CN117253304A - Method and device for remote unlocking, intelligent door lock, server and storage medium - Google Patents

Method and device for remote unlocking, intelligent door lock, server and storage medium Download PDF

Info

Publication number
CN117253304A
CN117253304A CN202311120545.1A CN202311120545A CN117253304A CN 117253304 A CN117253304 A CN 117253304A CN 202311120545 A CN202311120545 A CN 202311120545A CN 117253304 A CN117253304 A CN 117253304A
Authority
CN
China
Prior art keywords
door lock
remote unlocking
challenge code
server
intelligent door
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311120545.1A
Other languages
Chinese (zh)
Inventor
刘新平
孙能林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qingdao Haier Technology Co Ltd
Haier Smart Home Co Ltd
Haier Uplus Intelligent Technology Beijing Co Ltd
Original Assignee
Qingdao Haier Technology Co Ltd
Haier Smart Home Co Ltd
Haier Uplus Intelligent Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qingdao Haier Technology Co Ltd, Haier Smart Home Co Ltd, Haier Uplus Intelligent Technology Beijing Co Ltd filed Critical Qingdao Haier Technology Co Ltd
Priority to CN202311120545.1A priority Critical patent/CN117253304A/en
Publication of CN117253304A publication Critical patent/CN117253304A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00388Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks code verification carried out according to the challenge/response method

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The application discloses a method, a storage medium and an electronic device for remote unlocking, which relate to the technical field of intelligent home, and the method for remote unlocking is applied to an intelligent door lock and comprises the following steps: generating a challenge code; the challenge code comprises an equipment Identity (ID) of the intelligent door lock, a door lock digital certificate and a private key; sending a challenge code and a remote unlocking request; receiving a remote unlocking instruction; the remote unlocking instruction comprises a challenge code; under the condition that the verification factor of the remote unlocking instruction passes the verification, the unlocking action is executed; the verification factors comprise the device ID of the intelligent door lock, a door lock digital certificate and a private key. Under the condition that a hacker attacks the mobile terminal or the server, the risk that the challenge code and the remote unlocking instruction are forged or tampered can be effectively reduced, the risk that the intelligent door lock performs unlocking action is further reduced, and then the property safety of individuals and families is maintained.

Description

Method and device for remote unlocking, intelligent door lock, server and storage medium
Technical Field
The application relates to the field of intelligent household appliances, in particular to a method and a device for remote unlocking, an intelligent door lock, a server and a storage medium.
Background
At present, with the improvement of the living standard of people and the continuous progress of science and technology, more and more people begin to pay attention to the household safety problem. Conventional key locks have failed to meet the safety requirements of people, and thus intelligent door locks have been developed.
The related art discloses a method for remotely unlocking an intelligent password key, which comprises the following steps: the intelligent password key management tool generates a challenge code and the intelligent password key unlocking tool generates a response code, and the password setting refers to the setting of an administrator password and a user password by calling functions of an intelligent password key setting administrator by an intelligent password key equipment manufacturer or an intelligent password key application, and the SKF_CreateApp setting administrator and the user password are called by an SDF interface; the remote unlocking is to utilize an intelligent password key management tool to remotely unlock the door lock through an intelligent password key unlocking tool; the remote unlocking comprises the following steps: step one: the intelligent password key management tool generates a challenge code, wherein the challenge code is a random number with the length of 16, and the challenge code is stored in a memory or a global variable for standby; step two: the challenge code generated by the intelligent password key management tool is sent to the intelligent password key unlocking tool; step three: the intelligent password key unlocking tool receives a challenge code, and the challenge code is used as an SM4 algorithm key to encrypt data to be transmitted; step four: generating a response code: the manager unlock password and the user password after unlocking form a character string, if the character string is not complemented by a multiple of 16, the character string is encrypted by an SM4 algorithm, and the encryption key is a challenge code; step five: the response code is sent to the intelligent password key management tool, the intelligent password key management tool calls an SM4 decryption function, the challenge code is used as a decryption key, decryption operation is completed, an administrator password and an unlocked user password are obtained, and the SKF interface calls an SKF_UnblockPIN function to complete unlocking operation; step six: and judging whether the unlocking is successful or not according to the return value.
In the process of implementing the embodiments of the present disclosure, it is found that at least the following problems exist in the related art:
the intelligent door lock in the related art lacks security design in the remote unlocking process, and lacks a prevention mechanism for security risks caused by network attack, firmware attack and application layer protocol attack behaviors. For example, in the case that the mobile terminal or the server is invaded by a hacker, the challenge code is easily forged or tampered by the hacker, and the intelligent door lock is controlled to execute unlocking action, so that the property safety of individuals and families is greatly compromised.
It should be noted that the information disclosed in the foregoing background section is only for enhancing understanding of the background of the present application and thus may include information that does not form the prior art that is already known to those of ordinary skill in the art.
Disclosure of Invention
The following presents a simplified summary in order to provide a basic understanding of some aspects of the disclosed embodiments. This summary is not an extensive overview, and is intended to neither identify key/critical elements nor delineate the scope of such embodiments, but is intended as a prelude to the more detailed description that follows.
The embodiment of the disclosure provides a method and a device for remote unlocking, an intelligent door lock, a server and a storage medium, so that under the condition that a mobile terminal or a server is invaded by a hacker, the risks that a challenge code is forged or tampered by the hacker and the intelligent door lock is controlled to execute unlocking actions are reduced, and the property safety of individuals and families is improved.
In some embodiments, the method is applied to a smart door lock, comprising: a challenge code is generated. The challenge code comprises a device ID (Identity document, identity) of the intelligent door lock, a door lock digital certificate and a private key. And sending a challenge code and a remote unlocking request. And receiving a remote unlocking instruction. The remote unlocking instruction comprises a challenge code. And under the condition that the verification factor of the remote unlocking instruction passes the verification, executing the unlocking action. The verification factors comprise the device ID of the intelligent door lock, a door lock digital certificate and a private key.
Optionally, in case the visitor triggers the doorbell, a challenge code is generated.
Optionally, the challenge code further includes: a user valid time window; the challenge code is generated according to the device ID of the intelligent door lock, the user effective time window, the door lock digital certificate and the private key.
Optionally, generating the challenge code according to the device ID of the intelligent door lock, the user valid time window, the door lock digital certificate and the private key includes: the device ID of the intelligent door lock, the door lock digital certificate, the door lock digital private key and the user valid time window generate a challenge code through a hash algorithm or an encryption algorithm.
Optionally, the verification factor of the remote unlocking instruction passes the verification, including: the validity of the verification factor of the remote unlocking instruction passes the verification, and the validity of the verification factor of the remote unlocking instruction passes the verification.
Optionally, the verification factor further includes; the cloud identity of the server and the binding relation between the mobile terminal user and the door lock; the validity of the verification factor of the remote unlocking instruction passes the verification, comprising: the cloud identity of the server is checked, the binding relation between the mobile terminal user and the door lock is checked, the equipment ID of the intelligent door lock is checked, and the door lock digital certificate and the private key are checked.
Optionally, the remote unlocking instruction further includes: a digital certificate and a private key of a server for verifying a cloud identity of the server; and binding relation between the mobile terminal user and the door lock.
Optionally, the verification factor further includes; checking the moment; the timeliness of the verification factor of the remote unlocking instruction passes the verification, including: and the verification time of the remote unlocking instruction passes the verification.
In some embodiments, the method is applied to a server, comprising: a challenge code is received. The challenge code comprises a device ID of the intelligent door lock, a door lock digital certificate and a private key. A remote unlocking request is sent. And generating a remote unlocking command under the condition that a request for confirming unlocking and generating the remote unlocking command is received. The remote unlocking instruction comprises a challenge code. And sending a remote unlocking instruction to enable the intelligent door lock to unlock under the condition that the verification factor of the remote unlocking instruction passes the verification. Executing unlocking under the condition that the verification factor of the instruction passes the verification; the verification factors comprise the device ID of the intelligent door lock, a door lock digital certificate and a private key.
Optionally, the temporary response code further includes: binding relation between the mobile terminal user and the door lock, and digital certificate and private key of the server; the temporary response code is generated according to the challenge code, the binding relation between the mobile terminal user and the door lock, the digital certificate of the server and the private key.
Optionally, generating the temporary response code according to the challenge code, the binding relation between the mobile terminal user and the door lock, the digital certificate of the server and the private key includes: the temporary response code is generated by the challenge code, the binding relation between the mobile terminal user and the door lock, the digital certificate of the server and the private key through a hash algorithm or an encryption algorithm.
Optionally, the remote unlocking instruction is generated according to the challenge code and the temporary response code.
Optionally, generating the remote unlocking instruction according to the challenge code and the temporary response code includes: and generating a remote unlocking instruction by the challenge code and the temporary response code through a hash algorithm or an encryption algorithm.
Optionally, after receiving the challenge code, the method further includes: and sending the challenge code.
In some embodiments, the storage medium includes a stored program, wherein the program when run performs the method.
In some embodiments, the electronic device comprises a memory having a computer program stored therein and a processor configured to perform the method by the computer program.
In some embodiments, the smart door lock comprises: an intelligent door lock body. The device for remote unlocking is installed on the intelligent door lock body and comprises a memory and a processor, wherein the memory stores a computer program, and the processor is used for executing the method through the computer program.
In some embodiments, the server comprises: a server body. The device for remote unlocking is installed on the server body and comprises a memory and a processor, wherein the memory stores a computer program, and the processor is used for executing the method through the computer program.
The method and the device for remote unlocking, the intelligent door lock, the server and the storage medium provided by the embodiment of the disclosure can realize the following technical effects:
the challenge code generated by the intelligent door lock comprises a device ID of the intelligent door lock, a door lock digital certificate and a private key, wherein the device ID ensures that the intelligent door lock to be unlocked is unique, and the door lock digital certificate and the private key are information which cannot be acquired by the mobile terminal and the server. This makes it impossible to generate a challenge code that can be verified by the smart door lock even if a hacker attacks the mobile terminal or the server, and further, to generate a remote unlocking instruction containing the challenge code. The device ID of the intelligent door lock, the door lock digital certificate and the private key in the remote unlocking instruction cannot pass verification, and the unlocking action cannot be executed. Therefore, under the condition that a hacker attacks the mobile terminal or the server, the risk that the challenge code and the remote unlocking instruction are forged or tampered can be effectively reduced, the risk that the intelligent door lock performs unlocking action is further reduced, and the property safety of individuals and families is further maintained.
The foregoing general description and the following description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required to be used in the description of the embodiments or the prior art will be briefly described below, and it will be obvious to those skilled in the art that other drawings can be obtained from these drawings without inventive effort.
FIG. 1 is a schematic diagram of a hardware environment of an interaction method of a smart device according to an embodiment of the present application;
FIG. 2 is a schematic diagram of a method for remote unlocking provided by an embodiment of the present disclosure;
FIG. 3 is a schematic diagram of another method for remote unlocking provided by embodiments of the present disclosure;
FIG. 4 is a schematic diagram of another method for remote unlocking provided by embodiments of the present disclosure;
FIG. 5 is a schematic illustration of one application of an embodiment of the present disclosure;
fig. 6 is a schematic view of an apparatus for remote unlocking provided by an embodiment of the present disclosure.
Detailed Description
In order to make the present application solution better understood by those skilled in the art, the following description will be made in detail and with reference to the accompanying drawings in the embodiments of the present application, it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, shall fall within the scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of the present application and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that embodiments of the present application described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
According to one aspect of the embodiment of the application, an interaction method of intelligent home equipment is provided. The interaction method of the intelligent household equipment is widely applied to full-house intelligent digital control application scenes such as intelligent Home (Smart Home), intelligent Home, intelligent household equipment ecology, intelligent Home (Intelligence House) ecology and the like. Alternatively, in this embodiment, the above-mentioned interaction method of the smart home device may be applied to a hardware environment formed by the terminal device 102 and the server 104 as shown in fig. 1. As shown in fig. 1, the server 104 is connected to the terminal device 102 through a network, and may be used to provide services (such as application services and the like) for a terminal or a client installed on the terminal, a database may be set on the server or independent of the server, for providing data storage services for the server 104, and cloud computing and/or edge computing services may be configured on the server or independent of the server, for providing data computing services for the server 104.
The network may include, but is not limited to, at least one of: wired network, wireless network. The wired network may include, but is not limited to, at least one of: a wide area network, a metropolitan area network, a local area network, and the wireless network may include, but is not limited to, at least one of: WIFI (Wireless Fidelity ), bluetooth. The terminal device 102 may not be limited to a PC, a mobile phone, a tablet computer, an intelligent air conditioner, an intelligent smoke machine, an intelligent refrigerator, an intelligent oven, an intelligent cooking range, an intelligent washing machine, an intelligent water heater, an intelligent washing device, an intelligent dish washer, an intelligent projection device, an intelligent television, an intelligent clothes hanger, an intelligent curtain, an intelligent video, an intelligent socket, an intelligent sound box, an intelligent fresh air device, an intelligent kitchen and toilet device, an intelligent bathroom device, an intelligent sweeping robot, an intelligent window cleaning robot, an intelligent mopping robot, an intelligent air purifying device, an intelligent steam box, an intelligent microwave oven, an intelligent kitchen appliance, an intelligent purifier, an intelligent water dispenser, an intelligent door lock, and the like.
As shown in conjunction with fig. 2, an embodiment of the present disclosure provides a method for remote unlocking, including:
s201, the intelligent door lock generates a challenge code. The challenge code comprises a device ID of the intelligent door lock, a door lock digital certificate and a private key.
S202, the intelligent door lock sends a challenge code and a remote unlocking request.
S203, the intelligent door lock receives a remote unlocking instruction. The remote unlocking instruction comprises a challenge code.
S204, under the condition that the verification factor of the remote unlocking instruction passes the verification, the intelligent door lock executes the unlocking action. The verification factors comprise the device ID of the intelligent door lock, a door lock digital certificate and a private key.
By adopting the method for remote unlocking provided by the embodiment of the disclosure, the challenge code generated by the intelligent door lock comprises the equipment ID of the intelligent door lock, the door lock digital certificate and the private key, wherein the equipment ID ensures that the intelligent door lock to be unlocked is unique, and the door lock digital certificate and the private key are information which cannot be acquired by the mobile terminal and the server. This makes it impossible to generate a challenge code that can be verified by the smart door lock even if a hacker attacks the mobile terminal or the server, and further, to generate a remote unlocking instruction containing the challenge code. The device ID of the intelligent door lock, the door lock digital certificate and the private key in the remote unlocking instruction cannot pass verification, and the unlocking action cannot be executed. Therefore, under the condition that a hacker attacks the mobile terminal or the server, the risk that the challenge code and the remote unlocking instruction are forged or tampered can be effectively reduced, the risk that the intelligent door lock performs unlocking action is further reduced, and the property safety of individuals and families is further maintained.
Optionally, in the case of a visitor triggering a doorbell, the smart door lock generates the challenge code. Thus, the intelligent door lock can generate the challenge code to start the remote unlocking process only when the visitor triggers the doorbell. If the visitor does not manually trigger the door lock, even if a hacker attacks the mobile terminal or the server, a challenge code which can pass through the verification of the intelligent door lock cannot be generated, and a remote unlocking instruction containing the challenge code cannot be generated. The device ID of the intelligent door lock, the door lock digital certificate and the private key in the remote unlocking instruction cannot pass verification, and the unlocking action cannot be executed. Therefore, under the condition that a hacker attacks the mobile terminal or the server, the risk that the challenge code and the remote unlocking instruction are forged or tampered can be effectively reduced, the risk that the intelligent door lock performs unlocking action is further reduced, and the property safety of individuals and families is further maintained.
Optionally, the challenge code further includes: user valid time window. The challenge code is generated by the intelligent door lock according to the equipment ID of the intelligent door lock, the effective time window of the user, the door lock digital certificate and the private key. Thus, the challenge code generated by the intelligent door lock further comprises a user effective time window, and if the intelligent door lock does not receive the remote unlocking instruction within the user effective time window, the user effective time window of the remote unlocking instruction cannot pass the verification. Therefore, the situation that the visitor walks but the intelligent door lock performs remote unlocking is reduced, the risk that the intelligent door lock performs unlocking is further reduced, and the property safety of individuals and families is further maintained.
Optionally, the intelligent door lock generates the challenge code according to the device ID of the intelligent door lock, the user valid time window, the door lock digital certificate and the private key, including: the intelligent door lock generates a challenge code through a hash algorithm or an encryption algorithm by the device ID of the intelligent door lock, the door lock digital certificate, the door lock digital private key and the user effective time window. Thus, the device ID ensures that the intelligent door lock to be unlocked is unique, and the door lock digital certificate and the private key are information which cannot be acquired by the mobile terminal and the server. This makes it impossible to generate a challenge code that can be verified by the smart door lock even if a hacker attacks the mobile terminal or the server, and further, to generate a remote unlocking instruction containing the challenge code. The device ID of the intelligent door lock, the door lock digital certificate and the private key in the remote unlocking instruction cannot pass verification, and the unlocking action cannot be executed. Therefore, under the condition that a hacker attacks the mobile terminal or the server, the risk that the challenge code and the remote unlocking instruction are forged or tampered can be effectively reduced, the risk that the intelligent door lock performs unlocking action is further reduced, and the property safety of individuals and families is further maintained. And if the intelligent door lock does not receive the remote unlocking instruction within the user effective time window, the user effective time window of the remote unlocking instruction cannot pass the verification. Therefore, the situation that the visitor walks but the intelligent door lock performs remote unlocking is reduced, the risk that the intelligent door lock performs unlocking is further reduced, and the property safety of individuals and families is further maintained.
Optionally, the smart door lock generates the challenge code from the device ID of the smart door lock, the door lock digital certificate, the door lock digital private key and the user valid time window through a hash algorithm or an encryption algorithm, including: the intelligent door lock generates a challenge code by a device ID of the intelligent door lock, a door lock digital certificate, a door lock digital private key, a user valid time window and a random number through a hash algorithm or an encryption algorithm. Thus, the device ID ensures that the intelligent door lock to be unlocked is unique, the door lock digital certificate and the private key are information which cannot be acquired by the mobile terminal and the server, and the effective time window of the user reduces the risk that the visitor walks but the intelligent door lock still executes unlocking actions. And the device ID of the intelligent door lock, the door lock digital certificate, the door lock digital private key and the user effective time window are used for generating the challenge code through a hash algorithm or an encryption algorithm, so that the security of the challenge code is further enhanced. Even if a hacker attacks a mobile terminal or a server, a challenge code which can pass through the verification of the intelligent door lock cannot be generated, and a remote unlocking instruction containing the challenge code cannot be generated. The device ID of the intelligent door lock, the door lock digital certificate and the private key in the remote unlocking instruction cannot pass verification, and the unlocking action cannot be executed. Therefore, under the condition that a hacker attacks the mobile terminal or the server, the risk that the challenge code and the remote unlocking instruction are forged or tampered can be effectively reduced, the risk that the intelligent door lock performs unlocking action is further reduced, and the property safety of individuals and families is further maintained.
Optionally, the smart door lock generates the challenge code from the device ID of the smart door lock, the door lock digital certificate, the door lock digital private key, the user valid time window and the random number through a hash algorithm or an encryption algorithm, including: the intelligent door lock generates a character string from the device ID of the intelligent door lock, the hash of the door lock digital key, the timestamp in the user valid time window, and the random number. The intelligent door lock generates a hash value from the character string by using a hash function. And the intelligent door lock encrypts the hash value by using a door lock digital private key to obtain a signature value of the door lock digital certificate to the challenge code. And splicing the character string with the signature value to obtain the challenge code. Specifically, the format of the character string may be JSON (JavaScript Object Notation) format. The hash function may be SHA (Secure Hash Algorithm ) -256. In this way, the device ID of the intelligent door lock, the door lock digital certificate, the door lock digital private key and the user effective time window are used for generating the challenge code through a hash algorithm or an encryption algorithm, so that the security of the challenge code is further enhanced. Even if a hacker attacks a mobile terminal or a server, a challenge code which can pass through the verification of the intelligent door lock cannot be generated, and a remote unlocking instruction containing the challenge code cannot be generated. The device ID of the intelligent door lock, the door lock digital certificate and the private key in the remote unlocking instruction cannot pass verification, and the unlocking action cannot be executed. Therefore, under the condition that a hacker attacks the mobile terminal or the server, the risk that the challenge code and the remote unlocking instruction are forged or tampered can be effectively reduced, the risk that the intelligent door lock performs unlocking action is further reduced, and the property safety of individuals and families is further maintained.
Optionally, the verification factor of the remote unlocking instruction passes the verification, including: the validity of the verification factor of the remote unlocking instruction passes the verification, and the validity of the verification factor of the remote unlocking instruction passes the verification. Therefore, under the condition that the equipment ID of the intelligent door lock, the validity and timeliness of the door lock digital certificate and the private key of the remote unlocking instruction are checked, the intelligent door lock is controlled to execute the unlocking action. This makes it impossible to verify the validity and timeliness of the device ID, the door lock digital certificate and the private key of the intelligent door lock in the remote unlocking instruction, and to perform the unlocking action even if a hacker attacks the mobile terminal or the server. Therefore, under the condition that a hacker attacks the mobile terminal or the server, the risk that the challenge code and the remote unlocking instruction are forged or tampered can be effectively reduced, the risk that the intelligent door lock performs unlocking action is further reduced, and the property safety of individuals and families is further maintained.
Optionally, the verification factor further includes; the cloud identity of the server and the binding relation between the mobile terminal user and the door lock; the validity of the verification factor of the remote unlocking instruction passes the verification, comprising: the cloud identity of the server is checked, the binding relation between the mobile terminal user and the door lock is checked, the equipment ID of the intelligent door lock is checked, and the door lock digital certificate and the private key are checked. Thus, since the device ID of the intelligent door lock ensures that the intelligent door lock to be unlocked is unique, the door lock digital certificate and the private key are information which cannot be obtained by the mobile terminal and the server, and are difficult to forge by hackers. The method and the device enable even if a hacker attacks the mobile terminal or the server, the device ID of the intelligent door lock, the door lock digital certificate, the door lock digital private key, the cloud identity of the server and the binding relation between the mobile terminal user and the door lock in the remote unlocking instruction can not pass the verification of validity and timeliness, and the unlocking action can not be executed. Therefore, under the condition that a hacker attacks the mobile terminal or the server, the risk of forging or falsifying the challenge code and the remote unlocking instruction can be effectively reduced. Meanwhile, the binding relation between the cloud identity of the server and the binding relation between the mobile terminal user and the door lock is information of the server, the mobile terminal and the intelligent door lock, and if any one or both of the three information are blacked, the intelligent door lock cannot execute remote unlocking actions. Thereby facilitating the maintenance of personal and household property security.
Optionally, the remote unlocking instruction further includes: a digital certificate and a private key of a server for verifying a cloud identity of the server; and binding relation between the mobile terminal user and the door lock. In this way, the binding relation between the digital certificate and the private key of the server of the cloud identity of the server and the binding relation between the mobile terminal user and the door lock is information of the server, the mobile terminal and the intelligent door lock, and if any one or both of the two parties are blacked, the intelligent door lock cannot execute remote unlocking action. Thereby facilitating the maintenance of personal and household property security.
Optionally, the verification factor further includes; checking the moment; the timeliness of the verification factor of the remote unlocking instruction passes the verification, including: and the verification time of the remote unlocking instruction passes the verification. Specifically, the verification time of the remote unlocking instruction passes the verification, including: the verification time of the remote unlocking instruction is within the effective time window of the user. Thus, the intelligent door lock only executes unlocking action under the condition that the validity and the timeliness of the remote unlocking instruction pass the verification simultaneously. Therefore, the situation that the visitor walks but the intelligent door lock performs remote unlocking is reduced, the risk that the intelligent door lock performs unlocking is further reduced, and the property safety of individuals and families is further maintained.
Optionally, under the condition that the verification factor of the remote unlocking instruction fails to pass the verification, the intelligent door lock does not execute the unlocking action; and, the intelligent door lock sends error information. Thus, if the timeliness of the remote unlocking instruction is not checked, the intelligent door lock does not execute the unlocking action and sends error information. Therefore, the situation that the visitor walks but the intelligent door lock performs remote unlocking is reduced, the risk that the intelligent door lock performs unlocking is further reduced, and the property safety of individuals and families is further maintained.
As shown in connection with fig. 3, an embodiment of the present disclosure provides another method for remote unlocking, comprising:
s301, the server receives the challenge code. The challenge code comprises a device ID of the intelligent door lock, a door lock digital certificate and a private key.
S302, the server sends a remote unlocking request.
S303, when receiving a request for confirming unlocking and generating a remote unlocking instruction, the server generates the remote unlocking instruction. The remote unlocking instruction comprises a challenge code.
S304, the server sends a remote unlocking instruction to enable the intelligent door lock to unlock under the condition that verification factors of the remote unlocking instruction pass verification. The verification factors comprise the device ID of the intelligent door lock, a door lock digital certificate and a private key.
By adopting the method for remote unlocking provided by the embodiment of the disclosure, the challenge code generated by the intelligent door lock comprises the equipment ID of the intelligent door lock, the door lock digital certificate and the private key, wherein the equipment ID ensures that the intelligent door lock to be unlocked is unique, and the door lock digital certificate and the private key are information which cannot be acquired by the mobile terminal and the server. This makes it impossible to generate a challenge code that can be verified by the smart door lock even if a hacker attacks the mobile terminal or the server, and further, to generate a remote unlocking instruction containing the challenge code. The device ID of the intelligent door lock, the door lock digital certificate and the private key in the remote unlocking instruction cannot pass verification, and the unlocking action cannot be executed. Therefore, under the condition that a hacker attacks the mobile terminal or the server, the risk that the challenge code and the remote unlocking instruction are forged or tampered can be effectively reduced, the risk that the intelligent door lock performs unlocking action is further reduced, and the property safety of individuals and families is further maintained.
Optionally, the temporary response code further includes: binding relation between the mobile terminal user and the door lock, and digital certificate and private key of the server; the temporary response code is generated according to the challenge code, the binding relation between the mobile terminal user and the door lock, the digital certificate of the server and the private key. In this way, the binding relation between the digital certificate and the private key of the server in the cloud identity of the server and the binding relation between the mobile terminal user and the door lock are information of the server, the mobile terminal and the intelligent door lock, the challenge code is difficult to forge by the server or the mobile terminal, and if any one or both of the two parties are blacked, the intelligent door lock cannot execute remote unlocking action. Thereby facilitating the maintenance of personal and household property security.
Optionally, the server generates the temporary response code according to the challenge code, the binding relation between the mobile terminal user and the door lock, the digital certificate of the server and the private key, and the temporary response code comprises: the server generates a temporary response code by the challenge code, the binding relation between the mobile terminal user and the door lock, and the digital certificate and the private key of the server through a hash algorithm or an encryption algorithm. In this way, the binding relation between the digital certificate and the private key of the server in the cloud identity of the server and the binding relation between the mobile terminal user and the door lock are information of the server, the mobile terminal and the intelligent door lock, the challenge code is difficult to forge by the server or the mobile terminal, and if any one or both of the two parties are blacked, the intelligent door lock cannot execute remote unlocking action. Thereby facilitating the maintenance of personal and household property security.
Optionally, the server generates the temporary response code by the challenge code, the binding relation between the mobile terminal user and the door lock, the digital certificate and the private key of the server through a hash algorithm or an encryption algorithm, and the temporary response code comprises the following steps: the server generates a hash value by a hash function by the challenge code, and a character string by a public key hash of the server. The server generates a hash value from the string using a hash function. And the server encrypts the hash value by using a door lock digital private key to obtain a signature value of the server digital certificate to the temporary response code. And the server splices the character string and the signature value to obtain the challenge code. Specifically, the format of the character string may be JSON format. The hash function may be SHA-256. In this way, the challenge code, the binding relation between the mobile terminal user and the door lock, the digital certificate and the private key of the server generate the temporary response code through a hash algorithm or an encryption algorithm, so that the security of the challenge code is further enhanced. Even if a hacker attacks a mobile terminal or a server, a challenge code which can pass through the verification of the intelligent door lock cannot be generated, and a remote unlocking instruction containing the challenge code cannot be generated. The device ID of the intelligent door lock, the door lock digital certificate and the private key in the remote unlocking instruction cannot pass verification, and the unlocking action cannot be executed. Therefore, under the condition that a hacker attacks the mobile terminal or the server, the risk that the challenge code and the remote unlocking instruction are forged or tampered can be effectively reduced, the risk that the intelligent door lock performs unlocking action is further reduced, and the property safety of individuals and families is further maintained.
Optionally, the remote unlocking instruction is generated according to the challenge code and the temporary response code. Thus, the device ID in the challenge code ensures that the intelligent door lock to be unlocked is unique, and the door lock digital certificate and the private key are information which cannot be acquired by the mobile terminal and the server. The binding relation between the digital certificate and the private key of the server in the cloud identity of the server and the binding relation between the mobile terminal user and the door lock are information of the server, the mobile terminal and the intelligent door lock, the challenge code in the temporary verification code is difficult to forge by the server or the mobile terminal, and if any one or both of the two parties are blacked, the intelligent door lock cannot execute remote unlocking action. Thereby facilitating the maintenance of personal and household property security. This makes it impossible to generate a challenge code that can be verified by the smart door lock even if a hacker attacks the mobile terminal or the server, and further, to generate a remote unlocking instruction containing the challenge code. The device ID of the intelligent door lock, the door lock digital certificate and the private key in the remote unlocking instruction cannot pass verification, and the unlocking action cannot be executed. Therefore, under the condition that a hacker attacks the mobile terminal or the server, the risk that the challenge code and the remote unlocking instruction are forged or tampered can be effectively reduced, the risk that the intelligent door lock performs unlocking action is further reduced, and the property safety of individuals and families is further maintained.
Optionally, the server generates a remote unlocking instruction according to the challenge code and the temporary response code, including: the server generates a remote unlocking instruction through a hash algorithm or an encryption algorithm by the challenge code and the temporary response code. Thus, the device ID in the challenge code ensures that the intelligent door lock to be unlocked is unique, and the door lock digital certificate and the private key are information which cannot be acquired by the mobile terminal and the server. The binding relation between the digital certificate and the private key of the server in the cloud identity of the server and the binding relation between the mobile terminal user and the door lock are information of the server, the mobile terminal and the intelligent door lock, the challenge code in the temporary verification code is difficult to forge by the server or the mobile terminal, and if any one or both of the two parties are blacked, the intelligent door lock cannot execute remote unlocking action. And the challenge code and the temporary verification code are further generated into a remote Cheng Kaisuo instruction through a hash algorithm or an encryption algorithm, so that the safety of the remote unlocking instruction is improved, and the risk of forging the remote unlocking instruction is reduced. Thereby facilitating the maintenance of personal and household property security. This makes it impossible to generate a challenge code that can be verified by the smart door lock even if a hacker attacks the mobile terminal or the server, and further, to generate a remote unlocking instruction containing the challenge code. The device ID of the intelligent door lock, the door lock digital certificate and the private key in the remote unlocking instruction cannot pass verification, and the unlocking action cannot be executed. Therefore, under the condition that a hacker attacks the mobile terminal or the server, the risk that the challenge code and the remote unlocking instruction are forged or tampered can be effectively reduced, the risk that the intelligent door lock performs unlocking action is further reduced, and the property safety of individuals and families is further maintained.
Optionally, after the server receives the challenge code, the method further includes: the server sends the challenge code. In this way, it is advantageous to transmit a challenge code, which is difficult to forge, to the mobile terminal. The challenge code generated by the intelligent door lock comprises a device ID of the intelligent door lock, a door lock digital certificate and a private key, wherein the device ID ensures that the intelligent door lock to be unlocked is unique, and the door lock digital certificate and the private key are information which cannot be acquired by the mobile terminal and the server. This makes it impossible to generate a challenge code that can be verified by the smart door lock even if a hacker attacks the mobile terminal or the server, and further, to generate a remote unlocking instruction containing the challenge code.
As shown in connection with fig. 4, an embodiment of the present disclosure provides another method for remote unlocking, comprising:
s401, the mobile terminal receives a remote unlocking request.
S402, when the master confirms the unlocking action, the mobile terminal sends a request for confirming unlocking and generating a remote unlocking instruction so as to enable the server to generate the remote unlocking instruction.
By adopting the method for remote unlocking provided by the embodiment of the disclosure, the mobile terminal sends unlocking and a request for generating a remote unlocking instruction to enable the server to generate the remote unlocking instruction under the condition that the master confirms the unlocking action. In the process of generating a remote unlocking instruction, a visitor, an intelligent door lock, a server, a mobile terminal and a host cannot be satisfied. Under the condition that a hacker attacks the mobile terminal or the server, the risk that the remote unlocking instruction is forged or tampered can be effectively reduced, the risk that the intelligent door lock executes the unlocking action is further reduced, and then the property safety of individuals and families is maintained.
Optionally, before the mobile terminal sends the request for confirming unlocking and generating the remote unlocking command, the method further comprises: a challenge code is received. In this way, a challenge code that is difficult to forge is received. The challenge code generated by the intelligent door lock comprises a device ID of the intelligent door lock, a door lock digital certificate and a private key, wherein the device ID ensures that the intelligent door lock to be unlocked is unique, and the door lock digital certificate and the private key are information which cannot be acquired by the mobile terminal and the server. This makes it impossible to generate a challenge code that can be verified by the smart door lock even if a hacker attacks the mobile terminal or the server, and further, to generate a remote unlocking instruction containing the challenge code.
In practical application, as shown in fig. 5, S501, the smart door lock generates a challenge code. The challenge code comprises a device ID of the intelligent door lock, a door lock digital certificate and a private key. S502, the intelligent door lock sends a challenge code and a remote unlocking request. S503, the server receives the challenge code. S504, the server sends a remote unlocking request. S505, the mobile terminal receives a remote unlocking request. S506, when the owner confirms the unlocking operation, the mobile terminal transmits a request for confirming unlocking and generating a remote unlocking instruction. S507, when a request for confirming unlocking and generating a remote unlocking instruction is received, the server generates a remote unlocking instruction. The remote unlocking instruction comprises a challenge code. S508, the server sends a remote unlocking instruction. S509, the intelligent door lock receives a remote unlocking instruction. S510, under the condition that the verification factor of the remote unlocking instruction passes the verification, the intelligent door lock executes the unlocking action. The verification factors comprise the device ID of the intelligent door lock, a door lock digital certificate and a private key.
By adopting the method for remote unlocking provided by the embodiment of the disclosure, the challenge code generated by the intelligent door lock comprises the equipment ID of the intelligent door lock, the door lock digital certificate and the private key, wherein the equipment ID ensures that the intelligent door lock to be unlocked is unique, and the door lock digital certificate and the private key are information which cannot be acquired by the mobile terminal and the server. This makes it impossible to generate a challenge code that can be verified by the smart door lock even if a hacker attacks the mobile terminal or the server, and further, to generate a remote unlocking instruction containing the challenge code. The device ID of the intelligent door lock, the door lock digital certificate and the private key in the remote unlocking instruction cannot pass verification, and the unlocking action cannot be executed. Therefore, under the condition that a hacker attacks the mobile terminal or the server, the risk that the challenge code and the remote unlocking instruction are forged or tampered can be effectively reduced, the risk that the intelligent door lock performs unlocking action is further reduced, and the property safety of individuals and families is further maintained.
As shown in connection with fig. 6, an embodiment of the present disclosure provides an apparatus 300 for remote unlocking, including a processor (processor) 600 and a memory (memory) 601. Optionally, the apparatus may further comprise a communication interface (Communication Interface) 602 and a bus 603. The processor 600, the communication interface 602, and the memory 601 may communicate with each other via the bus 603. The communication interface 602 may be used for information transfer. The processor 600 may call logic instructions in the memory 601 to perform the method for remote unlocking of the above-described embodiments.
Further, the logic instructions in the memory 601 described above may be implemented in the form of software functional units and may be stored in a computer readable storage medium when sold or used as a stand alone product.
The memory 601 serves as a computer readable storage medium, and may be used to store a software program, a computer executable program, and program instructions/modules corresponding to the methods in the embodiments of the present disclosure. The processor 600 executes the functional applications and data processing by running the program instructions/modules stored in the memory 601, i.e. implements the method for remote unlocking in the above-described embodiments.
The memory 601 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, at least one application program required for functions; the storage data area may store data created according to the use of the terminal device, etc. In addition, the memory 601 may include a high-speed random access memory, and may also include a nonvolatile memory.
The embodiment of the disclosure provides an intelligent door lock, comprising: an intelligent door lock body and the device for remote unlocking. The device for remote unlocking is mounted to the intelligent door lock body. The mounting relationship described herein is not limited to being placed inside the intelligent door lock, but also includes mounting connections with other components of the intelligent door lock, including but not limited to physical connections, electrical connections, or signal transmission connections, etc. Those skilled in the art will appreciate that the means for remote unlocking may be adapted to a viable smart door lock body, thereby enabling other viable embodiments.
The embodiment of the disclosure provides a server, comprising: server body, and above-mentioned device that is used for long-range unblanking. A means for remote unlocking is mounted to the server body. The mounting relationship described herein is not limited to being placed inside the server, but also includes mounting connections to other components of the server, including but not limited to physical connections, electrical connections, or signal transmission connections, etc. Those skilled in the art will appreciate that the means for remotely unlocking may be adapted to a feasible server body, thereby enabling other feasible embodiments.
The embodiment of the disclosure provides a mobile terminal, which comprises: the mobile terminal body and the device for remote unlocking. A device for remote unlocking is mounted to the mobile terminal body. The mounting relationship described herein is not limited to being disposed within the mobile terminal, but also includes mounting connections with other components of the mobile terminal, including but not limited to physical connections, electrical connections, or signal transmission connections, etc. Those skilled in the art will appreciate that the means for remotely unlocking may be adapted to a viable mobile terminal body, thereby enabling other viable embodiments.
Embodiments of the present disclosure provide a computer-readable storage medium storing computer-executable instructions configured to perform the above-described method for remotely unlocking a lock.
The computer readable storage medium may be a transitory computer readable storage medium or a non-transitory computer readable storage medium.
Embodiments of the present disclosure may be embodied in a software product stored on a storage medium, including one or more instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of a method according to embodiments of the present disclosure. And the aforementioned storage medium may be a non-transitory storage medium including: a plurality of media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or a transitory storage medium.
The above description and the drawings illustrate embodiments of the disclosure sufficiently to enable those skilled in the art to practice them. Other embodiments may involve structural, logical, electrical, process, and other changes. The embodiments represent only possible variations. Individual components and functions are optional unless explicitly required, and the sequence of operations may vary. Portions and features of some embodiments may be included in, or substituted for, those of others. Moreover, the terminology used in the present application is for the purpose of describing embodiments only and is not intended to limit the claims. As used in the description of the embodiments and the claims, the singular forms "a," "an," and "the" (the) are intended to include the plural forms as well, unless the context clearly indicates otherwise. Similarly, the term "and/or" as used in this application is meant to encompass any and all possible combinations of one or more of the associated listed. Furthermore, when used in this application, the terms "comprises," "comprising," and/or "includes," and variations thereof, mean that the stated features, integers, steps, operations, elements, and/or components are present, but that the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof is not precluded. Without further limitation, an element defined by the phrase "comprising one …" does not exclude the presence of other like elements in a process, method or apparatus comprising such elements. In this context, each embodiment may be described with emphasis on the differences from the other embodiments, and the same similar parts between the various embodiments may be referred to each other. For the methods, products, etc. disclosed in the embodiments, if they correspond to the method sections disclosed in the embodiments, the description of the method sections may be referred to for relevance.
Those of skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. The skilled artisan may use different methods for each particular application to achieve the described functionality, but such implementation should not be considered to be beyond the scope of the embodiments of the present disclosure. It will be clearly understood by those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, which are not repeated herein.
In the embodiments disclosed herein, the disclosed methods, articles of manufacture (including but not limited to devices, apparatuses, etc.) may be practiced in other ways. For example, the apparatus embodiments described above are merely illustrative, and for example, the division of the units may be merely a logical function division, and there may be additional divisions when actually implemented, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. In addition, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interface, device or unit indirect coupling or communication connection, which may be in electrical, mechanical or other form. The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to implement the present embodiment. In addition, each functional unit in the embodiments of the present disclosure may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. In the description corresponding to the flowcharts and block diagrams in the figures, operations or steps corresponding to different blocks may also occur in different orders than that disclosed in the description, and sometimes no specific order exists between different operations or steps. For example, two consecutive operations or steps may actually be performed substantially in parallel, they may sometimes be performed in reverse order, which may be dependent on the functions involved. Each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The foregoing is merely a preferred embodiment of the present application and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the present application and are intended to be comprehended within the scope of the present application.

Claims (12)

1. A method for remote unlocking, applied to an intelligent door lock, comprising the following steps:
generating a challenge code; the challenge code comprises a device ID of the intelligent door lock, a door lock digital certificate and a private key;
sending a challenge code and a remote unlocking request;
receiving a remote unlocking instruction; the remote unlocking instruction comprises a challenge code;
under the condition that the verification factor of the remote unlocking instruction passes the verification, the unlocking action is executed; the verification factors comprise the device ID of the intelligent door lock, a door lock digital certificate and a private key.
2. The method of claim 1, wherein the challenge code is generated in the event of a visitor triggering the doorbell.
3. The method of claim 1, wherein the challenge code further comprises: a user valid time window; the challenge code is generated according to the device ID of the intelligent door lock, the user effective time window, the door lock digital certificate and the private key.
4. A method according to any one of claims 1 to 3, wherein the verification of the remote unlock command is performed by verifying that the verification factor is correct, comprising:
the validity of the verification factor of the remote unlocking instruction passes the verification, and the validity of the verification factor of the remote unlocking instruction passes the verification.
5. A method for remote unlocking, which is applied to a server and is characterized in that,
receiving a challenge code; the challenge code comprises a device ID of the intelligent door lock, a door lock digital certificate and a private key;
sending a remote unlocking request;
generating a remote unlocking instruction under the condition that a request for confirming unlocking and generating the remote unlocking instruction is received;
the remote unlocking instruction comprises a challenge code;
sending a remote unlocking instruction to enable the intelligent door lock to unlock under the condition that verification factors of the remote unlocking instruction pass verification; the verification factors comprise the device ID of the intelligent door lock, a door lock digital certificate and a private key.
6. The method of claim 5, wherein generating a remote unlock command comprises:
receiving a user identity and a digital signature of a mobile terminal;
generating a temporary response code under the condition that the user identity and the digital signature of the mobile terminal pass verification;
Wherein the temporary response code comprises a challenge code;
generating a remote unlocking instruction; the remote unlocking instruction comprises a challenge code and a temporary response code.
7. The method of claim 6, wherein the temporary response code further comprises: binding relation between the mobile terminal user and the door lock, and digital certificate and private key of the server; the temporary response code is generated according to the challenge code, the binding relation between the mobile terminal user and the door lock, the digital certificate of the server and the private key.
8. The method of claim 6, wherein the remote unlock command is generated based on a challenge code and a temporary response code.
9. A storage medium comprising a stored program, wherein the program when run performs the method of any one of claims 1 to 8.
10. An apparatus for remote unlocking comprising a memory and a processor, wherein the memory has stored therein a computer program, the processor being arranged to perform the method of any of claims 1 to 8 by means of the computer program.
11. An intelligent door lock, characterized by comprising:
an intelligent door lock body;
A device for remote unlocking, mounted to the intelligent door lock body, comprising a memory in which a computer program is stored, and a processor arranged to execute the method of any one of claims 1 to 4 by means of the computer program.
12. A server, comprising:
a server body;
means for remote unlocking, mounted to the server body, comprising a memory in which a computer program is stored and a processor arranged to execute the method of any of claims 5 to 8 by means of the computer program.
CN202311120545.1A 2023-08-31 2023-08-31 Method and device for remote unlocking, intelligent door lock, server and storage medium Pending CN117253304A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311120545.1A CN117253304A (en) 2023-08-31 2023-08-31 Method and device for remote unlocking, intelligent door lock, server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311120545.1A CN117253304A (en) 2023-08-31 2023-08-31 Method and device for remote unlocking, intelligent door lock, server and storage medium

Publications (1)

Publication Number Publication Date
CN117253304A true CN117253304A (en) 2023-12-19

Family

ID=89134080

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311120545.1A Pending CN117253304A (en) 2023-08-31 2023-08-31 Method and device for remote unlocking, intelligent door lock, server and storage medium

Country Status (1)

Country Link
CN (1) CN117253304A (en)

Similar Documents

Publication Publication Date Title
JP7152466B2 (en) Secure communication method and smart lock system based thereon
CN110679113B (en) Industrial network using blockchain for access control and access control method
CN105118127B (en) A kind of guest system and control method thereof
CN105141584B (en) A kind of equipment authentication method and device of smart home system
EP3346660B1 (en) Authentication information update method and device
CN101222488B (en) Method and network authentication server for controlling client terminal access to network appliance
CN103227776B (en) Configuration method, configuration device, computer program product and control system
CN105282179B (en) A method of family's Internet of Things security control based on CPK
CN105279832A (en) Intelligent door lock system and control method thereof
CN109618334B (en) Control method and related equipment
CN104813685A (en) Subscription-notification mechanisms for synchronization of distributed states
CN105009131A (en) Multi-tiered authentication methods for facilitating communications amongst smart home devices and cloud-based servers
CN112989426B (en) Authorization authentication method and device, and resource access token acquisition method
CN112187831A (en) Equipment network access method and device, storage medium and electronic equipment
CN108447154A (en) Safe unlocking method and device, encryption and decryption method and device, lock and server
CN104735065A (en) Data processing method, electronic device and server
Margulies Garage door openers: An internet of things case study
CN112333214B (en) Safe user authentication method and system for Internet of things equipment management
KR20220072657A (en) SECURITY CONSTRUCTION METHOD FOR IoT DEVICES PLATFORM AND SECURITY CONSTRUCTION SYSTEM FOR IoT DEVICES PLATFORM BASED ON DUAL BLOCKCHAIN COUPLED WITH VIRTUAL BLOCKCHAIN
CN103985228A (en) System and method to aggregate control of multiple devices
CN109472904B (en) Door lock password management system and method
CN112102524A (en) Unlocking method and unlocking system
CN112468293B (en) Identity authentication method, system, equipment and computer readable storage medium
CN115550002B (en) TEE-based intelligent home remote control method and related device
CN117253304A (en) Method and device for remote unlocking, intelligent door lock, server and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination