CN114944025A - Method and system for realizing flexible networking of furniture lock Bluetooth - Google Patents

Method and system for realizing flexible networking of furniture lock Bluetooth Download PDF

Info

Publication number
CN114944025A
CN114944025A CN202210435615.1A CN202210435615A CN114944025A CN 114944025 A CN114944025 A CN 114944025A CN 202210435615 A CN202210435615 A CN 202210435615A CN 114944025 A CN114944025 A CN 114944025A
Authority
CN
China
Prior art keywords
host
key
furniture lock
bluetooth
furniture
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210435615.1A
Other languages
Chinese (zh)
Inventor
蔡晓绪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Magic Information Technology Co ltd
Original Assignee
Shenzhen Magic Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Magic Information Technology Co ltd filed Critical Shenzhen Magic Information Technology Co ltd
Priority to CN202210435615.1A priority Critical patent/CN114944025A/en
Publication of CN114944025A publication Critical patent/CN114944025A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention provides a method and a system for realizing flexible networking of a furniture lock Bluetooth, which relate to the technical field of locks and comprise the following steps: s1, the host provided with the Bluetooth sends a binding command key to the furniture lock provided with the Bluetooth through a Bluetooth Mesh network, and the furniture lock receives the binding command key of the host and completes the binding with the host; s2, the host sends an unlocking command key to the furniture lock, the furniture lock receives the unlocking command key of the host and unlocks, the host and the furniture lock are connected through Bluetooth, the furniture lock adopts a Bluetooth Mesh distributed networking technology, new furniture locks can be added at any time, the number of the furniture locks can reach hundreds, and the number of the furniture locks capable of being networked is increased.

Description

Method and system for realizing flexible networking of furniture lock Bluetooth
Technical Field
The invention relates to the technical field of locks, in particular to a method and a system for realizing flexible networking of a furniture lock Bluetooth.
Background
In the traditional Bluetooth equipment, a single Bluetooth host can only control one or more pieces of Bluetooth equipment at the same time, and if the Bluetooth host wants to control a plurality of pieces of equipment at the same time, the equipment and the equipment are required to be kept in a connectable range, so that the traditional Bluetooth equipment is not convenient and quick to use, and when the Bluetooth is applied to furniture locks, the number of the furniture locks which can be networked is limited, and the use requirement cannot be met; meanwhile, even if the common intelligent furniture lock has a Bluetooth function, a fingerprint sensor or a numeric keyboard is usually required to be independently arranged on each lock, when a plurality of pieces of furniture need to be installed, the fact that each piece of furniture needs an independent set of fingerprint sensor or numeric keyboard is required, the cost is relatively high, each lock needs to be independently provided with a fingerprint or a numeric password, and the installation and the use are relatively complicated;
disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a method and a system for realizing flexible networking of furniture lock Bluetooth, so as to solve the technical problems.
The technical scheme adopted by the invention for solving the technical problems is as follows: a method for realizing flexible networking of furniture lock Bluetooth is improved in that: the method comprises the following steps: s1, the host provided with the Bluetooth sends a binding command key to the furniture lock provided with the Bluetooth through a Bluetooth Mesh network, and the furniture lock receives the binding command key of the host and completes the binding with the host; s2, the host sends an unlocking command key to the furniture lock, and the furniture lock receives the unlocking command key of the host and unlocks.
In the above method, the step S1 includes the following steps:
s11, the HOST uses the random number generator to generate the HOST root key, the HOST root key includes three parts of packet head, data and check, and is stored in the group HOST [20 ];
s12, the HOST computer communicates with the furniture lock through the Bluetooth Mesh network, the data part of the HOST computer root key stored in HOST [20] is processed with XOR operation with the serial number of the furniture lock, SLAVE [20] is generated to be used as the root key of the furniture lock, the root key SLAVE [20] is stored in the HOST computer and the furniture lock, and the binding is completed.
In the above method, the step S2 includes the following steps:
s21, inputting a furniture lock number on the host, after the fingerprint unlocking is successful, the host sends a plaintext KEY KEY [20] to the furniture lock through the Bluetooth Mesh network, and the furniture lock stores the plaintext KEY KEY [20] after receiving the plaintext KEY;
s22, the host carries out XOR operation on the plaintext KEY KEY [20] and the root KEY SLAVE [20] to obtain a KEY TKEY [20] of the communication;
s23, carrying out AES encryption on the unlocking command OPEN [20] through a secret KEY TKEY [20], generating an encrypted unlocking command OPEN _ KEY [20], and sending the encrypted unlocking command OPEN _ KEY [20] to the furniture lock;
s24, the furniture lock carries out XOR operation on the stored plaintext KEY KEY [20] and the root KEY SLAVE [20] to obtain a KEY TKEY [20 ];
s25, the received encrypted unlocking command OPEN _ KEY [20] is subjected to AES decryption by using the secret KEY TKEY [20] to obtain the unlocking command OPEN [20], the content of the unlocking command OPEN [20] is judged to be legal data, unlocking is carried out, and if the content of the unlocking command OPEN [20] is illegal data, unlocking is not carried out.
The invention also provides a system for realizing the Bluetooth flexible networking of the furniture lock, which comprises a host provided with the Bluetooth and the furniture lock provided with the Bluetooth, wherein the host and the furniture lock are in communication connection through the Bluetooth Mesh networking;
the host is used for sending a binding command key to the furniture lock and sending an unlocking command key to the furniture lock;
the furniture lock is used for receiving the binding command key of the host and completing the binding with the host, and is used for receiving the unlocking command key of the host and unlocking.
In the system, the binding command key sent by the HOST is a HOST root key generated by using a random number generator, and the HOST root key comprises a packet header, data and a check part and is stored in a plurality of HOST [20 ];
the data part of HOST root key stored in HOST [20] is XOR-operated with the number of furniture lock, SLAVE [20] is generated as the root key of furniture lock, and the root key SLAVE [20] is stored in HOST and furniture lock.
The invention has the beneficial effects that: the connection between the host and the furniture locks is realized through Bluetooth, the furniture locks adopt a Bluetooth Mesh distributed networking technology, new furniture locks can be added at any time, the number of the furniture locks can reach hundreds, and the number of the furniture locks which can be networked is increased; any two devices in the Bluetooth network are in a connectable range, and the host can control any furniture lock, so that the limitation on distance requirements is reduced, and the flexibility of installation positions is improved; meanwhile, only a fingerprint sensor or a numeric keyboard is required to be installed on the host, a number is added when each furniture lock is networked, the host successfully identifies the identity by inputting the number, the furniture lock corresponding to the number can be unlocked, the installation of the fingerprint sensor or the numeric keyboard on each furniture lock is avoided, the miniaturization of the furniture lock is realized, the installation mode of opening holes is supported, the price of the furniture lock is favorably reduced, and the convenience for installing the furniture lock is improved.
Drawings
Fig. 1 is a flow chart of a method for realizing flexible bluetooth networking of a furniture lock according to the invention.
Detailed Description
The invention is further illustrated with reference to the following figures and examples.
The conception, the specific structure, and the technical effects produced by the present invention will be clearly and completely described below in conjunction with the embodiments and the accompanying drawings to fully understand the objects, the features, and the effects of the present invention. It is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments, and those skilled in the art can obtain other embodiments without inventive effort based on the embodiments of the present invention, and all embodiments are within the protection scope of the present invention. In addition, all the connection relations related in the patent do not mean that the components are directly connected, but mean that a better connection structure can be formed by adding or reducing connection auxiliary components according to specific implementation conditions. All technical characteristics in the invention can be interactively combined on the premise of not conflicting with each other.
Referring to fig. 1, a method for implementing flexible bluetooth networking of a furniture lock includes the following steps:
s1, the host provided with the Bluetooth sends a binding command key to the furniture lock provided with the Bluetooth through a Bluetooth Mesh network, and the furniture lock receives the binding command key of the host and completes the binding with the host;
specifically, step S1 includes the following steps:
s11, the HOST uses the random number generator to generate the HOST root key, the HOST root key includes three parts of packet head, data and check, and is stored in the group HOST [20 ];
s12, the HOST computer communicates with the furniture lock through the Bluetooth Mesh network, when the furniture lock with the number 001 is bound with the HOST computer, the data part of the HOST computer root key stored in HOST [20] and the number 001 of the furniture lock are subjected to XOR operation to generate SLAVE [20] as the root key of the furniture lock 001, the root key SLAVE [20] is stored in the HOST computer and the furniture lock, and the binding of the furniture lock with the number 001 and the HOST computer is completed.
S2, the host sends an unlocking command key to the furniture lock, and the furniture lock receives the unlocking command key of the host and unlocks;
the step S2 includes the following steps:
s21, inputting a furniture lock number on a host, for example, if the number of a furniture lock to be unlocked is 001, inputting the number 001 on the host, arranging a fingerprint sensor or a numeric keyboard on the host, after the host successfully unlocks by using a fingerprint or a password, the host sends a plaintext KEY KEY [20] to the furniture lock through a Bluetooth Mesh network, and the plaintext KEY KEY [20] is stored after the furniture lock receives the plaintext KEY KEY [20 ];
s22, the host carries out XOR operation on the plaintext KEY KEY [20] and the root KEY SLAVE [20] to obtain a KEY TKEY [20] of the communication;
s23, the host machine carries out AES encryption on the unlocking command OPEN [20] through the secret KEY TKEY [20] to generate an encrypted unlocking command OPEN _ KEY [20], and the encrypted unlocking command OPEN _ KEY [20] is sent to the furniture lock;
s24, the furniture lock carries out XOR operation on the stored plaintext KEY KEY [20] and the root KEY SLAVE [20] to obtain a KEY TKEY [20 ];
s25, the furniture lock uses the KEY TKEY [20] to conduct AES decryption on the received encrypted unlocking command OPEN _ KEY [20] to obtain the unlocking command OPEN [20], and unlocking is conducted if the content of the unlocking command OPEN [20] is judged to be legal data, and unlocking is not conducted if the content of the unlocking command OPEN [20] is illegal data. After the unlocking is finished, after a period of time, such as 10 seconds, the furniture lock can be automatically locked and enters a dormant state, if the lock with the number 001 needs to be unlocked again, the host can regenerate a new plaintext KEY KEY [20] and repeat the process, so that the unlocking command KEYs are different when the lock is unlocked every time, illegal attacks can be effectively prevented, and the system safety is improved.
In this example, HOST [20] ═ 55, AA, C1,66,0C,4F,32,4E,5E, D3, B7, C2,5D, D0,06,87,04, CE,08,37 }; the data part of HOST [20] is subjected to exclusive-or operation with the number 001 of the furniture lock by each byte, and SLAVE [20] with the number 001 is obtained, wherein the SLAVE [20] is {55, AA, C0,67,0D,4E,33,4F,5F, D2, B6, C3,5C, D1,07,86,05, CF,08,3B }; the host enters the furniture lock number 001 and sends a plaintext KEY [20] {55, AA,13, CA,29,77,03, CF,9A,3A, DD, B7, B9,47, a7,53,7F,57,08,86}, where the data portion is also random number generated. The data part of the plaintext KEY [20] and the root KEY SLAVE [20] is subjected to bitwise exclusive-or operation to obtain a KEY TKEY [20] {55, AA, D3, AD,24,39,30,80, C5, E8,6B,74, E5,96, a0, D5,7A,98,0A,1A }; an unlocking command OPEN [20] {55, BB,55,00,01,00,01,00, 00,0A,00,00,00,00,00, 02,2C }; the data part of the OPEN [20] is used as a plaintext, the data part of the TKEY [20] is used as a password, and the data part is encrypted by using AES-128bits/ECB mode/no padding to obtain an encrypted unlocking command OPEN _ KEY [20] {55, AA, FC,8B,07,22, a0,5C,34,74, E7,2C,28, D0,8D,8F,5C,77,08,4D }.
The furniture lock obtains TKEY [20] through the same process calculation, the encrypted unlocking command OPEN _ KEY [20] is subjected to AES-128bits/ECB mode/no padding decryption, reverse calculation is carried out, the unlocking command OPEN [20] is obtained, the first two bytes of the data part of the OPEN [20] are fixed BB, 55', the third and fourth bytes of 00,01 are command types, the fifth and sixth bytes of 00,01 are house lock numbers, the seventh and eighth bytes of 00,0A are unlocking commands, any byte in the data part of the unlocking command OPEN [20] is not matched, the command is an illegal command, and unlocking cannot be achieved.
When the host is bound with the furniture lock, all fingerprint and password users can unlock the furniture lock in the menu, or only specific fingerprint registered users or password registered users can unlock the furniture lock, so that the management of the furniture lock is facilitated, and meanwhile, the function of protecting the specific users can be played, for example, children are limited to unlock certain furniture locks only. And management can be distinguished according to the distribution condition of workers in the working occasion, and part of workers can only open part of furniture locks, so that the individual requirements of users are met.
Furthermore, the host can also bind with the mobile phone by sending the secret key to the mobile phone with the Bluetooth function, so that the unlocking and locking of the furniture lock can be controlled by the mobile phone. The mobile phone is used for controlling the furniture lock, the mobile phone and the host need to be bound firstly, and the binding flow of the mobile phone and the host is basically consistent with the binding flow of the furniture lock and the host. The HOST computer communicates with the mobile phone through a Bluetooth Mesh network, firstly, the fingerprint or password of an administrator is verified on the HOST computer to enter a management menu, the mobile phone binding is selected, at the moment, the HOST computer carries out XOR operation on HOST [20] and the mobile phone with the number of 241 to obtain MSLAVE [20] as a root key of the mobile phone with the number of 241, the HOST computer stores the MSLAVE [20], meanwhile, the MSLAVE [20] is sent to the mobile phone, the mobile phone end stores the MSLAVE [20] as the root key of subsequent communication, the root key MSLAVE [20] is stored in the HOST computer and the mobile phone, and the binding between the mobile phone with the number of 241 and the HOST computer is completed.
When the mobile phone is used for unlocking, the host firstly sends the KEY [20] as a plaintext secret KEY for communication to the mobile phone, and the mobile phone and the host carry out XOR operation on the plaintext secret KEY KEY [20] and the root secret KEY MSLAVE [20] to obtain a secret KEY TKEY [20] for the communication. The mobile phone carries out AES encryption on the unlocking command OPEN [20] through the secret KEY TKEY [20], generates an encrypted unlocking command OPEN _ KEY [20], and sends the encrypted unlocking command OPEN _ KEY [20] to the host. The host machine carries out AES decryption on the received encrypted unlocking command OPEN _ KEY [20] by using the secret KEY TKEY [20] to obtain the unlocking command OPEN [20], and if the content of the OPEN [20] is judged to be legal data, the host machine can initiate communication with the furniture lock to OPEN the corresponding furniture lock; if the data is illegal, the host machine cannot open the furniture lock. The data operation method is the same as that of the host and the furniture lock.
The invention also provides a system for realizing the Bluetooth flexible networking of the furniture lock, which comprises a host provided with the Bluetooth and the furniture lock provided with the Bluetooth, wherein the host and the furniture lock are in communication connection through the Bluetooth Mesh networking;
the host is used for sending a binding command key to the furniture lock and sending an unlocking command key to the furniture lock;
the furniture lock is used for receiving the binding command key of the host and completing the binding with the host, and is used for receiving the unlocking command key of the host and unlocking.
Furthermore, the invention relates to a system for realizing flexible networking of furniture lock Bluetooth, wherein a binding command key sent by a HOST is a HOST root key generated by using a random number generator, and the HOST root key comprises three parts of a packet header, data and verification and is stored in a group HOST [20 ]; the data part of HOST root key stored in HOST [20] and the serial number of furniture lock are processed with XOR operation to generate SLAVE [20] as the root key of furniture lock, the root key SLAVE [20] is stored in HOST and furniture lock to make the HOST and furniture lock complete binding.
The invention realizes the connection between the host and the furniture lock through Bluetooth, the furniture lock adopts the Bluetooth Mesh distributed networking technology, new furniture locks can be added at any time, the number of the furniture locks can reach hundreds, and the number of the furniture locks which can be networked is increased; any two devices in the Bluetooth network are in a connectable range, and the host can control any furniture lock, so that the limitation on the distance requirement is reduced, and the flexibility of the installation position is improved; meanwhile, only a fingerprint sensor or a digital keyboard is required to be installed on the host, a serial number is added when each furniture lock is networked, the host successfully identifies the identity by inputting the serial number, the furniture lock with the corresponding serial number can be unlocked, the condition that the fingerprint sensor or the digital keyboard is installed on each furniture lock is avoided, the furniture lock is miniaturized, the installation mode without holes is supported, the price of the furniture lock is favorably reduced, and the convenience for installing the furniture lock is improved.
While the preferred embodiments of the present invention have been illustrated and described, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (5)

1. A method for realizing flexible networking of furniture lock Bluetooth is characterized in that: the method comprises the following steps:
s1, the host provided with the Bluetooth sends a binding command key to the furniture lock provided with the Bluetooth through a Bluetooth Mesh network, and the furniture lock receives the binding command key of the host and completes the binding with the host;
s2, the host sends an unlocking command key to the furniture lock, and the furniture lock receives the unlocking command key of the host and unlocks.
2. The method for realizing the Bluetooth flexible networking of the furniture lock according to claim 1, wherein the method comprises the following steps: the step S1 includes the following steps:
s11, the HOST uses the random number generator to generate the HOST root key, the HOST root key includes three parts of packet head, data and check, and is stored in the group HOST [20 ];
s12, the HOST computer communicates with the furniture lock through the Bluetooth Mesh network, the data part of the HOST computer root key stored in HOST [20] is processed with XOR operation with the serial number of the furniture lock, SLAVE [20] is generated to be used as the root key of the furniture lock, the root key SLAVE [20] is stored in the HOST computer and the furniture lock, and the binding is completed.
3. The method for realizing the Bluetooth flexible networking of the furniture lock as claimed in claim 2, wherein: the step S2 includes the following steps:
s21, inputting a furniture lock number on the host, after the fingerprint unlocking is successful, the host sends a plaintext KEY KEY [20] to the furniture lock through the Bluetooth Mesh network, and the furniture lock stores the plaintext KEY KEY [20] after receiving the plaintext KEY;
s22, the host carries out XOR operation on the plaintext KEY KEY [20] and the root KEY SLAVE [20] to obtain a KEY TKEY [20] of the communication;
s23, carrying out AES encryption on the unlocking command OPEN [20] through a secret KEY TKEY [20], generating an encrypted unlocking command OPEN _ KEY [20], and sending the encrypted unlocking command OPEN _ KEY [20] to the furniture lock;
s24, the furniture lock carries out XOR operation on the stored plaintext KEY KEY [20] and the root KEY SLAVE [20] to obtain a KEY TKEY [20 ];
s25, the received encrypted unlocking command OPEN _ KEY [20] is subjected to AES decryption by using the secret KEY TKEY [20] to obtain the unlocking command OPEN [20], the content of the unlocking command OPEN [20] is judged to be legal data, unlocking is carried out, and if the content of the unlocking command OPEN [20] is illegal data, unlocking is not carried out.
4. The utility model provides a realize nimble network deployment of furniture lock bluetooth which characterized in that: the Bluetooth furniture lock comprises a host provided with Bluetooth and a furniture lock provided with Bluetooth, wherein the host and the furniture lock are in communication connection through a Bluetooth Mesh network;
the host is used for sending a binding command key to the furniture lock and sending an unlocking command key to the furniture lock;
the furniture lock is used for receiving the binding command key of the host and completing the binding with the host, and is used for receiving the unlocking command key of the host and unlocking.
5. The system for realizing Bluetooth flexible networking of furniture locks according to claim 4, wherein: the binding command key sent by the HOST is a HOST root key generated by using a random number generator, and the HOST root key comprises a packet header, data and a verification part and is stored in a plurality of HOST [20 ];
the data part of HOST root key stored in HOST [20] is processed with XOR operation with the serial number of furniture lock, SLAVE [20] is generated as the root key of furniture lock, and the root key SLAVE [20] is stored in HOST and furniture lock.
CN202210435615.1A 2022-04-24 2022-04-24 Method and system for realizing flexible networking of furniture lock Bluetooth Pending CN114944025A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210435615.1A CN114944025A (en) 2022-04-24 2022-04-24 Method and system for realizing flexible networking of furniture lock Bluetooth

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210435615.1A CN114944025A (en) 2022-04-24 2022-04-24 Method and system for realizing flexible networking of furniture lock Bluetooth

Publications (1)

Publication Number Publication Date
CN114944025A true CN114944025A (en) 2022-08-26

Family

ID=82906609

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210435615.1A Pending CN114944025A (en) 2022-04-24 2022-04-24 Method and system for realizing flexible networking of furniture lock Bluetooth

Country Status (1)

Country Link
CN (1) CN114944025A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105184931A (en) * 2015-09-30 2015-12-23 上海艾迅士建筑科技有限公司 Bluetooth-based unlocking method, system and hand-held terminal and Bluetooth-based electronic lock
CN107393069A (en) * 2017-07-17 2017-11-24 曹迪 Access control management method and system based on bluetooth MESH networking core technologies
CN107575094A (en) * 2017-10-27 2018-01-12 杭州圣联科技有限公司 A kind of blue-tooth intelligence lock system and its control method
CN109714741A (en) * 2019-01-10 2019-05-03 常州科新永安电子锁有限公司 Bluetooth repeaters, smart lock, intelligent lock system and network-building method
CN109785482A (en) * 2018-12-27 2019-05-21 浙江金华凯宇电子科技有限公司 A kind of smart lock based on bluetooth mesh technology
CN214901321U (en) * 2021-06-03 2021-11-26 常州科新永安电子锁有限公司 Lock networking system based on Bluetooth router and lock networking system applied to hotel

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105184931A (en) * 2015-09-30 2015-12-23 上海艾迅士建筑科技有限公司 Bluetooth-based unlocking method, system and hand-held terminal and Bluetooth-based electronic lock
CN107393069A (en) * 2017-07-17 2017-11-24 曹迪 Access control management method and system based on bluetooth MESH networking core technologies
CN107575094A (en) * 2017-10-27 2018-01-12 杭州圣联科技有限公司 A kind of blue-tooth intelligence lock system and its control method
CN109785482A (en) * 2018-12-27 2019-05-21 浙江金华凯宇电子科技有限公司 A kind of smart lock based on bluetooth mesh technology
CN109714741A (en) * 2019-01-10 2019-05-03 常州科新永安电子锁有限公司 Bluetooth repeaters, smart lock, intelligent lock system and network-building method
CN214901321U (en) * 2021-06-03 2021-11-26 常州科新永安电子锁有限公司 Lock networking system based on Bluetooth router and lock networking system applied to hotel

Similar Documents

Publication Publication Date Title
WO2018177188A1 (en) Secure communication method based on smart door lock system and smart door lock system thereof
CN100581102C (en) Data safety transmission method for wireless sensor network
Asokan et al. Man-in-the-middle in tunnelled authentication protocols
CN102546155B (en) On-demand safe key generates method and system
CA1249865A (en) Method for establishing user authentication with composite session keys among cryptographically communicating nodes
CN100583758C (en) Identification method
CN108055235A (en) A kind of control method of smart lock, relevant device and system
CN108171831B (en) Bidirectional security authentication method based on NFC mobile phone and intelligent lock
Granzer et al. Security in networked building automation systems
CN107196920B (en) A kind of key generation distribution method towards wireless communication system
CN110753344B (en) NB-IoT-based smart meter secure access system
CN111243133A (en) Bluetooth door lock system based on dynamic password generation and matching and unlocking method
CN101602358A (en) A kind of engine anti-theft authentication method based on the AES128 cryptographic algorithm
CN102936980A (en) Method and device for controlling electronic lock
Lounis et al. Bluetooth low energy makes “just works” not work
CN107154847A (en) Towards the method for generating cipher code, verification method and its smart machine of offline environment
CN109300201A (en) A kind of intelligent and safe lock and its encryption system and encryption method
CN111447053A (en) Data secure transmission method and system based on chaotic logic mapping and RC4 stream cipher
CN108989309A (en) Encryption communication method and its encrypted communication device based on narrowband Internet of Things
CN107864124A (en) A kind of end message method for security protection, terminal and bluetooth lock
CN110992532A (en) Temporary authorized unlocking method and system for intelligent door lock
CN108447149A (en) A kind of unlocking method and device in shared house
CN114944025A (en) Method and system for realizing flexible networking of furniture lock Bluetooth
WO2003077581A1 (en) Security protection for data communication
CN111563980B (en) Bluetooth lock key generation and authentication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination