CN116758659A - Remote control-based intelligent door lock control method and device - Google Patents

Remote control-based intelligent door lock control method and device Download PDF

Info

Publication number
CN116758659A
CN116758659A CN202310587998.9A CN202310587998A CN116758659A CN 116758659 A CN116758659 A CN 116758659A CN 202310587998 A CN202310587998 A CN 202310587998A CN 116758659 A CN116758659 A CN 116758659A
Authority
CN
China
Prior art keywords
ith
control information
information
jth
intelligent door
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310587998.9A
Other languages
Chinese (zh)
Inventor
文运定
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanxi Fenghong Industrial Co ltd
Original Assignee
Shanxi Fenghong Industrial Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanxi Fenghong Industrial Co ltd filed Critical Shanxi Fenghong Industrial Co ltd
Priority to CN202310587998.9A priority Critical patent/CN116758659A/en
Publication of CN116758659A publication Critical patent/CN116758659A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Selective Calling Equipment (AREA)

Abstract

The application provides a control method and device of an intelligent door lock based on remote control, which are used for realizing control from an end to a cluster so as to meet the requirements of more application scenes. Applied to RAN equipment, in the method, AF may initiate control to N intelligent door locks simultaneously through demand information based on the user's demand. Therefore, the RAN equipment can respectively generate and send N pieces of control information for N intelligent door locks according to the requirement information, and is used for simultaneously controlling the N intelligent door locks to execute respective operations, realizing the control from the end to the cluster and meeting the requirements of more application scenes.

Description

Remote control-based intelligent door lock control method and device
Technical Field
The application relates to the technical field of the Internet of things, in particular to a control method and device of an intelligent door lock based on remote control.
Background
In the fifth generation (5th generation,5G) mobile communication system, the PC5 connection between 2 user equipments (user equipments) is mainly suitable for control of near-end communication, and for remote control, the UE can initiate control of other UEs by an application function (application function, AF). For example, the mobile phone can control the opening and closing of the intelligent door lock, the working mode and the like through the AF.
However, the current remote control method is mainly end-to-end (E2E) control, which may not meet the requirements of more application scenarios in the future.
Disclosure of Invention
The embodiment of the application provides a control method and a device for an intelligent door lock based on remote control, which are used for realizing control from an end to a cluster so as to meet the requirements of more application scenes.
In order to achieve the above purpose, the application adopts the following technical scheme:
in a first aspect, a control method of an intelligent door lock based on remote control is provided, and is applied to RAN equipment, and the method includes: the RAN equipment receives demand information from AF, wherein the demand information is used for indicating that the AF needs N intelligent door locks to execute corresponding operations, N is an integer greater than 1, and the N intelligent door locks are intelligent door locks deployed in the same scene; in response to the demand information, the RAN equipment sends N pieces of control information to N intelligent door locks, wherein the ith piece of control information in the N pieces of control information is used for indicating the ith intelligent door lock in the N intelligent door locks to execute the operation corresponding to the ith intelligent door lock.
Based on the method of the first aspect, the AF may initiate control to the N intelligent door locks simultaneously through the requirement information based on the requirement of the user. Therefore, the RAN equipment can respectively generate and send N pieces of control information for N intelligent door locks according to the requirement information, and is used for simultaneously controlling the N intelligent door locks to execute respective operations, realizing the control from the end to the cluster and meeting the requirements of more application scenes.
In one possible design, the ith control information in the N control information is carried on the ith RE, the jth control information in the N control information is carried on the jth RE, i and j are any integers from 1 to N, i and j are different, the symbol length of the ith RE is the same as the symbol length of the jth RE, and the cyclic prefix length of the ith RE is different from the cyclic prefix length of the jth RE. That is, in the case that the symbol lengths are the same, or the subcarrier spacing of the REs is the same, the cyclic prefix code lengths may be configured to be different, that is, the ratio between the cyclic prefix code length and the useful symbol in one RE may be changed, so as to achieve flexibility of transmission.
Optionally, the ith control information is encrypted information using the cyclic prefix length of the ith RE as an input parameter, and the jth control information is encrypted information using the cyclic prefix length of the jth RE as an input parameter. Thus, the key used by each control information encryption can be different, so that the communication security can be ensured.
Further, when i is smaller than N, the ith control information is encrypted information using the cyclic prefix lengths of the ith RE and the (i+1) th RE as input parameters, and when i is equal to N, the ith control information is encrypted information using the cyclic prefix lengths of the ith RE and the (1) st symbol as input parameters; when j is smaller than N, the j control information is encrypted information using the cyclic prefix lengths of the j RE and the j+1th RE as input parameters, and when j is equal to N, the j control information is encrypted information using the cyclic prefix lengths of the j RE and the 1 st symbol as input parameters.
Optionally, the ith control information is encrypted information using the cyclic prefix length of the jth RE as an input parameter, and the jth control information is encrypted information using the cyclic prefix length of the ith RE as an input parameter. Thus, the key used by each control information encryption can be different, so that the communication security can be ensured.
Optionally, when j is smaller than N, the ith control information is encrypted information using the cyclic prefix lengths of the jth RE and the jth+1th RE as input parameters, when j is equal to N, the ith control information is encrypted information using the cyclic prefix lengths of the jth RE and the 1 st symbol as input parameters, when j is smaller than N, the jth control information is encrypted information using the cyclic prefix length of the ith RE as input parameters, and when i is equal to N, the ith control information is encrypted information using the cyclic prefix lengths of the ith RE and the 1 st symbol as input parameters.
In a possible design, the ith control information in the N pieces of control information is carried on the ith RE, the jth control information in the N pieces of control information is carried on the jth RE, i and j are any integers from 1 to N, i and j are different, the time domain positions of the ith RE and the jth RE are different, and/or the frequency domain positions of the ith RE and the jth RE are different, i.e. any two pieces of control information can be carried through different REs, so as to realize flexibility of transmission.
Optionally, the ith control information is encrypted information using the time-frequency position of the ith RE as an input parameter, and the jth control information is encrypted information using the time-frequency position of the jth RE as an input parameter. Thus, the key used by each control information encryption can be different, so that the communication security can be ensured.
Further, when i is smaller than N, the ith control information is encrypted information using the time-frequency positions of the ith RE and the (i+1) th RE as input parameters, and when i is equal to N, the ith control information is encrypted information using the time-frequency positions of the ith RE and the (1) st symbol as input parameters; when j is smaller than N, the j control information is encrypted information using the time-frequency positions of the j RE and the j+1th RE as input parameters, and when j is equal to N, the j control information is encrypted information using the time-frequency positions of the j RE and the 1 st symbol as input parameters.
Optionally, the ith control information is encrypted information using the time-frequency position of the jth RE as an input parameter, and the jth control information is encrypted information using the time-frequency position of the ith RE as an input parameter.
Further, when j is smaller than N, the ith control information is encrypted using the time-frequency positions of the jth RE and the jth+1th RE as input parameters, when j is equal to N, the ith control information is encrypted using the time-frequency positions of the jth RE and the 1 st symbol as input parameters, when j is smaller than N, the jth control information is encrypted using the time-frequency position of the ith RE as input parameters, and when i is equal to N, the ith control information is encrypted using the time-frequency positions of the ith RE and the 1 st symbol as input parameters.
In a second aspect, there is provided a control device for an intelligent door lock based on remote control, which is applied to RAN equipment, the device comprising: the receiving and transmitting module is used for receiving demand information from the AF by the RAN equipment, wherein the demand information is used for indicating that the AF needs N intelligent door locks to execute respective corresponding operations, N is an integer greater than 1, and the N intelligent door locks are intelligent door locks deployed in the same scene; the RAN equipment is used for sending N pieces of control information to the N intelligent door locks according to the requirement information, wherein the ith piece of control information in the N pieces of control information is used for indicating the ith intelligent door lock in the N intelligent door locks to execute the operation corresponding to the ith intelligent door lock.
In one possible design, the ith control information in the N control information is carried on the ith RE, the jth control information in the N control information is carried on the jth RE, i and j are any integers from 1 to N, i and j are different, the symbol length of the ith RE is the same as the symbol length of the jth RE, and the cyclic prefix length of the ith RE is different from the cyclic prefix length of the jth RE.
Optionally, the ith control information is encrypted information using the cyclic prefix length of the ith RE as an input parameter, and the jth control information is encrypted information using the cyclic prefix length of the jth RE as an input parameter.
Further, when i is smaller than N, the ith control information is encrypted information using the cyclic prefix lengths of the ith RE and the (i+1) th RE as input parameters, and when i is equal to N, the ith control information is encrypted information using the cyclic prefix lengths of the ith RE and the (1) st symbol as input parameters; when j is smaller than N, the j control information is encrypted information using the cyclic prefix lengths of the j RE and the j+1th RE as input parameters, and when j is equal to N, the j control information is encrypted information using the cyclic prefix lengths of the j RE and the 1 st symbol as input parameters.
Optionally, the ith control information is encrypted information using the cyclic prefix length of the jth RE as an input parameter, and the jth control information is encrypted information using the cyclic prefix length of the ith RE as an input parameter.
Optionally, when j is smaller than N, the ith control information is encrypted information using the cyclic prefix lengths of the jth RE and the jth+1th RE as input parameters, when j is equal to N, the ith control information is encrypted information using the cyclic prefix lengths of the jth RE and the 1 st symbol as input parameters, when j is smaller than N, the jth control information is encrypted information using the cyclic prefix length of the ith RE as input parameters, and when i is equal to N, the ith control information is encrypted information using the cyclic prefix lengths of the ith RE and the 1 st symbol as input parameters.
In one possible design, the ith control information in the N control information is carried on the ith RE, the jth control information in the N control information is carried on the jth RE, i and j are any integers from 1 to N, i and j are different, the time domain positions of the ith RE and the jth RE are different, and/or the frequency domain positions of the ith RE and the jth RE are different.
Optionally, the ith control information is encrypted information using the time-frequency position of the ith RE as an input parameter, and the jth control information is encrypted information using the time-frequency position of the jth RE as an input parameter.
Further, when i is smaller than N, the ith control information is encrypted information using the time-frequency positions of the ith RE and the (i+1) th RE as input parameters, and when i is equal to N, the ith control information is encrypted information using the time-frequency positions of the ith RE and the (1) st symbol as input parameters; when j is smaller than N, the j control information is encrypted information using the time-frequency positions of the j RE and the j+1th RE as input parameters, and when j is equal to N, the j control information is encrypted information using the time-frequency positions of the j RE and the 1 st symbol as input parameters.
Optionally, the ith control information is encrypted information using the time-frequency position of the jth RE as an input parameter, and the jth control information is encrypted information using the time-frequency position of the ith RE as an input parameter.
Further, when j is smaller than N, the ith control information is encrypted using the time-frequency positions of the jth RE and the jth+1th RE as input parameters, when j is equal to N, the ith control information is encrypted using the time-frequency positions of the jth RE and the 1 st symbol as input parameters, when j is smaller than N, the jth control information is encrypted using the time-frequency position of the ith RE as input parameters, and when i is equal to N, the ith control information is encrypted using the time-frequency positions of the ith RE and the 1 st symbol as input parameters.
In a third aspect, an electronic device is provided, comprising: a processor and a memory; the memory is for storing a computer program which, when executed by the processor, causes the electronic device to perform the method of the first aspect.
In one possible design, the electronic device according to the third aspect may further include a transceiver. The transceiver may be a transceiver circuit or an interface circuit. The transceiver may be for use in the electronic device of the third aspect to communicate with other electronic devices.
In an embodiment of the present application, the electronic device according to the third aspect may be the terminal or the network device according to the first aspect, or a chip (system) or other parts or components that may be disposed in the terminal or the network device, or a device including the terminal or the network device.
In addition, the technical effects of the electronic device described in the third aspect may refer to the technical effects of the method described in the first aspect, which are not described herein.
Drawings
Fig. 1 is a schematic diagram of a communication system according to an embodiment of the present application;
fig. 2 is a schematic flow chart of a control method of an intelligent door lock based on remote control according to an embodiment of the present application;
fig. 3 is a schematic flow chart of a control device of an intelligent door lock based on remote control according to an embodiment of the present application;
fig. 4 is a schematic flow chart II of a control device of an intelligent door lock based on remote control according to an embodiment of the present application.
Detailed Description
The technical scheme of the application will be described below with reference to the accompanying drawings.
The present application will present various aspects, embodiments, or features about a system that may include a plurality of devices, components, modules, etc. It is to be understood and appreciated that the various systems may include additional devices, components, modules, etc. and/or may not include all of the devices, components, modules etc. discussed in connection with the figures. Furthermore, combinations of these schemes may also be used.
In addition, in the embodiments of the present application, words such as "exemplary," "for example," and the like are used to indicate an example, instance, or illustration. Any embodiment or design described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, the term use of an example is intended to present concepts in a concrete fashion.
In the embodiment of the present application, "information", "signal", "message", "channel", and "signaling" may be used in a mixed manner, and it should be noted that the meaning of the expression is matched when the distinction is not emphasized. "of", "corresponding" and "corresponding" are sometimes used in combination, and it should be noted that the meanings to be expressed are matched when the distinction is not emphasized. Furthermore, references to "/" in this disclosure may be used to indicate an "or" relationship.
The network architecture and the service scenario described in the embodiments of the present application are for more clearly describing the technical solution of the embodiments of the present application, and do not constitute a limitation on the technical solution provided by the embodiments of the present application, and those skilled in the art can know that, with the evolution of the network architecture and the appearance of the new service scenario, the technical solution provided by the embodiments of the present application is applicable to similar technical problems.
In order to facilitate understanding of the embodiments of the present application, a communication system suitable for use in the embodiments of the present application will be described in detail.
As shown in fig. 1, the communication system may include: AF. RAN equipment and a plurality of terminals.
Wherein the AF network element mainly supports interaction with the CN to provide services, such as influencing data routing decisions, policy control functions or providing some services of a third party to the network side.
The RAN device may be a device that provides access to the terminal. For example, the RAN device may include: the RAN apparatus may also include a 5G, such as a gNB in a new radio, NR, system, or one or a group (including multiple antenna panels) of base stations in the 5G, or may also be a network node, such as a baseband unit (building base band unit, BBU), or a Centralized Unit (CU) or a Distributed Unit (DU), an RSU with base station functionality, or a wired access gateway, or a core network element of the 5G, constituting a gNB, a transmission point (transmission and reception point, TRP or transmission point, TP), or a transmission measurement function (transmission measurement function, TMF). Alternatively, the RAN device may also include an Access Point (AP) in a wireless fidelity (wireless fidelity, wiFi) system, a wireless relay node, a wireless backhaul node, various forms of macro base stations, micro base stations (also referred to as small stations), relay stations, access points, wearable devices, vehicle devices, and so on. Alternatively, the RAN device may also include a next generation mobile communication system, such as a 6G access network device, such as a 6G base station, or in the next generation mobile communication system, the network device may also have other naming manners, which are covered by the protection scope of the embodiments of the present application, which is not limited in any way.
The terminal may be a terminal having a transceiver and a processing function, or a chip system that may be provided in the terminal. The terminal may also be referred to as a User Equipment (UE), an access terminal, a subscriber unit (subscriber unit), a subscriber station, a Mobile Station (MS), a remote station, a remote terminal, a mobile device, a user terminal, a wireless communication device, a user agent, or a user device. The terminal in the embodiments of the present application may be a mobile phone (mobile phone), a cellular phone (cellular phone), a smart phone (smart phone), a tablet computer (Pad), a wireless data card, a personal digital assistant (personal digital assistant, PDA), a wireless modem (modem), a handheld device (handset), a laptop computer (laptop computer), a machine type communication (machine type communication, MTC) terminal, a wireless terminal in an industrial control (industrial control), and the like. In the scenario of the embodiment of the application, the terminal is introduced as an intelligent door lock.
The workflow of the electronic device will be specifically described through the method embodiment. The control method of the intelligent door lock based on remote control provided by the embodiment of the application can be applied to the electronic equipment, and is specifically described below.
As shown in fig. 2, the specific flow of the control method of the intelligent door lock based on remote control is as follows:
s201, the RAN device receives the requirement information from the AF.
The requirement information is used for indicating that the AF needs N intelligent door locks to execute corresponding operations, N is an integer greater than 1, and N intelligent door locks are deployed under the same scene. For example, the demand information may include identification information of each of the N smart door locks to uniquely identify each of the smart door locks. Or, the N intelligent locks are used as a cluster, and the requirement information may also include an identifier of the cluster, so as to implicitly indicate that control needs to be performed on all users in the cluster, i.e., the N intelligent locks. In addition, the requirement information may further include information for identifying operations that each of the N intelligent door locks needs to perform.
S202, in response to the demand information, the RAN equipment transmits N pieces of control information to N intelligent door locks.
The ith control information in the N control information is used for indicating the ith intelligent door lock in the N intelligent door locks to execute the operation corresponding to the i intelligent door locks.
In one possible design, the ith control information in the N control information is carried on the ith RE, the jth control information in the N control information is carried on the jth RE, i and j are any integers from 1 to N, i and j are different, the symbol length of the ith RE is the same as the symbol length of the jth RE, and the cyclic prefix length of the ith RE is different from the cyclic prefix length of the jth RE. That is, in the case that the symbol lengths are the same, or the subcarrier spacing of the REs is the same, the cyclic prefix code lengths may be configured to be different, that is, the ratio between the cyclic prefix code length and the useful symbol in one RE may be changed, so as to achieve flexibility of transmission.
It will be appreciated that, although the cyclic prefix is generally used to combat multipath effects of air interface transmissions, since the cyclic prefix length under the same SCS may be configured differently, the RAN device may also utilize the feature of different cyclic prefix lengths to encrypt each of the N control information independently, to improve the security of the transmission.
Mode 1: the ith control information may be information encrypted using the cyclic prefix length of the ith RE as an input parameter. For example, the RAN device may generate an i-th key by hashing with some conventional parameters, such as an authentication token (AUTN), an Authentication Vector (AV), etc., the cyclic prefix length of the i-th RE, and then encrypt the i-th control information of the plaintext using the i-th key to obtain the encrypted i-th control information. Similarly, the jth control information may be information encrypted using the cyclic prefix length of the jth RE as an input parameter. Thus, the key used by each control information encryption can be different, so that the communication security can be ensured.
Mode 2: when i is smaller than N, the ith control information may be information encrypted using the cyclic prefix lengths of the ith RE and the (i+1) th RE as input parameters. For example, the RAN device may generate the ith key by hashing the cyclic prefix lengths of the ith RE and the (i+1) th RE, together with some conventional parameters, etc., to obtain the encrypted ith control information, and then encrypt the ith control information of the plaintext using the ith key. By analogy, when i is equal to N, the ith control information may be information encrypted using the cyclic prefix length of the ith RE and the 1 st symbol as input parameters to achieve cyclic encryption. Similarly, when j is smaller than N, the jth control information may be information encrypted using the cyclic prefix lengths of the jth RE and the jth+1th RE as input parameters. By analogy, when j is equal to N, the j-th control information may be information encrypted using the cyclic prefix length of the j-th RE and the 1-th symbol as input parameters.
It is to be understood that mode 2 is not limited to the encryption of two cyclic prefix lengths as one input parameter of the control information, for example, two or more cyclic prefix lengths may be used as one input parameter of the control information encryption, for example, the i-th control information may be information encrypted using the cyclic prefix length of the i-th RE, the i+1th RE, the i+2th RE.. At this time, the order of two or more cyclic prefix lengths as input parameters may be disordered by a pseudo-random algorithm, for example, the first time the cyclic prefix length according to the ith RE, the cyclic prefix length of the (i+1) th RE, the cyclic prefix length of the (i+2) th RE.
Mode 3: the ith control information may be encrypted information using the cyclic prefix length of the jth RE as an input parameter, and the jth control information may be encrypted information using the cyclic prefix length of the ith RE as an input parameter. In this case, the cyclic prefix length of which RE is used for the ith control information and the jth control information, respectively, may be determined by using a random algorithm. Thus, the key used by each control information encryption can be different, so that the communication security can be ensured.
Mode 4: when j is smaller than N, the ith control information may be information encrypted using cyclic prefix lengths of the jth RE and the jth+1th RE as input parameters. And so on, when j is equal to N, the ith control information is encrypted information using the jth RE and the cyclic prefix length of 1 symbol as input parameters. Similarly, when j is smaller than N, the jth control information may be information encrypted using the cyclic prefix length of the ith RE as an input parameter. By analogy, when i is equal to N, the i-th control information may be information encrypted using the i-th RE and the cyclic prefix length of 1 symbol as input parameters. It will be appreciated that the cyclic prefix length of which RE is used by the ith control information and the jth control information, respectively, may be determined by a random algorithm. Thus, the key used by each control information encryption can be different, so that the communication security can be ensured.
It is to be understood that mode 4 is not limited to the encryption of two cyclic prefix lengths as one input parameter of control information, for example, two or more cyclic prefix lengths may be used as one input parameter of control information encryption, for example, the jth control information may be information encrypted using the cyclic prefix length of the ith RE, the (i+1) th RE, the (i+2) th RE.. Similarly, the order of two or more cyclic prefix lengths as input parameters can be disordered by a pseudo-random algorithm, so that the secret keys generated by using the same cyclic prefix length every two times can be different, and the safety of communication is further ensured.
Or in another possible design, the ith control information in the N pieces of control information is carried on the ith RE, the jth control information in the N pieces of control information is carried on the jth RE, i and j are any integers from 1 to N, i and j are different, the time domain positions of the ith RE and the jth RE are different, and/or the frequency domain positions of the ith RE and the jth RE are different, i.e. any two pieces of control information can be carried through different REs, so as to realize flexibility of transmission.
It can be appreciated that, since different control information may be carried by REs in different time-frequency locations, the RAN device may also utilize this feature of different time-frequency locations to encrypt each of the N control information independently, so as to improve transmission security.
Mode a: the ith control information may be information encrypted using the time-frequency position of the ith RE as an input parameter, and the jth control information may be information encrypted using the time-frequency position of the jth RE as an input parameter. Thus, the key used by each control information encryption can be different, so that the communication security can be ensured.
Mode B: when i is smaller than N, the ith control information may be encrypted information using the time-frequency positions of the ith RE and the (i+1) th RE as input parameters, and when i is equal to N, the ith control information may be encrypted information using the time-frequency positions of the ith RE and the (1) st symbol as input parameters; when j is smaller than N, the j control information may be encrypted information using the time-frequency positions of the j RE and the j+1th RE as input parameters, and when j is equal to N, the j control information may be encrypted information using the time-frequency positions of the j RE and the 1 st symbol as input parameters.
Mode C: the ith control information may be encrypted information using the time-frequency position of the jth RE as an input parameter, and the jth control information may be encrypted information using the time-frequency position of the ith RE as an input parameter.
Mode D: when j is smaller than N, the ith control information may be information encrypted using the time-frequency positions of the jth RE and the jth+1th RE as input parameters, when j is equal to N, the ith control information may be information encrypted using the time-frequency positions of the jth RE and the 1 st symbol as input parameters, when j is smaller than N, the jth control information may be information encrypted using the time-frequency positions of the ith RE as input parameters, and when i is equal to N, the ith control information may be information encrypted using the time-frequency positions of the ith RE and the 1 st symbol as input parameters.
It will be appreciated that the specific implementation principles of the modes a-D may also be described with reference to the modes 1-4, and will not be described herein. In addition, the two designs can be combined, that is, the RAN device uses the cyclic prefix length and the time-frequency position information as input parameters, and encrypts each of the N control information independently.
It will also be appreciated that for N intelligent door locks, the algorithm of each intelligent door lock is aligned with the RAN device, so that each intelligent door lock can use the same algorithm as the RAN device to generate the same key for decryption.
In summary, the AF may initiate control to N intelligent door locks simultaneously through demand information based on the user's demand. Therefore, the RAN equipment can respectively generate and send N pieces of control information for N intelligent door locks according to the requirement information, and is used for simultaneously controlling the N intelligent door locks to execute respective operations, realizing the control from the end to the cluster and meeting the requirements of more application scenes.
The specific flow under the control method of the intelligent door lock based on remote control provided by the embodiment of the application is described in detail above with reference to fig. 2.
The control method of the intelligent door lock based on remote control provided by the embodiment of the application is described in detail above with reference to fig. 2. The following describes in detail a control device of a remote control-based intelligent door lock for performing the method provided by the embodiment of the present application with reference to fig. 3.
Fig. 3 is a schematic structural diagram of a control device of an intelligent door lock based on remote control according to an embodiment of the present application. As shown in fig. 3, an exemplary remote control-based intelligent door lock control apparatus 300 includes: a transceiver module 301 and a processing module 302. For convenience of explanation, fig. 3 shows only main components of the control device of the remote control-based intelligent door lock.
For example, the transceiver module 301 is configured to receive, by the RAN device, requirement information from the AF, where the requirement information is used to instruct the AF to perform respective corresponding operations on N intelligent door locks, where N is an integer greater than 1, and N intelligent door locks are intelligent door locks deployed in the same scene; the processing module 302 is configured to respond to the requirement information, and the RAN device sends N pieces of control information to N intelligent door locks, where an ith piece of control information in the N pieces of control information is used to instruct an ith intelligent door lock in the N intelligent door locks to execute an operation corresponding to the ith intelligent door lock.
In one possible design, the ith control information in the N control information is carried on the ith RE, the jth control information in the N control information is carried on the jth RE, i and j are any integers from 1 to N, i and j are different, the symbol length of the ith RE is the same as the symbol length of the jth RE, and the cyclic prefix length of the ith RE is different from the cyclic prefix length of the jth RE.
Optionally, the ith control information is encrypted information using the cyclic prefix length of the ith RE as an input parameter, and the jth control information is encrypted information using the cyclic prefix length of the jth RE as an input parameter.
Further, when i is smaller than N, the ith control information is encrypted information using the cyclic prefix lengths of the ith RE and the (i+1) th RE as input parameters, and when i is equal to N, the ith control information is encrypted information using the cyclic prefix lengths of the ith RE and the (1) st symbol as input parameters; when j is smaller than N, the j control information is encrypted information using the cyclic prefix lengths of the j RE and the j+1th RE as input parameters, and when j is equal to N, the j control information is encrypted information using the cyclic prefix lengths of the j RE and the 1 st symbol as input parameters.
Optionally, the ith control information is encrypted information using the cyclic prefix length of the jth RE as an input parameter, and the jth control information is encrypted information using the cyclic prefix length of the ith RE as an input parameter.
Optionally, when j is smaller than N, the ith control information is encrypted information using the cyclic prefix lengths of the jth RE and the jth+1th RE as input parameters, when j is equal to N, the ith control information is encrypted information using the cyclic prefix lengths of the jth RE and the 1 st symbol as input parameters, when j is smaller than N, the jth control information is encrypted information using the cyclic prefix length of the ith RE as input parameters, and when i is equal to N, the ith control information is encrypted information using the cyclic prefix lengths of the ith RE and the 1 st symbol as input parameters.
In one possible design, the ith control information in the N control information is carried on the ith RE, the jth control information in the N control information is carried on the jth RE, i and j are any integers from 1 to N, i and j are different, the time domain positions of the ith RE and the jth RE are different, and/or the frequency domain positions of the ith RE and the jth RE are different.
Optionally, the ith control information is encrypted information using the time-frequency position of the ith RE as an input parameter, and the jth control information is encrypted information using the time-frequency position of the jth RE as an input parameter.
Further, when i is smaller than N, the ith control information is encrypted information using the time-frequency positions of the ith RE and the (i+1) th RE as input parameters, and when i is equal to N, the ith control information is encrypted information using the time-frequency positions of the ith RE and the (1) st symbol as input parameters; when j is smaller than N, the j control information is encrypted information using the time-frequency positions of the j RE and the j+1th RE as input parameters, and when j is equal to N, the j control information is encrypted information using the time-frequency positions of the j RE and the 1 st symbol as input parameters.
Optionally, the ith control information is encrypted information using the time-frequency position of the jth RE as an input parameter, and the jth control information is encrypted information using the time-frequency position of the ith RE as an input parameter.
Further, when j is smaller than N, the ith control information is encrypted using the time-frequency positions of the jth RE and the jth+1th RE as input parameters, when j is equal to N, the ith control information is encrypted using the time-frequency positions of the jth RE and the 1 st symbol as input parameters, when j is smaller than N, the jth control information is encrypted using the time-frequency position of the ith RE as input parameters, and when i is equal to N, the ith control information is encrypted using the time-frequency positions of the ith RE and the 1 st symbol as input parameters.
Alternatively, the transceiver module 301 may include a transmitting module (not shown in fig. 3) and a receiving module (not shown in fig. 3). The sending module is used for realizing the sending function of the control device 300 of the intelligent door lock based on remote control, and the receiving module is used for realizing the receiving function of the control device 300 of the intelligent door lock based on remote control.
Optionally, the control device 300 of the remote-controlled intelligent door lock may further comprise a memory module (not shown in fig. 3) in which a program or instructions are stored. The processing module 302, when executing the program or instructions, enables the control apparatus 300 of the remote control-based intelligent door lock to perform the functions of the RAN device in the method shown in fig. 1 in the above-mentioned method.
In addition, the technical effects of the control device 300 for a remote control-based intelligent door lock may refer to the technical effects of the control method for a remote control-based intelligent door lock shown in fig. 1, and will not be described herein.
Fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application. The electronic device may be a terminal, or may be a chip (system) or other part or component that may be provided to the terminal, for example. As shown in fig. 4, the electronic device 400 may include a first processor 401. Optionally, the electronic device 400 may also include memory 402 and/or a transceiver 403. Wherein the first processor 401 is coupled to the memory 402 and the transceiver 403, e.g. may be connected by a communication bus.
The following describes the various constituent elements of the electronic device 400 in detail with reference to fig. 4:
the first processor 401 is a control center of the electronic device 400, and may be one processor or a generic name of a plurality of processing elements. For example, the first processor 401 may be one or more central processing units (central processing unit, CPU), may also be an integrated circuit specific (application specific integrated circuit, ASIC), or one or more integrated circuits configured to implement embodiments of the present application, such as: one or more microprocessors (digital signal processor, DSPs), or one or more field programmable gate arrays (field programmable gate array, FPGAs).
Alternatively, the first processor 401 may perform various functions of the electronic device 400, such as performing the remote control-based intelligent door lock control method shown in fig. 2 described above, by running or executing a software program stored in the memory 402 and calling data stored in the memory 402.
In a specific implementation, as one embodiment, the first processor 401 may include one or more CPUs, such as CPU0 and CPU1 shown in fig. 4.
In a specific implementation, as an embodiment, the electronic device 400 may also include multiple processors, such as the first processor 401 and the second processor 404 shown in fig. 4. Each of these processors may be a single-core processor (single-CPU) or a multi-core processor (multi-CPU). A processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (e.g., computer program instructions).
The memory 402 is configured to store a software program for executing the solution of the present application, and the first processor 401 controls the execution of the software program, and the specific implementation may refer to the above method embodiment, which is not described herein again.
Alternatively, memory 402 may be, but is not limited to, read-only memory (ROM) or other type of static storage device that may store static information and instructions, random access memory (random access memory, RAM) or other type of dynamic storage device that may store information and instructions, but may also be electrically erasable programmable read-only memory (electrically erasable programmable read-only memory, EEPROM), compact disc read-only memory (compact disc read-only memory) or other optical disk storage, optical disk storage (including compact disc, laser disc, optical disc, digital versatile disc, blu-ray disc, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. The memory 402 may be integrated with the first processor 401, or may exist separately, and be coupled to the first processor 401 through an interface circuit (not shown in fig. 4) of the electronic device 400, which is not specifically limited by the embodiment of the present application.
A transceiver 403 for communication with other electronic devices. For example, electronic device 400 is a terminal and transceiver 403 may be used to communicate with a network device or with another terminal device. As another example, electronic device 400 is a network device and transceiver 403 may be used to communicate with a terminal or with another network device.
Alternatively, the transceiver 403 may include a receiver and a transmitter (not separately shown in fig. 4). The receiver is used for realizing the receiving function, and the transmitter is used for realizing the transmitting function.
Alternatively, the transceiver 403 may be integrated with the first processor 401, or may exist separately, and be coupled to the first processor 401 through an interface circuit (not shown in fig. 4) of the electronic device 400, which is not specifically limited by the embodiment of the present application.
It will be appreciated that the configuration of the electronic device 400 shown in fig. 4 is not limiting of the electronic device, and that an actual electronic device may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
In addition, the technical effects of the electronic device 400 may refer to the technical effects of the method described in the above method embodiments, which are not described herein.
It should be appreciated that the processor in embodiments of the application may be a central processing unit (central processing unit, CPU), which may also be other general purpose processors, digital signal processors (digital signal processor, DSP), application specific integrated circuits (application specific integrated circuit, ASIC), off-the-shelf programmable gate arrays (field programmable gate array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
It should also be appreciated that the memory in embodiments of the present application may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The nonvolatile memory may be a read-only memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an electrically Erasable EPROM (EEPROM), or a flash memory. The volatile memory may be random access memory (random access memory, RAM) which acts as an external cache. By way of example but not limitation, many forms of random access memory (random access memory, RAM) are available, such as Static RAM (SRAM), dynamic Random Access Memory (DRAM), synchronous Dynamic Random Access Memory (SDRAM), double data rate synchronous dynamic random access memory (DDR SDRAM), enhanced Synchronous Dynamic Random Access Memory (ESDRAM), synchronous Link DRAM (SLDRAM), and direct memory bus RAM (DR RAM).
The above embodiments may be implemented in whole or in part by software, hardware (e.g., circuitry), firmware, or any other combination. When implemented in software, the above-described embodiments may be implemented in whole or in part in the form of a computer program product. The computer program product comprises one or more computer instructions or computer programs. When the computer instructions or computer program are loaded or executed on a computer, the processes or functions described in accordance with embodiments of the present application are produced in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website site, computer, server, or data center to another website site, computer, server, or data center by wired (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains one or more sets of available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium. The semiconductor medium may be a solid state disk.
It should be understood that the term "and/or" is merely an association relationship describing the associated object, and means that three relationships may exist, for example, a and/or B may mean: there are three cases, a alone, a and B together, and B alone, wherein a, B may be singular or plural. In addition, the character "/" herein generally indicates that the associated object is an "or" relationship, but may also indicate an "and/or" relationship, and may be understood by referring to the context.
In the present application, "at least one" means one or more, and "a plurality" means two or more. "at least one of" or the like means any combination of these items, including any combination of single item(s) or plural items(s). For example, at least one (one) of a, b, or c may represent: a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or plural.
It should be understood that, in various embodiments of the present application, the sequence numbers of the foregoing processes do not mean the order of execution, and the order of execution of the processes should be determined by the functions and internal logic thereof, and should not constitute any limitation on the implementation process of the embodiments of the present application.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In the several embodiments provided by the present application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a read-only memory (ROM), a random access memory (random access memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely illustrative of the present application, and the present application is not limited thereto, and any person skilled in the art will readily recognize that variations or substitutions are within the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A control method of an intelligent door lock based on remote control, which is applied to RAN equipment, the method comprising:
the RAN equipment receives demand information from AF, wherein the demand information is used for indicating that the AF needs N intelligent door locks to execute respective corresponding operations, N is an integer greater than 1, and the N intelligent door locks are intelligent door locks deployed in the same scene;
and responding to the demand information, the RAN equipment sends N pieces of control information to the N intelligent door locks, wherein the ith control information in the N pieces of control information is used for indicating the ith intelligent door lock in the N intelligent door locks to execute the operation corresponding to the ith intelligent door lock.
2. The method of claim 1, wherein an ith control information of the N control information is carried on an ith RE, a jth control information of the N control information is carried on a jth RE, i and j are any integers from 1 to N, and i and j are different, a symbol length of the ith RE is the same as a symbol length of the jth RE, and a cyclic prefix length of the ith RE is different from a cyclic prefix length of the jth RE.
3. The method of claim 2, wherein the i-th control information is encrypted information using a cyclic prefix length of the i-th RE as an input parameter, and the j-th control information is encrypted information using a cyclic prefix length of the j-th RE as an input parameter.
4. A method according to claim 3, wherein when i is smaller than N, the i-th control information is information encrypted using the cyclic prefix lengths of the i-th RE and the i+1th RE as input parameters, and when i is equal to N, the i-th control information is information encrypted using the cyclic prefix lengths of the i-th RE and the 1 st symbol as input parameters; when j is smaller than N, the j control information is encrypted information using the cyclic prefix lengths of the j RE and the j+1th RE as input parameters, and when j is equal to N, the j control information is encrypted information using the cyclic prefix lengths of the j RE and the 1 st symbol as input parameters.
5. The method of claim 2, wherein the ith control information is encrypted information using a cyclic prefix length of the jth RE as an input parameter, and the jth control information is encrypted information using a cyclic prefix length of the ith RE as an input parameter.
6. The method of claim 5, wherein when j is less than N, the ith control information is encrypted using the cyclic prefix lengths of the jth RE and the jth+1th RE as input parameters, when j is equal to N, the ith control information is encrypted using the cyclic prefix lengths of the jth RE and the 1 symbol as input parameters, when j is less than N, the jth control information is encrypted using the cyclic prefix length of the ith RE as input parameters, and when i is equal to N, the ith control information is encrypted using the cyclic prefix lengths of the ith RE and the 1 symbol as input parameters.
7. The method of claim 1, wherein an ith control information of the N control information is carried on an ith RE, a jth control information of the N control information is carried on a jth RE, i and j are each any integer from 1 to N, and i and j are different, a time domain position of the ith RE is different from a time domain position of the jth RE, and/or a frequency domain position of the ith RE is different from the jth RE.
8. The method of claim 7, wherein the ith control information is encrypted information using a time-frequency location of the ith RE as an input parameter, and the jth control information is encrypted information using a time-frequency location of the jth RE as an input parameter.
9. The method of claim 7, wherein the ith control information is encrypted information using a time-frequency location of the jth RE as an input parameter, and wherein the jth control information is encrypted information using a time-frequency location of the ith RE as an input parameter.
10. A control apparatus for a remote control-based intelligent door lock, applied to a RAN device, the apparatus comprising:
the receiving and transmitting module is used for receiving demand information from the AF by the RAN equipment, wherein the demand information is used for indicating that the AF needs N intelligent door locks to execute respective corresponding operations, N is an integer greater than 1, and the N intelligent door locks are intelligent door locks deployed in the same scene;
the processing module is used for responding to the demand information, the RAN equipment sends N pieces of control information to the N intelligent door locks, wherein the ith piece of control information in the N pieces of control information is used for indicating the ith intelligent door lock in the N intelligent door locks to execute the operation corresponding to the ith intelligent door lock.
CN202310587998.9A 2023-05-24 2023-05-24 Remote control-based intelligent door lock control method and device Pending CN116758659A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310587998.9A CN116758659A (en) 2023-05-24 2023-05-24 Remote control-based intelligent door lock control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310587998.9A CN116758659A (en) 2023-05-24 2023-05-24 Remote control-based intelligent door lock control method and device

Publications (1)

Publication Number Publication Date
CN116758659A true CN116758659A (en) 2023-09-15

Family

ID=87954248

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310587998.9A Pending CN116758659A (en) 2023-05-24 2023-05-24 Remote control-based intelligent door lock control method and device

Country Status (1)

Country Link
CN (1) CN116758659A (en)

Similar Documents

Publication Publication Date Title
Ji et al. Overview of 5G security technology
EP3451722B1 (en) Key derivation when network slicing is applied
JP7127689B2 (en) CORE NETWORK DEVICE, COMMUNICATION TERMINAL, AND COMMUNICATION METHOD
CN107251591A (en) Device-to-device discovery and system, the method and apparatus of communication for safety
CN101946536A (en) Application specific master key selection in evolved networks
CN111465008A (en) Initialization vector generation when performing encryption and authentication in wireless communications
CN114584969B (en) Information processing method and device based on associated encryption
US20220399950A1 (en) Securing Downlink Control Information in Cellular Communication Networks
CN117546441A (en) Secure communication method and device, terminal equipment and network equipment
CN115706997A (en) Authorization verification method and device
CN117157651A (en) Federal learning method, federal learning system, first device, and third device
CN114514726A (en) Secure key generation in wireless networks
US11765596B2 (en) Security procedure
CN105340353A (en) Device to device communication security
Sara et al. Survey on Internet of Things and 4G
CN116758659A (en) Remote control-based intelligent door lock control method and device
CN115226416B (en) Root key protection method and system
US11146653B2 (en) Method, data sending control server, storage server, processing server and system for sending data to at least one device
CN106357595A (en) Encryption method and encryption system based on SIM card
WO2024000597A1 (en) Method, device and computer program product for wireless communication
CN116528234B (en) Virtual machine security and credibility verification method and device
CN114640988B (en) Information processing method and device based on implicit indication encryption
CN116561810B (en) Storage management big data processing method and device based on hybrid cloud platform
CN115499470B (en) Storage management method and device for intelligent ammeter data
CN118694614A (en) Communication network security management method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination