first random number.
3. The identity authentication method of the intelligent door lock according to claim 1, wherein: and generating a symmetric encryption key at the cloud end through a Hash signature algorithm, and generating the symmetric encryption key at the zigbee door lock equipment.
4. The utility model provides an identity authentication system of intelligence lock which characterized in that: the method comprises the following steps:
the equipment configuration unit is used for acquiring zigbee door lock equipment which is pre-manufactured with an equipment ID, an equipment key and a physical address;
the gateway registration unit is used for generating a first random number by the zigbee door lock equipment and registering in the gateway based on the equipment ID, the equipment key and the first random number;
the cloud login unit is used for logging in a cloud by the zigbee door lock equipment, and the cloud decrypts the current zigbee door lock equipment based on the equipment key to obtain a first random number;
the first key generation unit is used for generating a second random number at the cloud end, generating a symmetric encryption key based on the first random number, the second random number and the equipment key, and feeding the symmetric encryption key back to the gateway;
the second key generation unit is used for decrypting a message returned by the gateway by the zigbee door lock equipment based on the equipment key to obtain a second random number, and generating the symmetric encryption key according to the first random number, the second random number and the equipment key;
and the key matching unit is used for carrying out information communication between the zigbee door lock equipment and the gateway, the information sending end carries out symmetric encryption on the information based on the symmetric encryption key, the information receiving end carries out decryption on the information based on the symmetric encryption key, and the successful decryption indicates that the identity authentication is passed.
CN202210372322.3A 2022-04-08 2022-04-08 Identity authentication method and system of intelligent door lock Pending CN114882620A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210372322.3A CN114882620A (en) 2022-04-08 2022-04-08 Identity authentication method and system of intelligent door lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210372322.3A CN114882620A (en) 2022-04-08 2022-04-08 Identity authentication method and system of intelligent door lock

Publications (1)

Publication Number Publication Date
CN114882620A true CN114882620A (en) 2022-08-09

Family

ID=82669973

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210372322.3A Pending CN114882620A (en) 2022-04-08 2022-04-08 Identity authentication method and system of intelligent door lock

Country Status (1)

Country Link
CN (1) CN114882620A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202856773U (en) * 2012-09-20 2013-04-03 珠海优特电力科技股份有限公司 Gateway controller for smart home and smart home anti-theft system
CN106228642A (en) * 2016-07-15 2016-12-14 颜芳俊 A kind of intelligent door lock system and control method thereof
CN109544747A (en) * 2018-11-20 2019-03-29 北京千丁互联科技有限公司 Encryption key update method, system and the computer storage medium of intelligent door lock
CN111882704A (en) * 2020-07-10 2020-11-03 安安(深圳)智能电子有限公司 Control method of intelligent door lock system and intelligent door lock management system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202856773U (en) * 2012-09-20 2013-04-03 珠海优特电力科技股份有限公司 Gateway controller for smart home and smart home anti-theft system
CN106228642A (en) * 2016-07-15 2016-12-14 颜芳俊 A kind of intelligent door lock system and control method thereof
CN109544747A (en) * 2018-11-20 2019-03-29 北京千丁互联科技有限公司 Encryption key update method, system and the computer storage medium of intelligent door lock
CN111882704A (en) * 2020-07-10 2020-11-03 安安(深圳)智能电子有限公司 Control method of intelligent door lock system and intelligent door lock management system

Similar Documents

Publication Publication Date Title
CN108512846B (en) Bidirectional authentication method and device between terminal and server
CN105577680B (en) Key generation method, encrypted data analysis method, device and key management center
CN105376216B (en) A kind of remote access method, proxy server and client
CN101286843B (en) Single-point login method under point-to-point model
CN110267270B (en) Identity authentication method for sensor terminal access edge gateway in transformer substation
CN109495274A (en) A kind of decentralization smart lock electron key distribution method and system
CN110247803B (en) Protocol optimization architecture and method for network management protocol SNMPv3
CN112134849B (en) Dynamic trusted encryption communication method and system for intelligent substation
CN113630407A (en) Method and system for enhancing transmission security of MQTT protocol by using symmetric cryptographic technology
CN112804356B (en) Block chain-based networking equipment supervision authentication method and system
CN109962781B (en) Digital certificate distributing device
KR101481403B1 (en) Data certification and acquisition method for vehicle
CN108259486B (en) End-to-end key exchange method based on certificate
CN110716441A (en) Method for controlling intelligent equipment, intelligent home system, equipment and medium
KR100892616B1 (en) Method For Joining New Device In Wireless Sensor Network
CN113163375B (en) Air certificate issuing method and system based on NB-IoT communication module
CN114070579A (en) Industrial control service authentication method and system based on quantum key
CN111064752B (en) Preset secret key sharing system and method based on public network
CN111489462B (en) Personal Bluetooth key system
CN111563980B (en) Bluetooth lock key generation and authentication method
CN107682380B (en) Cross authentication method and device
CN107733929B (en) Authentication method and authentication system
CN114882620A (en) Identity authentication method and system of intelligent door lock
CN111489461B (en) Bluetooth key system for group
CN114513361A (en) Power distribution Internet of things based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination