CN114944025A - Method and system for realizing flexible networking of furniture lock Bluetooth - Google Patents
Method and system for realizing flexible networking of furniture lock Bluetooth Download PDFInfo
- Publication number
- CN114944025A CN114944025A CN202210435615.1A CN202210435615A CN114944025A CN 114944025 A CN114944025 A CN 114944025A CN 202210435615 A CN202210435615 A CN 202210435615A CN 114944025 A CN114944025 A CN 114944025A
- Authority
- CN
- China
- Prior art keywords
- host
- key
- furniture lock
- bluetooth
- furniture
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000006855 networking Effects 0.000 title claims abstract description 20
- 238000000034 method Methods 0.000 title claims abstract description 19
- NBFASNUBTMTAFQ-UHFFFAOYSA-N N-[3-(5-chloro-2-methoxyphenyl)-1-methylpyrazol-4-yl]-1H-pyrazolo[4,3-c]pyridine-7-carboxamide Chemical compound ClC=1C=CC(=C(C=1)C1=NN(C=C1NC(=O)C=1C2=C(C=NC=1)C=NN2)C)OC NBFASNUBTMTAFQ-UHFFFAOYSA-N 0.000 claims description 20
- 238000004891 communication Methods 0.000 claims description 10
- 238000012795 verification Methods 0.000 claims description 2
- 238000005516 engineering process Methods 0.000 abstract description 3
- 238000009434 installation Methods 0.000 description 6
- 230000000694 effects Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Abstract
The invention provides a method and a system for realizing flexible networking of a furniture lock Bluetooth, which relate to the technical field of locks and comprise the following steps: s1, the host provided with the Bluetooth sends a binding command key to the furniture lock provided with the Bluetooth through a Bluetooth Mesh network, and the furniture lock receives the binding command key of the host and completes the binding with the host; s2, the host sends an unlocking command key to the furniture lock, the furniture lock receives the unlocking command key of the host and unlocks, the host and the furniture lock are connected through Bluetooth, the furniture lock adopts a Bluetooth Mesh distributed networking technology, new furniture locks can be added at any time, the number of the furniture locks can reach hundreds, and the number of the furniture locks capable of being networked is increased.
Description
Technical Field
The invention relates to the technical field of locks, in particular to a method and a system for realizing flexible networking of a furniture lock Bluetooth.
Background
In the traditional Bluetooth equipment, a single Bluetooth host can only control one or more pieces of Bluetooth equipment at the same time, and if the Bluetooth host wants to control a plurality of pieces of equipment at the same time, the equipment and the equipment are required to be kept in a connectable range, so that the traditional Bluetooth equipment is not convenient and quick to use, and when the Bluetooth is applied to furniture locks, the number of the furniture locks which can be networked is limited, and the use requirement cannot be met; meanwhile, even if the common intelligent furniture lock has a Bluetooth function, a fingerprint sensor or a numeric keyboard is usually required to be independently arranged on each lock, when a plurality of pieces of furniture need to be installed, the fact that each piece of furniture needs an independent set of fingerprint sensor or numeric keyboard is required, the cost is relatively high, each lock needs to be independently provided with a fingerprint or a numeric password, and the installation and the use are relatively complicated;
disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a method and a system for realizing flexible networking of furniture lock Bluetooth, so as to solve the technical problems.
The technical scheme adopted by the invention for solving the technical problems is as follows: a method for realizing flexible networking of furniture lock Bluetooth is improved in that: the method comprises the following steps: s1, the host provided with the Bluetooth sends a binding command key to the furniture lock provided with the Bluetooth through a Bluetooth Mesh network, and the furniture lock receives the binding command key of the host and completes the binding with the host; s2, the host sends an unlocking command key to the furniture lock, and the furniture lock receives the unlocking command key of the host and unlocks.
In the above method, the step S1 includes the following steps:
s11, the HOST uses the random number generator to generate the HOST root key, the HOST root key includes three parts of packet head, data and check, and is stored in the group HOST [20 ];
s12, the HOST computer communicates with the furniture lock through the Bluetooth Mesh network, the data part of the HOST computer root key stored in HOST [20] is processed with XOR operation with the serial number of the furniture lock, SLAVE [20] is generated to be used as the root key of the furniture lock, the root key SLAVE [20] is stored in the HOST computer and the furniture lock, and the binding is completed.
In the above method, the step S2 includes the following steps:
s21, inputting a furniture lock number on the host, after the fingerprint unlocking is successful, the host sends a plaintext KEY KEY [20] to the furniture lock through the Bluetooth Mesh network, and the furniture lock stores the plaintext KEY KEY [20] after receiving the plaintext KEY;
s22, the host carries out XOR operation on the plaintext KEY KEY [20] and the root KEY SLAVE [20] to obtain a KEY TKEY [20] of the communication;
s23, carrying out AES encryption on the unlocking command OPEN [20] through a secret KEY TKEY [20], generating an encrypted unlocking command OPEN _ KEY [20], and sending the encrypted unlocking command OPEN _ KEY [20] to the furniture lock;
s24, the furniture lock carries out XOR operation on the stored plaintext KEY KEY [20] and the root KEY SLAVE [20] to obtain a KEY TKEY [20 ];
s25, the received encrypted unlocking command OPEN _ KEY [20] is subjected to AES decryption by using the secret KEY TKEY [20] to obtain the unlocking command OPEN [20], the content of the unlocking command OPEN [20] is judged to be legal data, unlocking is carried out, and if the content of the unlocking command OPEN [20] is illegal data, unlocking is not carried out.
The invention also provides a system for realizing the Bluetooth flexible networking of the furniture lock, which comprises a host provided with the Bluetooth and the furniture lock provided with the Bluetooth, wherein the host and the furniture lock are in communication connection through the Bluetooth Mesh networking;
the host is used for sending a binding command key to the furniture lock and sending an unlocking command key to the furniture lock;
the furniture lock is used for receiving the binding command key of the host and completing the binding with the host, and is used for receiving the unlocking command key of the host and unlocking.
In the system, the binding command key sent by the HOST is a HOST root key generated by using a random number generator, and the HOST root key comprises a packet header, data and a check part and is stored in a plurality of HOST [20 ];
the data part of HOST root key stored in HOST [20] is XOR-operated with the number of furniture lock, SLAVE [20] is generated as the root key of furniture lock, and the root key SLAVE [20] is stored in HOST and furniture lock.
The invention has the beneficial effects that: the connection between the host and the furniture locks is realized through Bluetooth, the furniture locks adopt a Bluetooth Mesh distributed networking technology, new furniture locks can be added at any time, the number of the furniture locks can reach hundreds, and the number of the furniture locks which can be networked is increased; any two devices in the Bluetooth network are in a connectable range, and the host can control any furniture lock, so that the limitation on distance requirements is reduced, and the flexibility of installation positions is improved; meanwhile, only a fingerprint sensor or a numeric keyboard is required to be installed on the host, a number is added when each furniture lock is networked, the host successfully identifies the identity by inputting the number, the furniture lock corresponding to the number can be unlocked, the installation of the fingerprint sensor or the numeric keyboard on each furniture lock is avoided, the miniaturization of the furniture lock is realized, the installation mode of opening holes is supported, the price of the furniture lock is favorably reduced, and the convenience for installing the furniture lock is improved.
Drawings
Fig. 1 is a flow chart of a method for realizing flexible bluetooth networking of a furniture lock according to the invention.
Detailed Description
The invention is further illustrated with reference to the following figures and examples.
The conception, the specific structure, and the technical effects produced by the present invention will be clearly and completely described below in conjunction with the embodiments and the accompanying drawings to fully understand the objects, the features, and the effects of the present invention. It is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments, and those skilled in the art can obtain other embodiments without inventive effort based on the embodiments of the present invention, and all embodiments are within the protection scope of the present invention. In addition, all the connection relations related in the patent do not mean that the components are directly connected, but mean that a better connection structure can be formed by adding or reducing connection auxiliary components according to specific implementation conditions. All technical characteristics in the invention can be interactively combined on the premise of not conflicting with each other.
Referring to fig. 1, a method for implementing flexible bluetooth networking of a furniture lock includes the following steps:
s1, the host provided with the Bluetooth sends a binding command key to the furniture lock provided with the Bluetooth through a Bluetooth Mesh network, and the furniture lock receives the binding command key of the host and completes the binding with the host;
specifically, step S1 includes the following steps:
s11, the HOST uses the random number generator to generate the HOST root key, the HOST root key includes three parts of packet head, data and check, and is stored in the group HOST [20 ];
s12, the HOST computer communicates with the furniture lock through the Bluetooth Mesh network, when the furniture lock with the number 001 is bound with the HOST computer, the data part of the HOST computer root key stored in HOST [20] and the number 001 of the furniture lock are subjected to XOR operation to generate SLAVE [20] as the root key of the furniture lock 001, the root key SLAVE [20] is stored in the HOST computer and the furniture lock, and the binding of the furniture lock with the number 001 and the HOST computer is completed.
S2, the host sends an unlocking command key to the furniture lock, and the furniture lock receives the unlocking command key of the host and unlocks;
the step S2 includes the following steps:
s21, inputting a furniture lock number on a host, for example, if the number of a furniture lock to be unlocked is 001, inputting the number 001 on the host, arranging a fingerprint sensor or a numeric keyboard on the host, after the host successfully unlocks by using a fingerprint or a password, the host sends a plaintext KEY KEY [20] to the furniture lock through a Bluetooth Mesh network, and the plaintext KEY KEY [20] is stored after the furniture lock receives the plaintext KEY KEY [20 ];
s22, the host carries out XOR operation on the plaintext KEY KEY [20] and the root KEY SLAVE [20] to obtain a KEY TKEY [20] of the communication;
s23, the host machine carries out AES encryption on the unlocking command OPEN [20] through the secret KEY TKEY [20] to generate an encrypted unlocking command OPEN _ KEY [20], and the encrypted unlocking command OPEN _ KEY [20] is sent to the furniture lock;
s24, the furniture lock carries out XOR operation on the stored plaintext KEY KEY [20] and the root KEY SLAVE [20] to obtain a KEY TKEY [20 ];
s25, the furniture lock uses the KEY TKEY [20] to conduct AES decryption on the received encrypted unlocking command OPEN _ KEY [20] to obtain the unlocking command OPEN [20], and unlocking is conducted if the content of the unlocking command OPEN [20] is judged to be legal data, and unlocking is not conducted if the content of the unlocking command OPEN [20] is illegal data. After the unlocking is finished, after a period of time, such as 10 seconds, the furniture lock can be automatically locked and enters a dormant state, if the lock with the number 001 needs to be unlocked again, the host can regenerate a new plaintext KEY KEY [20] and repeat the process, so that the unlocking command KEYs are different when the lock is unlocked every time, illegal attacks can be effectively prevented, and the system safety is improved.
In this example, HOST [20] ═ 55, AA, C1,66,0C,4F,32,4E,5E, D3, B7, C2,5D, D0,06,87,04, CE,08,37 }; the data part of HOST [20] is subjected to exclusive-or operation with the number 001 of the furniture lock by each byte, and SLAVE [20] with the number 001 is obtained, wherein the SLAVE [20] is {55, AA, C0,67,0D,4E,33,4F,5F, D2, B6, C3,5C, D1,07,86,05, CF,08,3B }; the host enters the furniture lock number 001 and sends a plaintext KEY [20] {55, AA,13, CA,29,77,03, CF,9A,3A, DD, B7, B9,47, a7,53,7F,57,08,86}, where the data portion is also random number generated. The data part of the plaintext KEY [20] and the root KEY SLAVE [20] is subjected to bitwise exclusive-or operation to obtain a KEY TKEY [20] {55, AA, D3, AD,24,39,30,80, C5, E8,6B,74, E5,96, a0, D5,7A,98,0A,1A }; an unlocking command OPEN [20] {55, BB,55,00,01,00,01,00, 00,0A,00,00,00,00,00, 02,2C }; the data part of the OPEN [20] is used as a plaintext, the data part of the TKEY [20] is used as a password, and the data part is encrypted by using AES-128bits/ECB mode/no padding to obtain an encrypted unlocking command OPEN _ KEY [20] {55, AA, FC,8B,07,22, a0,5C,34,74, E7,2C,28, D0,8D,8F,5C,77,08,4D }.
The furniture lock obtains TKEY [20] through the same process calculation, the encrypted unlocking command OPEN _ KEY [20] is subjected to AES-128bits/ECB mode/no padding decryption, reverse calculation is carried out, the unlocking command OPEN [20] is obtained, the first two bytes of the data part of the OPEN [20] are fixed BB, 55', the third and fourth bytes of 00,01 are command types, the fifth and sixth bytes of 00,01 are house lock numbers, the seventh and eighth bytes of 00,0A are unlocking commands, any byte in the data part of the unlocking command OPEN [20] is not matched, the command is an illegal command, and unlocking cannot be achieved.
When the host is bound with the furniture lock, all fingerprint and password users can unlock the furniture lock in the menu, or only specific fingerprint registered users or password registered users can unlock the furniture lock, so that the management of the furniture lock is facilitated, and meanwhile, the function of protecting the specific users can be played, for example, children are limited to unlock certain furniture locks only. And management can be distinguished according to the distribution condition of workers in the working occasion, and part of workers can only open part of furniture locks, so that the individual requirements of users are met.
Furthermore, the host can also bind with the mobile phone by sending the secret key to the mobile phone with the Bluetooth function, so that the unlocking and locking of the furniture lock can be controlled by the mobile phone. The mobile phone is used for controlling the furniture lock, the mobile phone and the host need to be bound firstly, and the binding flow of the mobile phone and the host is basically consistent with the binding flow of the furniture lock and the host. The HOST computer communicates with the mobile phone through a Bluetooth Mesh network, firstly, the fingerprint or password of an administrator is verified on the HOST computer to enter a management menu, the mobile phone binding is selected, at the moment, the HOST computer carries out XOR operation on HOST [20] and the mobile phone with the number of 241 to obtain MSLAVE [20] as a root key of the mobile phone with the number of 241, the HOST computer stores the MSLAVE [20], meanwhile, the MSLAVE [20] is sent to the mobile phone, the mobile phone end stores the MSLAVE [20] as the root key of subsequent communication, the root key MSLAVE [20] is stored in the HOST computer and the mobile phone, and the binding between the mobile phone with the number of 241 and the HOST computer is completed.
When the mobile phone is used for unlocking, the host firstly sends the KEY [20] as a plaintext secret KEY for communication to the mobile phone, and the mobile phone and the host carry out XOR operation on the plaintext secret KEY KEY [20] and the root secret KEY MSLAVE [20] to obtain a secret KEY TKEY [20] for the communication. The mobile phone carries out AES encryption on the unlocking command OPEN [20] through the secret KEY TKEY [20], generates an encrypted unlocking command OPEN _ KEY [20], and sends the encrypted unlocking command OPEN _ KEY [20] to the host. The host machine carries out AES decryption on the received encrypted unlocking command OPEN _ KEY [20] by using the secret KEY TKEY [20] to obtain the unlocking command OPEN [20], and if the content of the OPEN [20] is judged to be legal data, the host machine can initiate communication with the furniture lock to OPEN the corresponding furniture lock; if the data is illegal, the host machine cannot open the furniture lock. The data operation method is the same as that of the host and the furniture lock.
The invention also provides a system for realizing the Bluetooth flexible networking of the furniture lock, which comprises a host provided with the Bluetooth and the furniture lock provided with the Bluetooth, wherein the host and the furniture lock are in communication connection through the Bluetooth Mesh networking;
the host is used for sending a binding command key to the furniture lock and sending an unlocking command key to the furniture lock;
the furniture lock is used for receiving the binding command key of the host and completing the binding with the host, and is used for receiving the unlocking command key of the host and unlocking.
Furthermore, the invention relates to a system for realizing flexible networking of furniture lock Bluetooth, wherein a binding command key sent by a HOST is a HOST root key generated by using a random number generator, and the HOST root key comprises three parts of a packet header, data and verification and is stored in a group HOST [20 ]; the data part of HOST root key stored in HOST [20] and the serial number of furniture lock are processed with XOR operation to generate SLAVE [20] as the root key of furniture lock, the root key SLAVE [20] is stored in HOST and furniture lock to make the HOST and furniture lock complete binding.
The invention realizes the connection between the host and the furniture lock through Bluetooth, the furniture lock adopts the Bluetooth Mesh distributed networking technology, new furniture locks can be added at any time, the number of the furniture locks can reach hundreds, and the number of the furniture locks which can be networked is increased; any two devices in the Bluetooth network are in a connectable range, and the host can control any furniture lock, so that the limitation on the distance requirement is reduced, and the flexibility of the installation position is improved; meanwhile, only a fingerprint sensor or a digital keyboard is required to be installed on the host, a serial number is added when each furniture lock is networked, the host successfully identifies the identity by inputting the serial number, the furniture lock with the corresponding serial number can be unlocked, the condition that the fingerprint sensor or the digital keyboard is installed on each furniture lock is avoided, the furniture lock is miniaturized, the installation mode without holes is supported, the price of the furniture lock is favorably reduced, and the convenience for installing the furniture lock is improved.
While the preferred embodiments of the present invention have been illustrated and described, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.
Claims (5)
1. A method for realizing flexible networking of furniture lock Bluetooth is characterized in that: the method comprises the following steps:
s1, the host provided with the Bluetooth sends a binding command key to the furniture lock provided with the Bluetooth through a Bluetooth Mesh network, and the furniture lock receives the binding command key of the host and completes the binding with the host;
s2, the host sends an unlocking command key to the furniture lock, and the furniture lock receives the unlocking command key of the host and unlocks.
2. The method for realizing the Bluetooth flexible networking of the furniture lock according to claim 1, wherein the method comprises the following steps: the step S1 includes the following steps:
s11, the HOST uses the random number generator to generate the HOST root key, the HOST root key includes three parts of packet head, data and check, and is stored in the group HOST [20 ];
s12, the HOST computer communicates with the furniture lock through the Bluetooth Mesh network, the data part of the HOST computer root key stored in HOST [20] is processed with XOR operation with the serial number of the furniture lock, SLAVE [20] is generated to be used as the root key of the furniture lock, the root key SLAVE [20] is stored in the HOST computer and the furniture lock, and the binding is completed.
3. The method for realizing the Bluetooth flexible networking of the furniture lock as claimed in claim 2, wherein: the step S2 includes the following steps:
s21, inputting a furniture lock number on the host, after the fingerprint unlocking is successful, the host sends a plaintext KEY KEY [20] to the furniture lock through the Bluetooth Mesh network, and the furniture lock stores the plaintext KEY KEY [20] after receiving the plaintext KEY;
s22, the host carries out XOR operation on the plaintext KEY KEY [20] and the root KEY SLAVE [20] to obtain a KEY TKEY [20] of the communication;
s23, carrying out AES encryption on the unlocking command OPEN [20] through a secret KEY TKEY [20], generating an encrypted unlocking command OPEN _ KEY [20], and sending the encrypted unlocking command OPEN _ KEY [20] to the furniture lock;
s24, the furniture lock carries out XOR operation on the stored plaintext KEY KEY [20] and the root KEY SLAVE [20] to obtain a KEY TKEY [20 ];
s25, the received encrypted unlocking command OPEN _ KEY [20] is subjected to AES decryption by using the secret KEY TKEY [20] to obtain the unlocking command OPEN [20], the content of the unlocking command OPEN [20] is judged to be legal data, unlocking is carried out, and if the content of the unlocking command OPEN [20] is illegal data, unlocking is not carried out.
4. The utility model provides a realize nimble network deployment of furniture lock bluetooth which characterized in that: the Bluetooth furniture lock comprises a host provided with Bluetooth and a furniture lock provided with Bluetooth, wherein the host and the furniture lock are in communication connection through a Bluetooth Mesh network;
the host is used for sending a binding command key to the furniture lock and sending an unlocking command key to the furniture lock;
the furniture lock is used for receiving the binding command key of the host and completing the binding with the host, and is used for receiving the unlocking command key of the host and unlocking.
5. The system for realizing Bluetooth flexible networking of furniture locks according to claim 4, wherein: the binding command key sent by the HOST is a HOST root key generated by using a random number generator, and the HOST root key comprises a packet header, data and a verification part and is stored in a plurality of HOST [20 ];
the data part of HOST root key stored in HOST [20] is processed with XOR operation with the serial number of furniture lock, SLAVE [20] is generated as the root key of furniture lock, and the root key SLAVE [20] is stored in HOST and furniture lock.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210435615.1A CN114944025A (en) | 2022-04-24 | 2022-04-24 | Method and system for realizing flexible networking of furniture lock Bluetooth |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210435615.1A CN114944025A (en) | 2022-04-24 | 2022-04-24 | Method and system for realizing flexible networking of furniture lock Bluetooth |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114944025A true CN114944025A (en) | 2022-08-26 |
Family
ID=82906609
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210435615.1A Pending CN114944025A (en) | 2022-04-24 | 2022-04-24 | Method and system for realizing flexible networking of furniture lock Bluetooth |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114944025A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105184931A (en) * | 2015-09-30 | 2015-12-23 | 上海艾迅士建筑科技有限公司 | Bluetooth-based unlocking method, system and hand-held terminal and Bluetooth-based electronic lock |
CN107393069A (en) * | 2017-07-17 | 2017-11-24 | 曹迪 | Access control management method and system based on bluetooth MESH networking core technologies |
CN107575094A (en) * | 2017-10-27 | 2018-01-12 | 杭州圣联科技有限公司 | A kind of blue-tooth intelligence lock system and its control method |
CN109714741A (en) * | 2019-01-10 | 2019-05-03 | 常州科新永安电子锁有限公司 | Bluetooth repeaters, smart lock, intelligent lock system and network-building method |
CN109785482A (en) * | 2018-12-27 | 2019-05-21 | 浙江金华凯宇电子科技有限公司 | A kind of smart lock based on bluetooth mesh technology |
CN214901321U (en) * | 2021-06-03 | 2021-11-26 | 常州科新永安电子锁有限公司 | Lock networking system based on Bluetooth router and lock networking system applied to hotel |
-
2022
- 2022-04-24 CN CN202210435615.1A patent/CN114944025A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105184931A (en) * | 2015-09-30 | 2015-12-23 | 上海艾迅士建筑科技有限公司 | Bluetooth-based unlocking method, system and hand-held terminal and Bluetooth-based electronic lock |
CN107393069A (en) * | 2017-07-17 | 2017-11-24 | 曹迪 | Access control management method and system based on bluetooth MESH networking core technologies |
CN107575094A (en) * | 2017-10-27 | 2018-01-12 | 杭州圣联科技有限公司 | A kind of blue-tooth intelligence lock system and its control method |
CN109785482A (en) * | 2018-12-27 | 2019-05-21 | 浙江金华凯宇电子科技有限公司 | A kind of smart lock based on bluetooth mesh technology |
CN109714741A (en) * | 2019-01-10 | 2019-05-03 | 常州科新永安电子锁有限公司 | Bluetooth repeaters, smart lock, intelligent lock system and network-building method |
CN214901321U (en) * | 2021-06-03 | 2021-11-26 | 常州科新永安电子锁有限公司 | Lock networking system based on Bluetooth router and lock networking system applied to hotel |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018177188A1 (en) | Secure communication method based on smart door lock system and smart door lock system thereof | |
CN100581102C (en) | Data safety transmission method for wireless sensor network | |
Asokan et al. | Man-in-the-middle in tunnelled authentication protocols | |
CN102546155B (en) | On-demand safe key generates method and system | |
CA1249865A (en) | Method for establishing user authentication with composite session keys among cryptographically communicating nodes | |
CN100583758C (en) | Identification method | |
CN108055235A (en) | A kind of control method of smart lock, relevant device and system | |
CN108171831B (en) | Bidirectional security authentication method based on NFC mobile phone and intelligent lock | |
Granzer et al. | Security in networked building automation systems | |
CN107196920B (en) | A kind of key generation distribution method towards wireless communication system | |
CN110753344B (en) | NB-IoT-based smart meter secure access system | |
CN111243133A (en) | Bluetooth door lock system based on dynamic password generation and matching and unlocking method | |
CN101602358A (en) | A kind of engine anti-theft authentication method based on the AES128 cryptographic algorithm | |
CN102936980A (en) | Method and device for controlling electronic lock | |
Lounis et al. | Bluetooth low energy makes “just works” not work | |
CN107154847A (en) | Towards the method for generating cipher code, verification method and its smart machine of offline environment | |
CN109300201A (en) | A kind of intelligent and safe lock and its encryption system and encryption method | |
CN111447053A (en) | Data secure transmission method and system based on chaotic logic mapping and RC4 stream cipher | |
CN108989309A (en) | Encryption communication method and its encrypted communication device based on narrowband Internet of Things | |
CN107864124A (en) | A kind of end message method for security protection, terminal and bluetooth lock | |
CN110992532A (en) | Temporary authorized unlocking method and system for intelligent door lock | |
CN108447149A (en) | A kind of unlocking method and device in shared house | |
CN114944025A (en) | Method and system for realizing flexible networking of furniture lock Bluetooth | |
WO2003077581A1 (en) | Security protection for data communication | |
CN111563980B (en) | Bluetooth lock key generation and authentication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |