CN117240475A - Communication method, system, equipment and medium of intelligent door lock - Google Patents

Communication method, system, equipment and medium of intelligent door lock Download PDF

Info

Publication number
CN117240475A
CN117240475A CN202311332754.2A CN202311332754A CN117240475A CN 117240475 A CN117240475 A CN 117240475A CN 202311332754 A CN202311332754 A CN 202311332754A CN 117240475 A CN117240475 A CN 117240475A
Authority
CN
China
Prior art keywords
door lock
intelligent door
symmetric key
serial number
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311332754.2A
Other languages
Chinese (zh)
Inventor
赵奕捷
杨立扬
成国强
宫敏
焦峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianyi Digital Life Technology Co Ltd
Original Assignee
Tianyi Digital Life Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianyi Digital Life Technology Co Ltd filed Critical Tianyi Digital Life Technology Co Ltd
Priority to CN202311332754.2A priority Critical patent/CN117240475A/en
Publication of CN117240475A publication Critical patent/CN117240475A/en
Pending legal-status Critical Current

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The application discloses a communication method, a system, equipment and a medium of an intelligent door lock, which are used for sending a communication request to the intelligent door lock and receiving an encrypted message fed back by the intelligent door lock; the encrypted message is sent to the intensive authentication platform, so that the intensive authentication platform decrypts the encrypted message through a platform private key of the intensive authentication platform to obtain a disposable symmetric key, serial number data and a first signature value, and the legitimacy of the intelligent door lock is checked through the serial number data and the first signature value; and receiving the one-time symmetric key sent by the intensive authentication platform under the condition that the validity authentication of the intelligent door lock is passed, and communicating with the intelligent door lock based on the one-time symmetric key. According to the technical scheme, the safety of the intelligent door lock can be greatly improved, and the use experience of a user is improved. The application can be widely applied to the field of information technology.

Description

Communication method, system, equipment and medium of intelligent door lock
Technical Field
The application relates to the technical field of information, in particular to a communication method, a system, equipment and a medium of an intelligent door lock.
Background
With the advancement of society and the change of life style, the requirements of people on access control systems are also increasing. The physical key of the traditional door lock has some inconveniences, such as inconvenient carrying, easy losing, easy copying and the like. Meanwhile, the door lock has some problems in terms of safety and is easy to pry open or damage. Along with the development of electronic technology, biological recognition technology and communication technology, the realization of intelligent door lock becomes possible, and technologies such as fingerprint identification, password input can improve access control system's security, and the development of wireless communication technology makes remote control possible, and the popularization of smart mobile phone provides convenience for intelligent door lock's remote control. The intelligent door lock meets the requirements of people on a convenient and safe access control system, provides a more convenient and safe unlocking mode, ensures that access control is more intelligent and efficient, and is widely applied.
In the related art, when many intelligent door locks in the market leave the factory, an encryption key is pre-written in door lock firmware or the encryption key used by a session is negotiated through a private key and an convergence authentication platform preset in the door lock firmware, and then the encryption key is granted to legal terminal equipment, so that the terminal equipment can control the intelligent door locks. However, in practical applications, it is found that door lock firmware is easily decompiled and cracked, which results in leakage of a door lock private key or an encryption key. Meanwhile, the intensive authentication platform needs to send a key list to a manufacturer, so that the risk of encryption key leakage exists. After the encryption key is decoded, an intruder can open the intelligent door lock which does not belong to the intruder by sending a false door opening instruction, so that the safety of the intelligent door lock is reduced, and the use experience is poor.
In view of the above, there is a need to solve the problems in the related art.
Disclosure of Invention
The present application aims to solve at least one of the technical problems existing in the related art to a certain extent.
Therefore, an object of the embodiments of the present application is to provide a communication method for an intelligent door lock, which can improve the security of the intelligent door lock and improve the use experience of a user.
Another object of an embodiment of the present application is to provide a communication system for an intelligent door lock.
In order to achieve the technical purpose, the technical scheme adopted by the embodiment of the application comprises the following steps:
in one aspect, an embodiment of the present application provides a communication method of an intelligent door lock, which is applied to a terminal device, where the communication method includes:
sending a communication request to the intelligent door lock, and receiving an encrypted message fed back by the intelligent door lock; the encryption message is obtained by encrypting a disposable symmetric key, serial number data of the intelligent door lock and a first signature value by the intelligent door lock through a platform public key of an intensive authentication platform; the one-time symmetric key is generated by the intelligent door lock in response to the communication request, and the first signature value is obtained by the intelligent door lock through signing the one-time symmetric key and the serial number data by a door lock private key of the intelligent door lock;
the encrypted message is sent to the intensive authentication platform, so that the intensive authentication platform decrypts the encrypted message through a platform private key of the intensive authentication platform to obtain the one-time symmetric key, the serial number data and the first signature value, and the validity of the intelligent door lock is checked through the serial number data and the first signature value;
And receiving the one-time symmetric key sent by the intensive authentication platform under the condition that the validity authentication of the intelligent door lock is passed, and communicating with the intelligent door lock based on the one-time symmetric key.
In addition, the communication method of the intelligent door lock according to the above embodiment of the present application may further have the following additional technical features:
further, in one embodiment of the present application, the sending a communication request to the smart door lock includes:
searching the intelligent door lock through Bluetooth near field communication, and establishing connection with the intelligent door lock;
and sending a communication request to the intelligent door lock based on the connection of the Bluetooth near field communication.
Further, in one embodiment of the present application, the communicating with the smart door lock based on the one-time symmetric key includes:
generating a random number;
acquiring an instruction to be transmitted, and encrypting the instruction and the random number based on the one-time symmetric key to obtain a transmission ciphertext;
the transmission ciphertext is sent to the intelligent door lock, so that the intelligent door lock decrypts the transmission ciphertext to obtain the instruction and the random number, the random number is checked, and the instruction is executed after the check is passed;
And accumulating the random numbers to obtain new random numbers, returning the instruction to be transmitted, and encrypting the instruction and the random numbers based on the one-time symmetric key to obtain a transmission ciphertext.
On the other hand, the embodiment of the application also provides a communication method of the intelligent door lock, which is applied to the intensive authentication platform and comprises the following steps:
receiving an encrypted message sent by a terminal device; the encryption message is obtained by encrypting a one-time symmetric key, serial number data of the intelligent door lock and a first signature value by the intelligent door lock through a platform public key of the intensive authentication platform; the one-time symmetric key is generated by the intelligent door lock in response to a communication request of the terminal equipment, and the first signature value is obtained by the intelligent door lock through signing the one-time symmetric key and the serial number data through a door lock private key of the intelligent door lock;
decrypting the encrypted message through a platform private key of the intensive authentication platform to obtain the disposable symmetric key, the serial number data and the first signature value, and checking the validity of the intelligent door lock through the serial number data and the first signature value;
And when the validity authentication of the intelligent door lock is confirmed to pass, the one-time symmetric key is sent to the terminal equipment, so that the terminal equipment communicates with the intelligent door lock based on the one-time symmetric key.
Further, in an embodiment of the present application, the verifying the validity of the smart door lock by the serial number data and the first signature value includes:
acquiring user information corresponding to the terminal equipment;
verifying the validity of the intelligent door lock according to the user information and the serial number data;
inquiring a door lock public key corresponding to the intelligent door lock according to the serial number data;
decrypting the first signature value through the door lock public key to obtain a first abstract value;
calculating a second digest value of the one-time symmetric key and the serial number data;
and verifying the validity of the intelligent door lock according to the first abstract value and the second abstract value.
On the other hand, the embodiment of the application also provides a communication method of the intelligent door lock, which is applied to the intelligent door lock and comprises the following steps:
receiving a communication request sent by terminal equipment, and generating a disposable symmetric key;
Acquiring serial number data of the intelligent door lock, a door lock private key and a platform public key of an centralized authentication platform;
signing the disposable symmetric key and the serial number data through the door lock private key to obtain a first signature value;
encrypting the one-time symmetric key, the serial number data and the first signature value through the platform public key to obtain an encrypted message;
sending the encrypted message to the terminal equipment, so that the terminal equipment sends the encrypted message to the intensive authentication platform and acquires the one-time symmetric key from the intensive authentication platform; the intensive authentication platform is used for decrypting the encrypted message through a platform private key of the intensive authentication platform to obtain the disposable symmetric key, the serial number data and the first signature value, checking the validity of the intelligent door lock through the serial number data and the first signature value, and sending the disposable symmetric key to the terminal equipment under the condition that the validity authentication of the intelligent door lock is passed;
and communicating with the terminal equipment based on the one-time symmetric key.
Further, in an embodiment of the present application, the communicating between the terminal device and the one-time symmetric key includes:
receiving a transmission ciphertext sent by the terminal equipment; the transmission ciphertext is obtained by encrypting an instruction and a random number by the terminal equipment based on the one-time symmetric key, and the random number is sequentially accumulated after the initial generation and following the number of the instructions transmitted by the terminal equipment in the communication;
decrypting the transmission ciphertext through the one-time symmetric key to obtain the instruction and the random number;
checking the random number, and executing the instruction if the random number does not appear in the communication; or if the random number appears in the communication, the instruction is not executed.
On the other hand, the embodiment of the application provides a communication system of an intelligent door lock, terminal equipment, the intelligent door lock and an integrated authentication platform;
the terminal equipment is used for sending a communication request to the intelligent door lock, receiving an encrypted message fed back by the intelligent door lock and sending the encrypted message to the intensive authentication platform; receiving the one-time symmetric key sent by the intensive authentication platform, and communicating with the intelligent door lock based on the one-time symmetric key;
The intensive authentication platform is used for receiving an encrypted message sent by the terminal equipment, decrypting the encrypted message through a platform private key of the intensive authentication platform to obtain the disposable symmetric key, the serial number data and the first signature value, and checking the validity of the intelligent door lock through the serial number data and the first signature value; when the validity authentication of the intelligent door lock is confirmed to pass, the one-time symmetric key is sent to the terminal equipment;
the intelligent door lock is used for receiving a communication request sent by the terminal equipment and generating a disposable symmetric key; acquiring serial number data of the intelligent door lock, a door lock private key and a platform public key of an centralized authentication platform; signing the disposable symmetric key and the serial number data through the door lock private key to obtain a first signature value; encrypting the one-time symmetric key, the serial number data and the first signature value through the platform public key to obtain an encrypted message; and sending the encrypted message to the terminal equipment, and communicating with the terminal equipment based on the one-time symmetric key.
In another aspect, an embodiment of the present application provides an electronic device, including:
At least one processor;
at least one memory for storing at least one program;
the at least one program, when executed by the at least one processor, causes the at least one processor to implement the method of communication for a smart door lock of the first aspect.
In another aspect, an embodiment of the present application further provides a computer readable storage medium, in which a program executable by a processor is stored, where the program executable by the processor is used to implement the communication method of the intelligent door lock according to the first aspect.
The advantages and benefits of the application will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the application.
The embodiment of the application provides a communication method, a system, equipment and a medium of an intelligent door lock, which are used for sending a communication request to the intelligent door lock and receiving an encrypted message fed back by the intelligent door lock; the encryption message is obtained by encrypting a disposable symmetric key, serial number data of the intelligent door lock and a first signature value by the intelligent door lock through a platform public key of an intensive authentication platform; the one-time symmetric key is generated by the intelligent door lock in response to the communication request, and the first signature value is obtained by the intelligent door lock through signing the one-time symmetric key and the serial number data by a door lock private key of the intelligent door lock; the encrypted message is sent to the intensive authentication platform, so that the intensive authentication platform decrypts the encrypted message through a platform private key of the intensive authentication platform to obtain the one-time symmetric key, the serial number data and the first signature value, and the validity of the intelligent door lock is checked through the serial number data and the first signature value; and receiving the one-time symmetric key sent by the intensive authentication platform under the condition that the validity authentication of the intelligent door lock is passed, and communicating with the intelligent door lock based on the one-time symmetric key. According to the technical scheme, the platform public key of the intensive authentication platform is written into the factory firmware of the intelligent door lock, and the platform private key is stored in the intensive authentication platform and cannot be transmitted outside, so that only legal terminal equipment can be ensured to acquire the disposable symmetric key for communicating with the intelligent door lock through the intensive authentication platform, the safety of the intelligent door lock can be greatly improved, and the use experience of a user is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the following description is made with reference to the accompanying drawings of the embodiments of the present application or the related technical solutions in the prior art, and it should be understood that the drawings in the following description are only for convenience and clarity of describing some embodiments in the technical solutions of the present application, and other drawings may be obtained according to these drawings without the need of inventive labor for those skilled in the art.
Fig. 1 is an implementation environment schematic diagram of a communication method of an intelligent door lock provided in an embodiment of the present application;
fig. 2 is a flow chart of a communication method of a first intelligent door lock according to an embodiment of the present application;
fig. 3 is a schematic flow chart of implementing communication between a terminal device and an intelligent door lock according to an embodiment of the present application;
fig. 4 is a flow chart of a communication method of a second intelligent door lock according to an embodiment of the present application;
fig. 5 is a schematic flow chart of checking validity of an intelligent door lock according to an embodiment of the present application;
fig. 6 is a flow chart of a communication method of a third intelligent door lock according to an embodiment of the present application;
Fig. 7 is a schematic flow chart of processing a transmission ciphertext by an intelligent door lock according to an embodiment of the application;
fig. 8 is a schematic flow chart of a specific implementation of a communication method of an intelligent door lock according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of an electronic device according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of another electronic device according to an embodiment of the present application.
Detailed Description
Embodiments of the present application are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are illustrative only and are not to be construed as limiting the application. The step numbers in the following embodiments are set for convenience of illustration only, and the order between the steps is not limited in any way, and the execution order of the steps in the embodiments may be adaptively adjusted according to the understanding of those skilled in the art.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein is for the purpose of describing embodiments of the application only and is not intended to be limiting of the application.
1) Asymmetric encryption, which is an encryption algorithm, uses two associated keys, namely a public key and a private key. The public key is used to encrypt data and the private key is used to decrypt data. In asymmetric encryption, the public key can be obtained by anyone, while the private key can only be kept by the key holder. By using public key encrypted data, decryption is only possible using the corresponding private key. This encryption ensures confidentiality of the data, since only the private key holder can decrypt the data. Asymmetric encryption also has the function of digital signature. The data is signed by using the private key, so that the integrity and identity verification of the data can be ensured. Anyone can verify the digital signature using the public key to confirm that the data has not been tampered with and that the identity of the sender is legitimate. Common asymmetric encryption algorithms include RSA, ECC, national encryption SM9, and the like.
2) Symmetric key, an encryption algorithm that uses the same key in both encryption and decryption processes. In symmetric encryption, the same key is used to encrypt and decrypt data. The symmetric key algorithm is characterized by fast encryption and decryption speed, and is suitable for encrypting and decrypting a large amount of data. Since the same key is used for encryption and decryption, security of the key needs to be ensured, and only an authorized user can acquire the key and perform decryption operation.
3) RSA (Rivest-Shamir-Adleman) is an asymmetric encryption algorithm based on large-scale factorization, and can also be used for digital signatures. RSA uses public and private keys by which data is signed, and public keys are used to verify the legitimacy of digital signatures.
4) ECC (Elliptic Curve Cryptography) is an elliptic curve-based asymmetric encryption algorithm that can also be used for digital signatures. Compared with RSA, ECC has higher security and efficiency. It uses points on elliptic curves and related mathematical operations to implement encryption and signature functions.
5) The cryptographic SM9 is an asymmetric cryptographic algorithm intended to provide higher security and performance. The SM9 algorithm combines elliptic curve and identity-based cryptography, and can be used for realizing functions of asymmetric encryption, digital signature, key exchange and the like.
6) Bluetooth Near Field Communication (NFC) technology (Bluetooth Near Field Communication) is a communication method that combines Bluetooth technology and NFC technology (Near Field Communication, NFC). NFC, among other things, is a short-range wireless communication technology that allows devices to exchange data without contact. The method is generally used for application scenes such as mobile payment, intelligent access control, bus cards and the like. Bluetooth technology is a technology for wireless communication between devices, typically for establishing a Personal Area Network (PAN), enabling data transfer and communication between devices. Bluetooth near field communication technology can realize wireless communication between devices within a short distance by combining bluetooth and NFC technology. The technology combines the high-speed transmission of Bluetooth and the low power consumption and the safety of NFC, and provides a more flexible and convenient communication mode.
With the advancement of society and the change of life style, the requirements of people on access control systems are also increasing. The physical key of the traditional door lock has some inconveniences, such as inconvenient carrying, easy losing, easy copying and the like. Meanwhile, the door lock has some problems in terms of safety and is easy to pry open or damage. Along with the development of electronic technology, biological recognition technology and communication technology, the realization of intelligent door lock becomes possible, and technologies such as fingerprint identification, password input can improve access control system's security, and the development of wireless communication technology makes remote control possible, and the popularization of smart mobile phone provides convenience for intelligent door lock's remote control.
The intelligent door lock is a door lock system realized by using advanced technology, and generally comprises functions of electronic lock, fingerprint identification, password input, mobile phone remote control and the like. The intelligent door lock can replace a traditional physical key, provides a more convenient and safe access control mode, and can be unlocked in various modes such as fingerprint, password, card swiping, mobile phone APP and the like. Advantages of smart door locks over traditional keys include, but are not limited to:
1. convenient and fast: the key is not required to be carried, and the lock can be quickly unlocked by means of fingerprints, passwords and the like.
2. Safety and reliability: the fingerprint identification, password input and other technologies can improve the safety of the door lock and prevent the key from being lost or copied.
3. Remote control: remote unlocking and monitoring of door lock states can be achieved through the mobile phone APP, and management and control are convenient.
4. Record management: the intelligent door lock can record unlocking time, mode and other information, and is convenient for a user to manage and inquire.
The intelligent door lock meets the requirements of people on a convenient and safe access control system, provides a more convenient and safe unlocking mode, ensures that access control is more intelligent and efficient, and is widely applied.
In the related art, when many intelligent door locks in the market leave the factory, an encryption key is pre-written in door lock firmware or the encryption key used by a session is negotiated through a private key and an convergence authentication platform preset in the door lock firmware, and then the encryption key is granted to legal terminal equipment, so that the terminal equipment can control the intelligent door locks.
Illustratively, conventional application of smart door lock encryption keys on the market-: writing in an encryption key when the intelligent door locks leave the factory, inputting an encryption key list corresponding to each intelligent door lock in an intensive authentication platform, and directly using the symmetric key to realize the encryption communication with the authorized terminal equipment. Conventional application of encryption key of intelligent door lock on the market is II: an asymmetric private key is preset on each intelligent door lock, an asymmetric private key of the intelligent door lock and a platform public key of an intensive authentication platform preset in the intelligent door lock are used for negotiating a symmetric key during each communication, a key negotiation algorithm is used for negotiating the same symmetric key on the intensive authentication platform side, the public key of the intelligent door lock and the platform private key are used for negotiating the same symmetric key, and then the intensive authentication platform (and authorized terminal equipment) and the intelligent door lock are used for encrypting communication by using the symmetric key.
However, in practical applications, both of the above methods are found to have the following security risks: the session encryption key of these 2 conventional methods is fixed for each smart door lock. If lawless persons decompil and crack the intelligent door lock to obtain information written in the intelligent door lock firmware or the intelligent door lock firmware information list of a manufacturer is revealed, lawless persons can utilize fake legal authorized users to unlock the intelligent door lock which is installed by others without connecting an intensive authentication platform for authentication, so that the safety of the intelligent door lock is reduced and the use experience is poor.
In view of this, in the embodiment of the present application, a communication method, a system, an apparatus, and a medium for an intelligent door lock are provided, where in the method in the embodiment of the present application, a platform public key of an intensive authentication platform is written in factory firmware of the intelligent door lock, and a platform private key is only stored in the intensive authentication platform and is not transmitted outside, so that only legal terminal devices can be ensured to obtain a disposable symmetric key for communication with the intelligent door lock through the intensive authentication platform, security of the intelligent door lock can be greatly improved, and use experience of a user is improved.
Referring to fig. 1, fig. 1 is a schematic diagram illustrating an implementation environment of a communication method of an intelligent door lock according to an embodiment of the present application. In this implementation environment, the main hardware and software bodies include a terminal device 110, an intensive authentication platform 120, and an intelligent door lock 130.
In the embodiment of the present application, a related application program may be installed in the terminal device 110, and the application program may be software matched with the intelligent door lock 130, based on the application program, the terminal device 110 may communicate with the intelligent door lock 130, and transmit a related instruction, so as to implement control of the intelligent door lock 130. Of course, during communication, the validity of the terminal device 110 needs to be checked, and when the validity of the terminal device 110 passes, the communication with the intelligent door lock 130 can be performed normally. The intensive authentication platform 120 is a platform for implementing validity verification of the terminal device 110, the intelligent door lock 130, and may store related user information, serial number data of the intelligent door lock 130, and a door lock public key of the intelligent door lock 130 in advance, and store a platform private key securely. At the smart door lock 130, then, the own door lock private key, serial number data, and the platform public key of the converged authentication platform 120 may be stored.
The communication method of the intelligent door lock provided in the embodiment of the application can be implemented based on interaction among the terminal device 110, the intensive authentication platform 120 and the intelligent door lock 130.
Specifically, in the embodiment of the present application, a user may use the terminal device 110 to send a communication request to the intelligent door lock 130, the intelligent door lock 130 generates a disposable symmetric key and returns an encrypted message to the terminal device 110, the terminal device 110 may transmit the encrypted message to the intensive authentication platform 120 to perform validity verification, and after the validity authentication is passed, the intensive authentication platform 120 will send the disposable symmetric key used by the session between the terminal device 110 and the intelligent door lock 130, so that the terminal device 110 may use the disposable symmetric key to implement communication with the intelligent door lock 130.
The terminal device 110 of the above embodiment may include, but is not limited to, a smart phone, a tablet computer, a notebook computer, a desktop computer, a smart watch, and a vehicle-mounted terminal.
The intensive authentication platform 120 may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, CDNs (Content Delivery Network, content delivery networks), basic cloud computing services such as big data and artificial intelligence platforms, and the like.
The intelligent door lock 130 may be any product available in the market, which is not limited by the present application.
Communication connections may be established between the terminal device 110 and the converged authentication platform 120, and between the terminal device 110 and the smart door lock 130, through a wireless network or a wired network. The wireless network or wired network may be configured as the internet, using standard communication techniques and/or protocols, or any other network including, for example, but not limited to, a local area network (Local Area Network, LAN), metropolitan area network (Metropolitan Area Network, MAN), wide area network (Wide Area Network, WAN), mobile, wired or wireless network, a private network, or any combination of virtual private networks. The software and hardware main bodies can adopt the same communication connection mode or different communication connection modes, and the application is not particularly limited.
Of course, it can be understood that the implementation environment in fig. 1 is only some optional application scenarios of the communication method of the intelligent door lock provided in the embodiment of the present application, and the actual application is not fixed to the software and hardware environment shown in fig. 1.
The following describes and explains a communication method of an intelligent door lock provided in the embodiment of the present application in conjunction with the foregoing description of an implementation environment.
Referring to fig. 2, fig. 2 is a schematic diagram of a communication method of an intelligent door lock according to an embodiment of the present application, where the communication method of the intelligent door lock is applied to a terminal device, and specifically includes, but is not limited to:
step 210, sending a communication request to the intelligent door lock, and receiving an encrypted message fed back by the intelligent door lock; the encryption message is obtained by encrypting a disposable symmetric key, serial number data of the intelligent door lock and a first signature value by the intelligent door lock through a platform public key of an intensive authentication platform; the one-time symmetric key is generated by the intelligent door lock in response to the communication request, and the first signature value is obtained by the intelligent door lock through signing the one-time symmetric key and the serial number data by a door lock private key of the intelligent door lock;
In the embodiment of the application, when the terminal equipment is used for controlling the intelligent door lock, the terminal equipment needs to be ensured to have control authority on the intelligent door lock, and in order to ensure the privacy of information transmission between the terminal equipment and the intelligent door lock as much as possible, the contents transmitted by the terminal equipment and the intelligent door lock need to be encrypted, so that an encryption key used between the terminal equipment and the intelligent door lock needs to be negotiated. In the embodiment of the application, a symmetric key can be used between the terminal equipment and the intelligent door lock, and the symmetric key is an encryption algorithm using the same key in the encryption and decryption processes, and because the same key is used for encryption and decryption, the security of the key needs to be ensured, and only an authorized user can acquire the key and perform decryption operation. Therefore, how to implement the encryption key negotiation between the terminal device and the intelligent door lock is an important point in the present application.
In the embodiment of the application, when the intelligent door lock leaves a factory, the door lock key, the serial number data and the platform public key of the centralized authentication platform can be stored in advance. The door lock key of the intelligent door lock is stored by the intelligent door lock device and is not disclosed, and serial number data of the intelligent door lock device can be used for uniquely identifying each intelligent door lock, and different intelligent door locks correspond to different serial number data. The user can use the terminal device to establish a binding relationship with the intelligent door lock through the serial number data, so that the user can be conveniently determined to be a legal owner of the intelligent door lock. In the embodiment of the application, the platform public key of the intensive authentication platform can be disclosed and stored in the intelligent door lock, so that the intelligent door lock can encrypt some data in the authentication process conveniently and transmit the encrypted data to the intensive authentication platform for decryption. At the intensive authentication platform, the public key of the door lock of each intelligent door lock, serial number data corresponding to the intelligent door lock and a platform private key of the intelligent door lock can be stored in advance, the platform private key is not disclosed in confidentiality, the public key can be used for decrypting data encrypted by the public key of the platform, and the public key of the door lock of the intelligent door lock can be used for verifying the digital signature of the intelligent door lock.
Specifically, in this step, when the terminal device needs to issue an instruction to the intelligent door lock, a communication request may be sent to the intelligent door lock, and then an encrypted message fed back by the intelligent door lock is received. The encryption message is obtained by encrypting the disposable symmetric key, the serial number data of the intelligent door lock and a first signature value by using a platform public key of the intensive authentication platform by the intelligent door lock, and the first signature value is obtained by signing the disposable symmetric key and the serial number data by the intelligent door lock through a door lock private key of the intelligent door lock. Specifically, the encrypted message is generated at the intelligent door lock, and the generation flow comprises the following steps:
receiving a communication request sent by terminal equipment, and generating a disposable symmetric key;
acquiring serial number data of the intelligent door lock, a door lock private key and a platform public key of an centralized authentication platform;
signing the disposable symmetric key and the serial number data through the door lock private key to obtain a first signature value;
and encrypting the one-time symmetric key, the serial number data and the first signature value through the platform public key to obtain an encrypted message.
In the embodiment of the application, the intelligent door lock can randomly generate a disposable symmetric key after receiving the communication request sent by the terminal equipment, and the specific adopted symmetric key algorithm is not limited herein, and exemplary common symmetric key algorithms comprise DES (Data Encryption Standard), 3DES (Triple DES), AES (Advanced Encryption Standard) and the like, which are widely used in data transmission, storage and communication, so that security guarantee is provided for data confidentiality.
After the disposable symmetric key is obtained, the intelligent door lock can obtain locally stored serial number data of the intelligent door lock, a door lock private key and a platform public key of an centralized authentication platform. Then, the lock private key is used for signing the disposable symmetric key and the serial number data, and a first signature value is obtained. And then, encrypting the one-time symmetric key, the serial number data and the first signature value by using the platform public key to obtain an encrypted message. Specifically, in the embodiment of the application, the intelligent door lock can realize digital signature by adopting asymmetric signature modes such as RSA, ECC, SM9, and the like, and the application is not limited to the method.
Step 220, sending the encrypted message to the intensive authentication platform, so that the intensive authentication platform decrypts the encrypted message through a platform private key of the intensive authentication platform to obtain the one-time symmetric key, the serial number data and the first signature value, and verifies the validity of the intelligent door lock through the serial number data and the first signature value;
in this step, after receiving the encrypted message, the terminal device may transmit the encrypted message to the intensive authentication platform. At the intensive authentication platform, the encrypted message can be decrypted by using a platform private key stored by the intensive authentication platform, so that a one-time symmetric key, serial number data and a first signature value are obtained. And the intensive authentication platform can also obtain data through decryption and check the validity of the intelligent door lock, so that whether the terminal equipment has authority to control the intelligent door lock is identified.
It can be understood that in the embodiment of the application, for the validity check of the intelligent door lock, if the check passes, the validity authentication passes, the terminal equipment has relevant authority, the encrypted message is not tampered in the transmission process, and the method has true reliability, and at the moment, the one-time symmetric key can be issued for the terminal equipment based on the content decrypted by the encrypted message, so that the terminal equipment can realize normal communication with the intelligent door lock. In contrast, if the verification is not passed, the validity authentication is not passed, which may be that the terminal device does not have the relevant authority, the relevant private key or public key at the intelligent door lock is wrong, or the encrypted message is tampered in the transmission process, which may cause that the intelligent door lock is difficult to safely and reliably use, and the risk of being invaded exists, so that the terminal device is not authorized at this time, and the occurrence probability of the intelligent door lock being invaded is reduced.
Step 230, receiving the one-time symmetric key sent by the intensive authentication platform when the validity authentication of the intelligent door lock passes, and communicating with the intelligent door lock based on the one-time symmetric key.
In this step, when the validity authentication of the intelligent door lock passes, the intensive authentication platform will issue a one-time symmetric key, and based on the one-time symmetric key, the terminal device can perform normal communication with the intelligent door lock, for example, issue an instruction, and perform operations such as door opening and door closing. It should be noted that, when the terminal device does not acquire the one-time symmetric key, it can establish communication connection with the intelligent door lock, but the two are limited to transmitting related data for validity verification, such as a communication request and an encrypted message, and the terminal device does not have the right to control the intelligent door lock and cannot normally issue an instruction. The control of the intelligent door lock can be realized only after the terminal equipment obtains the one-time symmetric key from the intensive authentication platform.
It can be understood that in the embodiment of the application, the control authority of the intelligent door lock can be granted to the terminal equipment after being checked by the intensive authentication platform, and even if the related information stored in the intelligent door lock is leaked, as long as the private key at the intensive authentication platform is ensured to be safe, an intruder cannot decrypt to obtain the disposable symmetric key, and the intruder cannot be opened by a counterfeit user, so that the use safety of the intelligent door lock can be greatly improved.
In the embodiment of the application, the platform public key of the intensive authentication platform belongs to public information and can be written in the door lock factory firmware. The platform private key of the intensive authentication platform belongs to secret information, is only stored in the intensive authentication platform, and cannot be transmitted to a client side or an intelligent door lock of the terminal equipment or appear in a client side code or an intelligent door lock code. Therefore, the only requirement is to ensure that the platform private key is stored securely, the operability of only securely storing one value is much stronger than that of securely storing the firmware information of each intelligent door lock, the intensive authentication platform can be maintained by special staff, the platform is not required to be put into the market like the intelligent door locks, and the probability of being attacked and decoded is much lower. Moreover, the door lock firmware information generally needs to be written to a manufacturer or a foundry of the intelligent door lock, and cannot be guaranteed to be leaked. Therefore, in the embodiment of the application, the intelligent door lock writes the platform public key of the intensive authentication platform in the factory firmware, and the platform private key is only stored in the intensive authentication platform and is not transmitted outside, so that only legal terminal equipment can be ensured to acquire the disposable symmetric key for communicating with the intelligent door lock through the intensive authentication platform, the safety of the intelligent door lock can be greatly improved, and the use experience of a user is improved.
In some embodiments, the sending a communication request to the smart door lock includes:
searching the intelligent door lock through Bluetooth near field communication, and establishing connection with the intelligent door lock;
and sending a communication request to the intelligent door lock based on the connection of the Bluetooth near field communication.
In the embodiment of the application, the terminal equipment can use the Bluetooth near field communication technology when establishing communication connection with the intelligent door lock. Specifically, the bluetooth function can be opened on the terminal device, and the intelligent door lock is searched through bluetooth near field communication, so that connection is established with the intelligent door lock. Then, based on connection of Bluetooth near field communication, a communication request can be sent to the intelligent door lock to request control authority of the intelligent door lock so as to realize issuing of related instructions.
It should be noted that, in the embodiment of the present application, the intelligent door lock does not need to be networked when receiving the instruction, and only needs to connect the terminal device with the intensive authentication platform, and the intelligent door lock indicates that the terminal device currently in communication is an authorized terminal device by judging that the terminal device currently in communication can decrypt through the intensive authentication platform, so as to receive and execute the corresponding instruction. Because only the intensive authentication platform can decrypt the information encrypted by the public key of the platform used by the intelligent door lock to obtain the disposable symmetric key used for communicating with the intelligent door lock, the identity verification of the intelligent door lock to the terminal equipment and the intensive authentication platform can be indirectly realized, and the unlocking safety is ensured.
In some embodiments, referring to fig. 3, the communicating with the smart door lock based on the one-time symmetric key includes:
step 310, generating a random number;
step 320, obtaining an instruction to be transmitted, and encrypting the instruction and the random number based on the one-time symmetric key to obtain a transmission ciphertext;
step 330, sending the transmission ciphertext to the intelligent door lock, so that the intelligent door lock decrypts the transmission ciphertext to obtain the instruction and the random number, verifies the random number, and executes the instruction after the verification is passed;
and 340, accumulating the random numbers to obtain new random numbers, returning the acquired instructions to be transmitted, and encrypting the instructions and the random numbers based on the one-time symmetric key to obtain a transmission ciphertext.
In the embodiment of the application, when the terminal equipment uses the one-time symmetric key to communicate with the intelligent door lock, a random number can be generated before the instruction is sent for the first time. And then acquiring an instruction to be transmitted, and encrypting the instruction and the random number based on the one-time symmetric key to obtain a transmission ciphertext. On the intelligent door lock side, the transmission ciphertext can be decrypted by using the one-time symmetric key, the random number is verified, and the instruction can be selectively executed after the verification is passed. Specifically, here, the check on the random number is to detect whether the random number has occurred in the communication of this time, and if not, an instruction may be executed, and if so, the instruction is not executed. For the terminal device, each time it issues an instruction, the random numbers are accumulated, i.e. the current random number is added with 1 to obtain a new random number, and then the transmission ciphertext is generated again according to the instruction to be transmitted and the new random number. Thus, the intelligent door lock can effectively prevent replay attack.
In the embodiment of the application, when the communication connection between the terminal equipment and the intelligent door lock is disconnected, the intelligent door lock can clear the one-time symmetric key until the next time the terminal equipment initiates a communication request, and a new one-time symmetric key is regenerated, so that the randomness of the symmetric key used in each communication can be ensured, and the safety and reliability of the intelligent door lock are improved.
Referring to fig. 4, fig. 4 is a schematic diagram of another communication method of an intelligent door lock according to an embodiment of the present application, where the communication method of an intelligent door lock is applied to an intensive authentication platform, and specifically includes, but is not limited to:
step 410, receiving an encrypted message sent by a terminal device; the encryption message is obtained by encrypting a one-time symmetric key, serial number data of the intelligent door lock and a first signature value by the intelligent door lock through a platform public key of the intensive authentication platform; the one-time symmetric key is generated by the intelligent door lock in response to a communication request of the terminal equipment, and the first signature value is obtained by the intelligent door lock through signing the one-time symmetric key and the serial number data through a door lock private key of the intelligent door lock;
step 420, decrypting the encrypted message through a platform private key of the intensive authentication platform to obtain the disposable symmetric key, the serial number data and the first signature value, and verifying the validity of the intelligent door lock through the serial number data and the first signature value;
Step 430, when determining that the validity authentication of the intelligent door lock is passed, sending the one-time symmetric key to the terminal device, so that the terminal device communicates with the intelligent door lock based on the one-time symmetric key.
In the embodiment of the application, for the intensive authentication platform, the intensive authentication platform can receive the encrypted message sent by the terminal equipment, and then the platform private key of the intensive authentication platform is used for decrypting the encrypted message to obtain the one-time symmetric key, the serial number data and the first signature value. Because only the intensive authentication platform has the platform private key, only the intensive authentication platform can decrypt the encrypted message to obtain the disposable symmetric key, and the safety of the disposable symmetric key can be ensured. The decrypted serial number data and the first signature value can be used for verifying the validity of the intelligent door lock.
Specifically, referring to fig. 5, the verifying the validity of the intelligent door lock according to the serial number data and the first signature value includes:
step 510, obtaining user information corresponding to the terminal equipment;
step 520, verifying the validity of the intelligent door lock according to the user information and the serial number data;
Step 530, inquiring a door lock public key corresponding to the intelligent door lock according to the serial number data;
step 540, decrypting the first signature value through the door lock public key to obtain a first digest value;
step 550, calculating a second digest value of the one-time symmetric key and the serial number data;
and step 560, verifying the validity of the intelligent door lock according to the first digest value and the second digest value.
In the embodiment of the application, the intensive authentication platform can acquire the user information corresponding to the terminal equipment when verifying the validity, and can inquire whether the user information is the owner of the intelligent door lock corresponding to the serial number data according to the user information, so that the validity of the intelligent door lock is judged, and if the user information is determined to correspond to the serial number data, namely the serial number data in the encrypted message is used when the user is registered, the validity authentication of the user identity is demonstrated. Of course, in the embodiment of the present application, the validity of the encrypted message itself should be further checked. Specifically, a door lock public key corresponding to the intelligent door lock can be queried according to the serial number data, and then the first signature value is decrypted by using the door lock public key, so that a digest value can be obtained and recorded as a first digest value. And, the digest value of the one-time symmetric key and the serial number data obtained by decrypting the encrypted message can be calculated and recorded as a second digest value. The first signature value is obtained by signing the disposable symmetric key and the serial number data through a door lock private key of the intelligent door lock, so that if an encrypted message is not tampered or has errors, the first digest value and the second digest value obtained after decryption are the same, the validity of the intelligent door lock can be checked according to the first digest value and the second digest value, and if the first digest value and the second digest value are the same, the validity authentication of the encrypted message layer passes; if the two are different, the validity authentication is not passed. In the embodiment of the application, when the user identity and the validity of the encrypted message layer pass the authentication, the validity authentication of the intelligent door lock can be determined to pass; when any one of the two certificates fails, the validity certification of the intelligent door lock can be determined to be failed.
In the embodiment of the application, when the validity authentication of the intelligent door lock is determined to pass, the intensive authentication platform can send the one-time symmetric key to the terminal equipment so that the terminal equipment can communicate with the intelligent door lock based on the one-time symmetric key. Specifically, the intensive authentication platform can establish an https encryption channel with the terminal equipment, and the one-time symmetric key is sent to the terminal equipment through the https encryption channel.
Referring to fig. 6, fig. 6 is a schematic diagram of another communication method of an intelligent door lock according to an embodiment of the present application, where the communication method of an intelligent door lock is applied to an intelligent door lock, and specifically includes, but is not limited to:
step 610, receiving a communication request sent by a terminal device, and generating a one-time symmetric key;
step 620, obtaining serial number data of the intelligent door lock, a door lock private key and a platform public key of an centralized authentication platform;
step 630, signing the disposable symmetric key and the serial number data through the door lock private key to obtain a first signature value;
step 640, encrypting the one-time symmetric key, the serial number data and the first signature value through the platform public key to obtain an encrypted message;
Step 650, sending the encrypted message to the terminal device, so that the terminal device sends the encrypted message to the intensive authentication platform, and obtains the one-time symmetric key from the intensive authentication platform; the intensive authentication platform is used for decrypting the encrypted message through a platform private key of the intensive authentication platform to obtain the disposable symmetric key, the serial number data and the first signature value, checking the validity of the intelligent door lock through the serial number data and the first signature value, and sending the disposable symmetric key to the terminal equipment under the condition that the validity authentication of the intelligent door lock is passed;
step 660, communicating with the terminal device based on the one-time symmetric key.
In the embodiment of the application, for the intelligent door lock, the intelligent door lock can receive the communication request sent by the terminal equipment, generate the disposable symmetric key, and acquire the locally stored serial number data of the intelligent door lock, the door lock private key and the platform public key of the centralized authentication platform. Then, the lock private key is used for signing the disposable symmetric key and the serial number data, and a first signature value is obtained. And then, encrypting the one-time symmetric key, the serial number data and the first signature value by using the platform public key to obtain an encrypted message. Then, the intelligent door lock may send the encrypted message to the terminal device, so that the terminal device sends the encrypted message to the intensive authentication platform, and obtains the one-time symmetric key from the intensive authentication platform, where the process of this part is described in the foregoing embodiments of the terminal device side and the intensive authentication platform side, and will not be described herein. The intelligent door lock can then communicate with the terminal device based on the one-time symmetric key.
It may be understood that in the embodiment of the present application, the smart door lock encrypts the encrypted message by using the platform public key, and then sends the encrypted message to the intensive authentication platform through the terminal device, the intensive authentication platform decrypts the one-time symmetric key by using its own platform private key, and then sends the one-time symmetric key to the terminal device through the encryption channel between the platform and the terminal device. The terminal device communicates with the intelligent door lock using the one-time symmetric key. If the communication is successful, the disposable symmetric key of the intelligent door lock side is identical with the disposable symmetric key obtained by the terminal equipment through the intensive authentication platform, and the terminal equipment is authenticated through the legal platform, so that the intelligent door lock can check the legitimacy of the terminal equipment and the intensive authentication platform.
Specifically, in some embodiments, referring to fig. 7, the communicating based on the one-time symmetric key and the terminal device includes:
step 710, receiving a transmission ciphertext sent by the terminal equipment; the transmission ciphertext is obtained by encrypting an instruction and a random number by the terminal equipment based on the one-time symmetric key, and the random number is sequentially accumulated after the initial generation and following the number of the instructions transmitted by the terminal equipment in the communication;
Step 720, decrypting the transmission ciphertext through the one-time symmetric key to obtain the instruction and the random number;
step 730, checking the random number, and executing the instruction if the random number does not appear in the communication; or if the random number appears in the communication, the instruction is not executed.
In the embodiment of the application, when the terminal equipment uses the disposable symmetric key to communicate with the intelligent door lock, a random number can be added, the random number is generated when an instruction is sent for the first time, and the random number is added by 1 after the number of the instructions transmitted in the communication is accumulated in turn, namely, each time an instruction message is transmitted. For the smart door lock, it may decrypt the transmission ciphertext using a one-time symmetric key and verify the random number, and after the verification passes, the instruction may be selectively executed. Specifically, here, the check on the random number is to detect whether the random number has occurred in the communication of this time, and if not, an instruction may be executed, and if so, the instruction is not executed.
It can be understood that the embodiment of the application provides a communication method, a system, a device and a medium of an intelligent door lock, and the method in the embodiment of the application has the advantages that the intelligent door lock writes the platform public key of the intensive authentication platform in the factory firmware, the platform private key is only stored in the intensive authentication platform and is not transmitted outside, only legal terminal equipment can be ensured to acquire the disposable symmetric key for communicating with the intelligent door lock through the intensive authentication platform, the safety of the intelligent door lock can be greatly improved, and the use experience of a user is improved.
The following describes and illustrates the technical scheme of the present application in connection with a specific application scenario example.
Referring to fig. 8, fig. 8 is a schematic diagram illustrating a specific implementation flow of a communication method of an intelligent door lock according to an embodiment of the present application.
In the embodiment of the application, the terminal equipment side can be provided with the software client related to the intelligent door lock, and the communication method of the intelligent door lock provided by the embodiment of the application can be executed on the terminal equipment side based on the software client. Specifically, in the embodiment of the application, a manufacturer of the intelligent door lock can input the door lock serial number of the intelligent door lock and the door lock public key of each intelligent door lock in the intensive authentication platform in advance and record the corresponding relation of the door lock serial number and the door lock public key to form a corresponding list, and the intensive authentication platform stores the platform private key of the manufacturer and discloses the platform public key when the intensive authentication platform is built. For each intelligent door lock, a door lock key, serial number data and a platform public key of an centralized authentication platform of the intelligent door lock are preset in door lock firmware.
When the terminal equipment uses the client to request communication, the intelligent door lock randomly generates a disposable symmetric key, and uses the door lock private key to sign the disposable symmetric key and serial number data of the intelligent door lock to obtain a first signature value. Then, the intelligent door lock encrypts the one-time symmetric key, the serial number data of the intelligent door lock and the first signature value by using a platform public key of the intensive authentication platform to obtain an encrypted message, the encrypted message is sent to the terminal equipment, and the terminal equipment sends the encrypted message to the intensive authentication platform. The intensive authentication platform can decrypt the encrypted message by using the platform private key to obtain a disposable symmetric key, serial number data and a first signature value, and verify the validity of the intelligent door lock by the serial number data and the first signature value. When the legitimacy authentication is passed, the intensive authentication platform sends the disposable symmetric key to the terminal equipment through the https encryption channel, the client of the terminal equipment automatically generates a random number, the disposable symmetric key is subsequently used for communication with the random number and the intelligent door lock, and the random number is accumulated by 1 when the instruction is transmitted each time. The intelligent door lock can decrypt the ciphertext sent by the client of the terminal equipment to obtain an instruction and a random number, judge whether the random number appears, execute the instruction if not, not execute the instruction if so, and store the collected random number. When the communication connection between the terminal equipment and the intelligent door lock is disconnected, the intelligent door lock clears the one-time symmetric key and the stored random number, and waits for the next communication request of the terminal equipment.
The method provided by the embodiment of the application has at least the following beneficial effects:
in the embodiment of the application, the intelligent door lock does not need networking when receiving the instruction, and only needs the client networking of the terminal equipment to connect with the intensive authentication platform, and the intelligent door lock determines whether the terminal equipment is authorized terminal equipment or not by judging that the terminal equipment in current communication can decrypt through the intensive authentication platform. Because only the intensive authentication platform can decrypt the information encrypted by the public key of the platform, the authentication of the intelligent door lock to the terminal equipment is indirectly realized, and the unlocking safety is ensured.
In the embodiment of the application, even if the door lock firmware information is leaked, the intelligent door lock cannot be opened by the counterfeit client as long as the safety of the private key stored in the intensive authentication platform is ensured, so that the safety is improved.
In the embodiment of the application, the platform public key belongs to public information and can be written in the door lock factory firmware. The platform private key belongs to secret information, is only stored in the intensive authentication platform, and cannot be transmitted to a client or a door lock, and cannot appear in a client code or a door lock code. Only one value of the platform private key needs to be ensured to be stored safely and privately, the operability of only storing one value is much stronger than that of storing the firmware information of each intelligent door lock safely, and the firmware information of the intelligent door lock needs to be written into a door lock manufacturer or a foundry, so that the safety of the intelligent door lock is difficult to ensure. In the embodiment of the application, even if the door lock firmware information is acquired by lawless persons due to the leakage of the door lock firmware information list of the manufacturer and the like, the intelligent door lock can not be opened by the instruction sent by the counterfeit client after being installed. The reason is that the intelligent door lock in the embodiment of the application randomly generates different symmetric keys for one connection at a time, the symmetric keys are encrypted by using the platform public key, and only the legal client is connected with the legal intensive authentication platform for decryption.
In the embodiment of the application, the door lock private key in the door lock firmware is only used for signing and checking the door lock identity, does not participate in encryption and authentication of the intensive authentication platform or the client, and for the intelligent door lock, the unlocking safety is the most important for the intelligent door lock to authenticate the identity of the client and the intensive authentication platform, so that the authentication reliability can be improved, and the probability of being attacked is reduced.
In the embodiment of the application, each instruction random number is added with 1, and the intelligent door lock end judges whether the random number appears or not to prevent replay attack.
In the embodiment of the application, the intelligent door lock signs the serial number data by using the door lock private key, and because the door lock public key of the intelligent door lock is input into the intensive authentication platform in advance and corresponds to the serial number data of the intelligent door lock, the intensive authentication platform can verify the signature by using the door lock public key corresponding to the intelligent door lock, thereby confirming the legal identity of the intelligent door lock.
In an embodiment of the present application, there is also provided a communication system of an intelligent door lock, including: terminal equipment, an intelligent door lock and an centralized authentication platform;
the terminal equipment is used for sending a communication request to the intelligent door lock, receiving an encrypted message fed back by the intelligent door lock and sending the encrypted message to the intensive authentication platform; receiving the one-time symmetric key sent by the intensive authentication platform, and communicating with the intelligent door lock based on the one-time symmetric key;
The intensive authentication platform is used for receiving an encrypted message sent by the terminal equipment, decrypting the encrypted message through a platform private key of the intensive authentication platform to obtain the disposable symmetric key, the serial number data and the first signature value, and checking the validity of the intelligent door lock through the serial number data and the first signature value; when the validity authentication of the intelligent door lock is confirmed to pass, the one-time symmetric key is sent to the terminal equipment;
the intelligent door lock is used for receiving a communication request sent by the terminal equipment and generating a disposable symmetric key; acquiring serial number data of the intelligent door lock, a door lock private key and a platform public key of an centralized authentication platform; signing the disposable symmetric key and the serial number data through the door lock private key to obtain a first signature value; encrypting the one-time symmetric key, the serial number data and the first signature value through the platform public key to obtain an encrypted message; and sending the encrypted message to the terminal equipment, and communicating with the terminal equipment based on the one-time symmetric key.
It can be understood that the content in the above method embodiment is applicable to the system embodiment, and the functions specifically implemented by the system embodiment are the same as those of the above method embodiment, and the achieved beneficial effects are the same as those of the above method embodiment.
The embodiment of the application also discloses an electronic device, which comprises:
at least one processor;
at least one memory for storing at least one program;
the at least one program, when executed by the at least one processor, causes the at least one processor to implement a communication method embodiment of the smart door lock.
It can be understood that the content in the foregoing communication method embodiment of the intelligent door lock is applicable to the embodiment of the electronic device, and the functions specifically implemented by the embodiment of the electronic device are the same as those in the foregoing communication method embodiment of the intelligent door lock, and the beneficial effects achieved by the embodiment of the communication method embodiment of the intelligent door lock are the same as those achieved by the foregoing communication method embodiment of the intelligent door lock.
The electronic device of the embodiment of the application can be a terminal device, a computer device or a server device.
Referring to fig. 9, fig. 9 is a schematic structural diagram of an electronic device according to an embodiment of the present application. Taking an example in which the electronic device is a terminal device, in fig. 9, the terminal device 1000 can include an RF (Radio Frequency) circuit 1010, a memory 1020 including one or more computer readable storage media, an input unit 1030, a display unit 1040, a sensor 1050, an audio circuit 1060, a short-range wireless transmission module 1070, a processor 1080 including one or more processing cores, and a power source 1090. It will be appreciated by those skilled in the art that the device structure shown in fig. 9 is not limiting of the terminal device and may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
The RF circuit 1010 may be used for receiving and transmitting signals during a message or a call, and in particular, after receiving downlink information of a base station, the downlink information is processed by one or more processors 1080; in addition, data relating to uplink is transmitted to the base station. Typically, RF circuitry 1010 includes, but is not limited to, an antenna, at least one amplifier, a tuner, one or more oscillators, a Subscriber Identity Module (SIM) card, a transceiver, a coupler, an LNA (Low Noise Amplifier ), a duplexer, and the like. In addition, the RF circuitry 1010 may also communicate with networks and other devices via wireless communications. The wireless communication may use any communication standard or protocol including, but not limited to, GSM (Global System of Mobile communication, global system for mobile communications), GPRS (General Packet Radio Service ), CDMA (Code Division Multiple Access, code division multiple access), WCDMA (Wideband Code Division Multiple Access ), LTE (Long Term Evolution, long term evolution), email, SMS (Short Messaging Service, short message service), and the like.
Memory 1020 may be used to store software programs as well as modules (or units). Processor 1080 executes various functional applications and data processing by executing software programs and modules (or units) stored in memory 1020. The memory 1020 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, application programs (such as a sound playing function, an image playing function) required for at least one function, and the like; the storage data area may store data (such as audio data, phonebook) created according to the use of the terminal device 1000, and the like. In addition, memory 1020 may include high-speed random access memory and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state memory device. Accordingly, memory 1020 may also include a memory controller to provide processor 1080 and input unit 1030 with access to memory 1020. Although fig. 9 shows RF circuit 1010, it is understood that it does not belong to the essential constitution of terminal device 1000, and can be omitted entirely as needed within the scope not changing the essence of the invention.
The input unit 1030 may be used for receiving input numeric or character information and generating keyboard, mouse, joystick, optical or trackball signal inputs related to object settings and function control. In particular, the input unit 1030 may include a touch-sensitive surface 1031 and other input devices 1032. The touch-sensitive surface 1031, also referred to as a touch display screen or touch pad, may collect touch operations on or near an object (e.g., the operation of an object on the touch-sensitive surface 1031 using any suitable object or accessory such as a finger, stylus, etc., or near the touch-sensitive surface 1031) and actuate the corresponding connection means according to a pre-set program. Alternatively, the touch sensitive surface 1031 may comprise two parts, a touch detection device and a touch controller. The touch detection device detects the touch azimuth of the object, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch detection device, converts it into touch point coordinates, and sends the touch point coordinates to the processor 1080, and can receive and execute instructions from the processor 1080. In addition, the touch sensitive surface 1031 may be implemented in a variety of types, such as resistive, capacitive, infrared, and surface acoustic waves. In addition to the touch-sensitive surface 1031, the input unit 1030 may include other input devices 1032. In particular, other input devices 1032 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a track ball, a mouse, a joystick, etc.
The display unit 1040 may be used to display information input by an object or information provided to an object and various graphic object interfaces of the control terminal device 1000, which may be composed of graphics, text, icons, video, and any combination thereof. The display unit 1040 may include a display panel 1041, and alternatively, the display panel 1041 may be configured in the form of an LCD (Liquid Crystal Display ), an OLED (Organic Light-Emitting Diode), or the like. Further, the touch sensitive surface 1031 may be overlaid on the display panel 1041, and upon detection of a touch operation thereon or thereabout by the touch sensitive surface 1031, the touch sensitive surface is communicated to the processor 1080 to determine a type of touch event, and the processor 1080 then provides a corresponding visual output on the display panel 1041 based on the type of touch event. Although in fig. 9 the touch-sensitive surface 1031 and the display panel 1041 are implemented as two separate components for input and output functions, in some embodiments the touch-sensitive surface 1031 may be integrated with the display panel 1041 to implement the input and output functions.
Terminal device 1000 can also include at least one sensor 1050, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor that may adjust the brightness of the display panel 1041 according to the brightness of ambient light, and a proximity sensor that may turn off the display panel 1041 or the backlight when the terminal device 1000 moves to the ear. As one of the motion sensors, the gravity acceleration sensor can detect the acceleration in all directions (generally three axes), and can detect the gravity and the direction when the mobile phone is stationary, and can be used for applications of recognizing the gesture of the mobile phone (such as horizontal and vertical screen switching, related games, magnetometer gesture calibration), vibration recognition related functions (such as pedometer and knocking), and the like; other sensors such as gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc. that may also be configured with terminal device 1000 are not described in detail herein.
Audio circuitry 1060, speaker 1061, microphone 1062 may provide an audio interface between the object and terminal device 1000. Audio circuit 1060 may transmit the received electrical signal after audio data conversion to speaker 1061 for conversion by speaker 1061 into an audio signal output; on the other hand, microphone 1062 converts the collected sound signals into electrical signals, which are received by audio circuit 1060 and converted into audio data, which are processed by audio data output processor 1080 for transmission to another electronic device via RF circuit 1010 or for output to memory 1020 for further processing. Audio circuitry 1060 may also include an ear bud jack to provide communication of a peripheral ear bud with terminal device 1000.
The short-range wireless transmission module 1070 may be a WIFI (wireless fidelity ) module, a bluetooth module, an infrared module, or the like. Terminal device 1000 can transmit information with wireless transmission modules provided on other devices through short-range wireless transmission module 1070.
Processor 1080 is a control center of terminal device 1000 and connects the various parts of the overall device using various interfaces and lines, and performs various functions of terminal device 1000 and processes data by running or executing software programs or modules stored in memory 1020 and invoking data stored in memory 1020, thereby overall controlling the device. Optionally, processor 1080 may include one or more processing cores; alternatively, processor 1080 may integrate an application processor that primarily handles operating systems, object interfaces, applications, etc., with a modem processor that primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 1080.
Terminal device 1000 can also include a power source 1090 (e.g., a battery) for powering the various components, and optionally power source 1090 can be logically connected to processor 1080 by a power management system so as to perform charge, discharge, and power management functions via the power management system. The power source 1090 may also include one or more of any of a direct current or alternating current power source, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like.
Although not shown, the terminal device 1000 may further include a camera, a bluetooth module, etc., which will not be described herein.
For example, taking the example of the electronic device being a server device, referring to fig. 10, the server device 1100 may vary considerably in configuration or performance, and may include one or more central processing units 1110 (simply referred to as CPUs, central Processing Units) and memory 1160, one or more storage mediums 1130 (e.g., one or more mass storage devices) storing applications 1133 or data 1132. Wherein memory 1160 and storage medium 1130 may be transitory or persistent. The program stored in the storage medium 1130 may include one or more units or modules, each of which may include a series of operational instructions into the server device 1100. Still further, the central processor 1110 may be configured to communicate with a storage medium 1130, and execute a series of operational instructions on the server device 1100 in the storage medium 1130.
The server device 1100 may also include one or more power supplies 1120, one or more wired or wireless network interfaces 1140, one or more input output interfaces 1150, and one or more operating systems 1131.
A central processor 1110 in the server device 1100 may be used to perform the communication method embodiments of the smart door lock.
The embodiment of the application also discloses a computer readable storage medium, wherein a program executable by a processor is stored, and the program executable by the processor is used for realizing the communication method embodiment of the intelligent door lock when being executed by the processor.
It can be understood that the content in the communication method embodiment of the intelligent door lock is applicable to the computer readable storage medium embodiment, and the functions specifically realized by the computer readable storage medium embodiment are the same as those of the communication method embodiment of the intelligent door lock, and the achieved beneficial effects are the same as those of the communication method embodiment of the intelligent door lock.
In some alternative embodiments, the functions/acts noted in the block diagrams may occur out of the order noted in the operational illustrations. For example, two blocks shown in succession may in fact be executed substantially concurrently or the blocks may sometimes be executed in the reverse order, depending upon the functionality/acts involved. Furthermore, the embodiments presented and described in the flowcharts of the present application are provided by way of example in order to provide a more thorough understanding of the technology. The disclosed methods are not limited to the operations and logic flows presented herein. Alternative embodiments are contemplated in which the order of various operations is changed, and in which sub-operations described as part of a larger operation are performed independently.
Furthermore, while the application is described in the context of functional modules, it should be appreciated that, unless otherwise indicated, one or more of the functions and/or features may be integrated in a single physical device and/or software module or may be implemented in separate physical devices or software modules. It will also be appreciated that a detailed discussion of the actual implementation of each module is not necessary to an understanding of the present application. Rather, the actual implementation of the various functional modules in the apparatus disclosed herein will be apparent to those skilled in the art from consideration of their attributes, functions and internal relationships. Accordingly, one of ordinary skill in the art can implement the application as set forth in the claims without undue experimentation. It is also to be understood that the specific concepts disclosed are merely illustrative and are not intended to be limiting upon the scope of the application, which is to be defined in the appended claims and their full scope of equivalents.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method of the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
Logic and/or steps represented in the flowcharts or otherwise described herein, e.g., a ordered listing of executable instructions for implementing logical functions, can be embodied in any computer-readable storage medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable storage medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
It is to be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above-described embodiments, the various steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, may be implemented using any one or combination of the following techniques, as is well known in the art: discrete logic circuits having logic gates for implementing logic functions on data signals, application specific integrated circuits having suitable combinational logic gates, programmable Gate Arrays (PGAs), field Programmable Gate Arrays (FPGAs), and the like.
In the foregoing description of the present specification, reference has been made to the terms "one embodiment/example", "another embodiment/example", "certain embodiments/examples", and the like, means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
While embodiments of the present application have been shown and described, it will be understood by those of ordinary skill in the art that: many changes, modifications, substitutions and variations may be made to the embodiments without departing from the spirit and principles of the application, the scope of which is defined by the claims and their equivalents.
While the preferred embodiment of the present application has been described in detail, the present application is not limited to the embodiments, and those skilled in the art can make various equivalent modifications or substitutions without departing from the spirit of the present application, and the equivalent modifications or substitutions are intended to be included in the scope of the present application as defined in the appended claims.

Claims (10)

1. A communication method of an intelligent door lock, which is applied to a terminal device, the communication method comprising:
sending a communication request to the intelligent door lock, and receiving an encrypted message fed back by the intelligent door lock; the encryption message is obtained by encrypting a disposable symmetric key, serial number data of the intelligent door lock and a first signature value by the intelligent door lock through a platform public key of an intensive authentication platform; the one-time symmetric key is generated by the intelligent door lock in response to the communication request, and the first signature value is obtained by the intelligent door lock through signing the one-time symmetric key and the serial number data by a door lock private key of the intelligent door lock;
the encrypted message is sent to the intensive authentication platform, so that the intensive authentication platform decrypts the encrypted message through a platform private key of the intensive authentication platform to obtain the one-time symmetric key, the serial number data and the first signature value, and the validity of the intelligent door lock is checked through the serial number data and the first signature value;
and receiving the one-time symmetric key sent by the intensive authentication platform under the condition that the validity authentication of the intelligent door lock is passed, and communicating with the intelligent door lock based on the one-time symmetric key.
2. The method for communicating with a smart door lock according to claim 1, wherein said sending a communication request to the smart door lock comprises:
searching the intelligent door lock through Bluetooth near field communication, and establishing connection with the intelligent door lock;
and sending a communication request to the intelligent door lock based on the connection of the Bluetooth near field communication.
3. The method of claim 1, wherein the communicating with the smart door lock based on the one-time symmetric key comprises:
generating a random number;
acquiring an instruction to be transmitted, and encrypting the instruction and the random number based on the one-time symmetric key to obtain a transmission ciphertext;
the transmission ciphertext is sent to the intelligent door lock, so that the intelligent door lock decrypts the transmission ciphertext to obtain the instruction and the random number, the random number is checked, and the instruction is executed after the check is passed;
and accumulating the random numbers to obtain new random numbers, returning the instruction to be transmitted, and encrypting the instruction and the random numbers based on the one-time symmetric key to obtain a transmission ciphertext.
4. A communication method of an intelligent door lock, which is applied to an intensive authentication platform, the communication method comprising:
receiving an encrypted message sent by a terminal device; the encryption message is obtained by encrypting a one-time symmetric key, serial number data of the intelligent door lock and a first signature value by the intelligent door lock through a platform public key of the intensive authentication platform; the one-time symmetric key is generated by the intelligent door lock in response to a communication request of the terminal equipment, and the first signature value is obtained by the intelligent door lock through signing the one-time symmetric key and the serial number data through a door lock private key of the intelligent door lock;
decrypting the encrypted message through a platform private key of the intensive authentication platform to obtain the disposable symmetric key, the serial number data and the first signature value, and checking the validity of the intelligent door lock through the serial number data and the first signature value;
and when the validity authentication of the intelligent door lock is confirmed to pass, the one-time symmetric key is sent to the terminal equipment, so that the terminal equipment communicates with the intelligent door lock based on the one-time symmetric key.
5. The method of claim 4, wherein verifying the validity of the smart door lock by the serial number data and the first signature value comprises:
acquiring user information corresponding to the terminal equipment;
verifying the validity of the intelligent door lock according to the user information and the serial number data;
inquiring a door lock public key corresponding to the intelligent door lock according to the serial number data;
decrypting the first signature value through the door lock public key to obtain a first abstract value;
calculating a second digest value of the one-time symmetric key and the serial number data;
and verifying the validity of the intelligent door lock according to the first abstract value and the second abstract value.
6. A communication method of an intelligent door lock, applied to the intelligent door lock, the communication method comprising:
receiving a communication request sent by terminal equipment, and generating a disposable symmetric key;
acquiring serial number data of the intelligent door lock, a door lock private key and a platform public key of an centralized authentication platform;
signing the disposable symmetric key and the serial number data through the door lock private key to obtain a first signature value;
Encrypting the one-time symmetric key, the serial number data and the first signature value through the platform public key to obtain an encrypted message;
sending the encrypted message to the terminal equipment, so that the terminal equipment sends the encrypted message to the intensive authentication platform and acquires the one-time symmetric key from the intensive authentication platform; the intensive authentication platform is used for decrypting the encrypted message through a platform private key of the intensive authentication platform to obtain the disposable symmetric key, the serial number data and the first signature value, checking the validity of the intelligent door lock through the serial number data and the first signature value, and sending the disposable symmetric key to the terminal equipment under the condition that the validity authentication of the intelligent door lock is passed;
and communicating with the terminal equipment based on the one-time symmetric key.
7. The communication method of the intelligent door lock according to claim 6, wherein the communication between the terminal device and the one-time symmetric key comprises:
receiving a transmission ciphertext sent by the terminal equipment; the transmission ciphertext is obtained by encrypting an instruction and a random number by the terminal equipment based on the one-time symmetric key, and the random number is sequentially accumulated after the initial generation and following the number of the instructions transmitted by the terminal equipment in the communication;
Decrypting the transmission ciphertext through the one-time symmetric key to obtain the instruction and the random number;
checking the random number, and executing the instruction if the random number does not appear in the communication; or if the random number appears in the communication, the instruction is not executed.
8. A communication system for an intelligent door lock, comprising: terminal equipment, an intelligent door lock and an centralized authentication platform;
the terminal equipment is used for sending a communication request to the intelligent door lock, receiving an encrypted message fed back by the intelligent door lock and sending the encrypted message to the intensive authentication platform; receiving the one-time symmetric key sent by the intensive authentication platform, and communicating with the intelligent door lock based on the one-time symmetric key;
the intensive authentication platform is used for receiving an encrypted message sent by the terminal equipment, decrypting the encrypted message through a platform private key of the intensive authentication platform to obtain the disposable symmetric key, the serial number data and the first signature value, and checking the validity of the intelligent door lock through the serial number data and the first signature value; when the validity authentication of the intelligent door lock is confirmed to pass, the one-time symmetric key is sent to the terminal equipment;
The intelligent door lock is used for receiving a communication request sent by the terminal equipment and generating a disposable symmetric key; acquiring serial number data of the intelligent door lock, a door lock private key and a platform public key of an centralized authentication platform; signing the disposable symmetric key and the serial number data through the door lock private key to obtain a first signature value; encrypting the one-time symmetric key, the serial number data and the first signature value through the platform public key to obtain an encrypted message; and sending the encrypted message to the terminal equipment, and communicating with the terminal equipment based on the one-time symmetric key.
9. An electronic device, comprising:
at least one processor;
at least one memory for storing at least one program;
when the at least one program is executed by the at least one processor, the at least one processor is caused to implement the communication method of the smart door lock of any one of claims 1-7.
10. A computer-readable storage medium having stored therein a program executable by a processor, characterized in that: the processor executable program when executed by a processor is for implementing the communication method of the smart door lock as claimed in any one of claims 1-7.
CN202311332754.2A 2023-10-13 2023-10-13 Communication method, system, equipment and medium of intelligent door lock Pending CN117240475A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311332754.2A CN117240475A (en) 2023-10-13 2023-10-13 Communication method, system, equipment and medium of intelligent door lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311332754.2A CN117240475A (en) 2023-10-13 2023-10-13 Communication method, system, equipment and medium of intelligent door lock

Publications (1)

Publication Number Publication Date
CN117240475A true CN117240475A (en) 2023-12-15

Family

ID=89086027

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311332754.2A Pending CN117240475A (en) 2023-10-13 2023-10-13 Communication method, system, equipment and medium of intelligent door lock

Country Status (1)

Country Link
CN (1) CN117240475A (en)

Similar Documents

Publication Publication Date Title
EP3605989B1 (en) Information sending method, information receiving method, apparatus, and system
CN109472166B (en) Electronic signature method, device, equipment and medium
US11888594B2 (en) System access using a mobile device
CN112733107B (en) Information verification method, related device, equipment and storage medium
US10601795B2 (en) Service processing method and electronic device
CN109600223B (en) Verification method, activation method, device, equipment and storage medium
US20210004454A1 (en) Proof of affinity to a secure event for frictionless credential management
CN111193695B (en) Encryption method and device for third party account login and storage medium
WO2018133686A1 (en) Method and device for password protection, and storage medium
US20100180120A1 (en) Information protection device
CN107483213B (en) Security authentication method, related device and system
CN111343613A (en) Method and apparatus to establish secure low energy wireless communication in a process control system
CN107612949B (en) Wireless intelligent terminal access authentication method and system based on radio frequency fingerprint
CN115001841A (en) Identity authentication method, identity authentication device and storage medium
CN112533202A (en) Identity authentication method and device
WO2010023506A1 (en) Methods, apparatuses, computer program products, and systems for providing secure pairing and association for wireless devices
CN104954132A (en) Information processing apparatus, information processing method, and recording medium
CN112968971A (en) Method and device for establishing session connection, electronic equipment and readable storage medium
CN110519214B (en) Application system short-distance energy-saving communication method, system and equipment based on online and offline signature and auxiliary verification signature
CN117240475A (en) Communication method, system, equipment and medium of intelligent door lock
CN113904830A (en) SPA authentication method and device, electronic equipment and readable storage medium
CN115706993A (en) Authentication method, readable medium, and electronic device
US11943365B2 (en) Secure cross-device authentication system
KR101505735B1 (en) Method for Authenticating Near Field Communication Card by using Time Verification
US11895097B2 (en) Secure multi-factor authentication system to authenticate a user device for accessing a service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination