CN208335313U - The controllable permission blue-tooth intelligence door lock of cell phone application - Google Patents

The controllable permission blue-tooth intelligence door lock of cell phone application Download PDF

Info

Publication number
CN208335313U
CN208335313U CN201820857022.3U CN201820857022U CN208335313U CN 208335313 U CN208335313 U CN 208335313U CN 201820857022 U CN201820857022 U CN 201820857022U CN 208335313 U CN208335313 U CN 208335313U
Authority
CN
China
Prior art keywords
module
cell phone
phone application
door lock
pin
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201820857022.3U
Other languages
Chinese (zh)
Inventor
刘传佳
李昀皓
魏泽坤
缪君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanchang Hangkong University
Original Assignee
Nanchang Hangkong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanchang Hangkong University filed Critical Nanchang Hangkong University
Priority to CN201820857022.3U priority Critical patent/CN208335313U/en
Application granted granted Critical
Publication of CN208335313U publication Critical patent/CN208335313U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

The utility model discloses the controllable permission blue-tooth intelligence door locks of cell phone application, belong to intelligent door lock technical field, including intelligent door lock, cell phone application, server and encrypting module for communication encryption between intelligent door lock and cell phone application, encrypting module includes authentication secret, initial key, public keys and session key, intelligent door lock includes electronic lock body, drive the drive module of electronic lock body, bluetooth module, power module, control chip module and reservoir module, cell phone application is connected by bluetooth module and control chip module wireless communication, control chip module is electrically connected with drive module and reservoir module respectively;The utility model realizes the wireless communication between cell phone application and intelligent door lock by bluetooth interaction, compared with traditional network connection, its safety is more preferable, and the authentication between mobile terminal and intelligent door lock carries out encrypted transmission verifying by cipher key module, it solves traditional intelligence door lock to be easy to be further improved by Replay Attack situation using safe.

Description

The controllable permission blue-tooth intelligence door lock of cell phone application
Technical field
The utility model relates to intelligent door lock technical fields, more particularly to the controllable permission blue-tooth intelligence door of cell phone application Lock.
Background technique
Intelligent door lock refer to be different from tradition machinery lock on the basis of it is improved, in user security, identification, managerial side The lockset of the more intelligent easy in face, with the continuous development of intellectualized community, using intelligent door lock as the intelligence of execution unit Access control uses more and more extensive;But existing intelligent door lock is all largely lock body connection internet, passes through internet It is attached control, safety is still insufficient, is easy by Replay Attack.
Utility model content
In order to overcome the drawbacks of the prior art, the technical problem to be solved by the utility model is to propose that cell phone application can Permission blue-tooth intelligence door lock is controlled, the wireless communication between cell phone application and intelligent door lock is realized by bluetooth interaction, compared with traditional It is connected to the network that its safety is more preferable, the bluetooth connection authentication between cell phone application and intelligent door lock, which passes through authentication secret, to carry out Encrypted transmission, and between cell phone application and intelligent door lock unlocking instruction verifying respectively by initial key, session key and Public-key cryptography carries out multi-enciphering transmission, and solving traditional intelligence door lock is that simple symmetric key authentication is easy by Replay Attack Situation is further improved using safe.
For this purpose, the utility model uses following technical scheme: including intelligent door lock, for controlling the intelligent door The cell phone application of lock-switch, respectively with the cell phone application and with the server of intelligent door lock communication connection and for described Communication encryption or the cipher key module of decryption between intelligent door lock and the cell phone application, the cipher key module include authentication secret, Initial key, session key and public keys, the server have storage, modification subscriber data and to user identity into The functional module of row identification;
The intelligent door lock include electronic lock body, the drive module for driving electronic lock body switch, bluetooth module, Power module, control chip module and reservoir module, the mobile phone A pp are logical by bluetooth module and the control chip module Letter connection, the control chip module are electrically connected the driving mould with the drive module and the reservoir module respectively Block, the bluetooth module, the control chip module and the reservoir module are electrically connected with the power module, described Server and the bluetooth module communicate to connect;
The encryption of the decruption key, the initial key of the authentication secret is stored in the control chip module respectively The decruption key of key, the decruption key of the session key and the public keys is stored respectively in the server The encryption key of the encryption key of the authentication secret, the decruption key of the initial key and the session key, it is described The encryption key of the public keys is stored in cell phone application;
The control chip module generates two group first at random between cell phone application and the bluetooth module when bluetooth connection Number, wherein the first random number described in one group, which is used for the transmission between control chip module and cell phone application, forms bluetooth connection instruction, Another first random number is stored in the reservoir module and for being compared with wherein the first random number described in one group Right, the authentication secret is returned for wherein the first random number described in one group from the cell phone application to the control chip module The encryption and decryption of process;
The control chip module generates two group of second random number when first random number compares successfully, wherein one group Second random number, which is used to transmit between the control chip module and the cell phone application, forms unlocking instruction, and another group Second random number is stored in the reservoir module and for being compared with wherein one group of second random number;
The initial key is for wherein the second random number described in one group in the control chip module to the cell phone application Encryption and decryption in transmission process, the session key for wherein the second random number described in one group the cell phone application to Encryption and decryption in the control chip module passback process, after the public keys is used to encrypt by the session key Second random number encryption and decryption, the control chip module drives institute when second random number compares successfully Drive module is stated to drive the electronic lock body to open.
Optionally, the control chip module is model STM32VET6 microcontroller development board, and the reservoir module is AT24C128 reservoir, the bluetooth module are CC2540 bluetooth module, and drive module is L9110 motor drive module;
Pin A0, pin A1 and the pin NC of the AT24C128 reservoir are grounded, the AT24C128 reservoir Pin SCL connect with the pin PB6 of the STM32VET6 microcontroller development board, the pin of the AT24C128 reservoir SDA is connect with the pin PB7 of the STM32VET6 microcontroller development board;
The pin PIO1 of the CC2540 bluetooth module is grounded, the pin TX of the CC2540 bluetooth module with it is described The pin PA10 connection of STM32VET6 microcontroller development board, the pin RX and the STM32VET6 of the CC2540 bluetooth module The pin PA9 connection of microcontroller development board;
The pin IB of the L9110 motor drive module and the pin PB0 of the STM32VET6 microcontroller development board connect It connects, the pin IA of the L9110 motor drive module is connect with the pin PB1 of the STM32VET6 microcontroller development board, described The pin OA of L9110 motor drive module is connect with the intracorporal motor anode of the electronic lock, the L9110 motor drive module Pin OB connect with the intracorporal motor cathode of the electronic lock.
Optionally, the reservoir module is also used to store the operation note of intelligent door lock, and the cell phone application, which has, to be used Family login module, operation module and operation note read module.
It optionally, further include the LED signal lamp being electrically connected with the control chip module and buzzer, the LED signal Lamp and the buzzer are electrically connected with the power module.
Optionally, bluetooth of first random number when comparing failure, between the cell phone application and the bluetooth module Connection can disconnect within the time of 3s~5s.
The utility model has the following beneficial effects: the utility model by bluetooth interaction realize cell phone application and intelligent door lock it Between wireless communication, compared with traditional network connection, its safety is more preferable, and the bluetooth connection between cell phone application and intelligent door lock is logical Letter is verified authentication secret and carries out encrypted transmission, and the unlocking instruction verifying between cell phone application and intelligent door lock passes through respectively It crosses initial key, session key and public-key cryptography and carries out multi-enciphering transmission, it is only simple right to solve traditional intelligence door lock Key authentication is claimed to be easy to be further improved by Replay Attack situation using safe.
Detailed description of the invention
Fig. 1 is the controllable permission blue-tooth intelligence door lock flow diagram of cell phone application that specific embodiment of the present invention provides.
Fig. 2 is the controllable permission blue-tooth intelligence door lock control chip of cell phone application that specific embodiment of the present invention provides Module circuit diagram.
Fig. 3 is the controllable permission blue-tooth intelligence door lock bluetooth module of cell phone application that specific embodiment of the present invention provides Circuit diagram.
Fig. 4 is the controllable permission blue-tooth intelligence door lock reservoir mould of cell phone application that specific embodiment of the present invention provides Block circuit diagram.
Fig. 5 is the controllable permission blue-tooth intelligence door lock drive module of cell phone application that specific embodiment of the present invention provides Circuit diagram.
In figure: 1, cell phone application;2, bluetooth module;3, chip module is controlled;4, drive module;5, electronic lock body;6, it stores Device module;7, LED signal lamp;8, buzzer;9, power module;10, authentication secret;11, initial key;12, session key; 13, public keys;100, the first random number;200, the second random number.
Specific embodiment
Further illustrate the technical solution of the utility model below with reference to the accompanying drawings and specific embodiments.
Fig. 1 schematically illustrates the controllable permission blue-tooth intelligence door lock flow diagram of cell phone application provided by the utility model, Fig. 2 schematically illustrates the controllable permission blue-tooth intelligence door lock control chip module circuit of cell phone application provided by the utility model Figure, Fig. 3 schematically illustrate the controllable permission blue-tooth intelligence door lock bluetooth module circuit of cell phone application provided by the utility model Figure, Fig. 4 schematically illustrate the controllable permission blue-tooth intelligence door lock reservoir module circuit of cell phone application provided by the utility model Figure, Fig. 5 schematically illustrate the controllable permission blue-tooth intelligence door lock drive module circuit of cell phone application provided by the utility model Figure.
Cell phone application 1 including intelligent door lock, for controlling Intelligent door lock switch, respectively with cell phone application 1 and with intelligence The server (not shown) of door lock communication connection and for communication encryption between intelligent door lock and cell phone application 1 or decryption Cipher key module, cipher key module include authentication secret 10, initial key 11, session key 12 and public keys 13, service utensil There are storage, modification subscriber data and the functional module identified to user identity;Specifically, it is stored by server Subscriber data is modified, so that subscriber data repository is formed, when user carries out logging in cell phone application 1 using different account number ciphers When, server is by identification user after being compared with the subscriber data in server and assigns user's corresponding operation permission, In addition the authentication secret 10 in the present embodiment, initial key 11, session key 12 and public keys 13 it is each freely decrypt it is close Key and encryption key composition, encryption key are used for the data of encrypted transmission, and decruption key is for decrypting encrypted data.
Intelligent door lock includes electronic lock body 5, the drive module 4 for driving electronic lock body 5 to switch, bluetooth module 2, power supply Module 9, control chip module 3 and reservoir module 6, cell phone application 1 pass through bluetooth module 2 and control 3 communication link of chip module It connects, control chip module 3 is electrically connected drive module 4, bluetooth module 2, control with drive module 4 and reservoir module 6 respectively Chip module 3 and reservoir module 6 are electrically connected with power module 9, and server and bluetooth module 2 communicate to connect;It is specific next It says, the electronic lock body 5 in the present embodiment can select one of universal electric lock body 5 on the market, and drive module 4 passes through driving electricity Motor in sublock body 5 is to control the open and close of electronic lock body 5.
The decruption key of authentication secret 10, the encryption key of initial key 11, meeting are stored respectively in control chip module 3 The decruption key of key 12 and the decruption key of public keys 13 are talked about, stores the encryption of authentication secret 10 in server respectively The encryption key of key, the decruption key of initial key 11 and session key 12 stores public keys 13 in cell phone application 1 Encryption key;Specifically, the server in the present embodiment is communicated to connect as between cell phone application 1 and control chip module 3 Interaction, that is to say, that the verify data mutually transmitted first reaches server and reaches cell phone application 1 again, then passes through in transmittance process Different keys carries out encrypted transmission and decryption, improves the safety of verify data.
Control chip module 3 generates two groups of first random numbers between cell phone application 1 and bluetooth module 2 when bluetooth connection 100, it forms bluetooth connection wherein one group of first random number 100 is used for the transmission between control chip module 3 and cell phone application 1 and refers to It enabling, another first random number 100 is stored in reservoir module 6 and for being compared with wherein one group of first random number 100, Authentication secret 10 for wherein one group of first random number 100 from cell phone application 1 to the encryption of control 3 passback process of chip module and Decryption;Specifically, it needs first to carry out bluetooth connection between cell phone application 1 and intelligent door lock first, and has one after bluetooth connection A Qualify Phase, exactly control chip module 3 production two group of first random number 100 in wherein one group by server transmit To cell phone application 1, wherein one group of first random number 100 after cell phone application 1 returns can be carried out with another group of the first random number 100 It compares, compares and successfully then verify bluetooth connection success, subsequent unlocking instruction operation can be carried out.
Control chip module 3 generates two group of second random number 200 when the first random number 100 compares successfully, wherein one group Second random number 200 is used for the transmission between control chip module 3 and cell phone application 1 and forms unlocking instruction, and another group second random Number 200 is stored in reservoir module 6 and for being compared with wherein one group of second random number 200;Initial key 11 is used for Wherein encryption and decryption of one group of second random number 200 in control chip module 3 into 1 transmission process of cell phone application, session are close Encryption and solution of the key 12 for wherein one group of second random number 200 in cell phone application 1 into control 3 passback process of chip module Close, public keys 13 is used for encryption and decryption by encrypted second random number 200 of session key 12, controls chip module 3 drive drive module 4 that electronic lock body 5 is driven to open when the second random number 200 compares successfully;Specifically, lead to above-mentioned First random number 100 compares the same principle, and the second random number 200 sent is compared after mobile phone APP1 passback, It compares and unlocking operation is then successfully completed by driving 4 unlocking electronic lock body 5 of drive module.
The unlocking operation step of the utility model:
1, cell phone application 1 searches for bluetooth and starts to connect the bluetooth module 2 of intelligent door lock;
2, cell phone application 1 and intelligent door lock bluetooth connection success;
3, intelligent door lock generates the formation connectivity verification of the first random number 100 and instructs and be sent to cell phone application 1;
4, the first random number 100 in information is extracted after App is received, and recycles the authentication secret 10 being stored in server Encryption key encrypted, be assembled into connectivity verification instruction encrypted content after issue connectivity verification instruction;
5, intelligent door lock is decrypted after receiving verifying link order using the decruption key of authentication secret 10, is returned The first random number 100 and be compared, compare and successfully then verify bluetooth connection and can successfully carry out subsequent instructions operation;If than To failure, then operates so far step and bluetooth connection is disconnected with regard to end operation;
6, after bluetooth connection is proved to be successful, cell phone application 1, which issues, obtains facility information instruction;
7, intelligent door lock receives instruction, generates the second random number 200, and the second random number 200 adds by initial key 11 It is assembled into response after key encryption with the number of intelligent door lock, version number, information about power again and obtains facility information instruction, send To cell phone application 1;
8, cell phone application 1 receive after the response instruction of step 7 using the decruption key of the initial key 11 in server into Row is decrypted, and is carried out encryption formation with the encryption key of the session key 12 in server again after the second random number 200 of extraction and is unlocked Instruction, the whole encryption key for recycling public keys 13 are encrypted and return to intelligent door lock;Wherein public keys 13 exists Effect in this interaction is to obscure instruction, even if the effect for allowing others not see some instruction formats listening to instruction;
9, after intelligent door lock receives the encrypted instruction of step 8, using the decryption key decryption of public keys 13, identification refers to Enabling type is unlocking instruction, extracts the second random number 200 after recycling session to exempt from postal decryption and is compared, if comparing successfully Drive the drive module 4 of intelligent door lock then to complete the unlocking action of electronic lock body 5;
10, intelligent door lock unlocking process is completed.
Generally speaking, the utility model realizes the wireless communication between cell phone application 1 and intelligent door lock by bluetooth interaction, Compared with traditional network connection, its safety is more preferable, and the bluetooth connection authentication between cell phone application 1 and intelligent door lock is by testing It demonstrate,proves key 10 and carries out encrypted transmission, and initial key is passed through in the unlocking instruction verifying between cell phone application 1 and intelligent door lock respectively 11, session key 12 and public-key cryptography carry out multi-enciphering transmission, and solving traditional intelligence door lock is simple symmetric key Verifying is easy to be further improved by Replay Attack situation using safe.
Optionally, as shown in Figures 2 to 5, control chip module 3 is model STM32VET6 microcontroller development board, reservoir Module 6 is AT24C128 reservoir, and bluetooth module 2 is CC2540 bluetooth module, and drive module 4 is L9110 motor drive module; Pin A0, pin A1 and the pin NC of AT24C128 reservoir are grounded, the pin SCL of AT24C128 reservoir with The pin PB6 connection of STM32VET6 microcontroller development board, the pin SDA and STM32VET6 single-chip microcontroller of AT24C128 reservoir The pin PB7 connection of development board;The pin PIO1 of CC2540 bluetooth module is grounded, the pin TX of CC2540 bluetooth module with The pin PA10 connection of STM32VET6 microcontroller development board, the pin RX and STM32VET6 single-chip microcontroller of CC2540 bluetooth module The pin PA9 connection of development board;The pin IB of the L9110 motor drive module and pin PB0 of STM32VET6 microcontroller development board Connection, the pin IA of L9110 motor drive module are connect with the pin PB1 of STM32VET6 microcontroller development board, L9110 motor The pin OA of drive module is connect with the motor anode in electronic lock body 5, the pin OB and electronic lock of L9110 motor drive module Motor cathode connection in body 5;With specific reference to shown in Fig. 2 and Fig. 3, the pin 3.3V input service of CC2540 bluetooth module is electric Pressure, the pin GND ground connection of CC2540 bluetooth module;With specific reference to shown in Fig. 2 and Fig. 4, the pin of AT24C128 reservoir VCC input service voltage, the pin GND ground connection of AT24C128 reservoir;With specific reference to shown in Fig. 2 and Fig. 5, in Fig. 5 Motor+ is that the connection of motor anode pin, the motor- in electronic lock body 5 are that motor cathode connection in electronic lock body 5 is drawn Foot, the pin VCC and pin GND of L9110 motor drive module are grounded.
Optionally, reservoir module 6 is also used to store the operation note of intelligent door lock, and there is cell phone application 1 user to log in mould Block, operation module and operation note read module;User inputs account number cipher and logs in, and carries out door lock by operation module Open command operation, by the recorded open and close information of operation note read module door lock, storage in reservoir module 6 The operation note of intelligent door lock is sent to server and is stored, and cell phone application 1 is looked into from transferring operation note from server It reads.
It optionally, further include the LED signal lamp 7 being electrically connected with control chip module 3 and buzzer 8,7 He of LED signal lamp Buzzer 8 is electrically connected with power module 9;Specifically, LED signal lamp 77 and buzzer 88 are for prompting intelligent door lock to open Closed state information, in the present embodiment, after intelligent door lock is unlocked successfully, buzzer 8 can be rung, and buzzer 8 is closed in intelligent door lock Locking successfully can also ring after three seconds, and signal lamp is lighted along with 8 sound of buzzer, provide one suggesting effect of user.
Optionally, bluetooth connection meeting of first random number 100 when comparing failure, between cell phone application 1 and bluetooth module 2 It is disconnected in the time of 3s~5s;Specifically, in the present embodiment, the first random number 100 is stated when comparing failure, bluetooth connects Connecing can disconnect in the period of 3s~5s, to refuse subsequent unlocking instruction operation, improve the unlocking safety of intelligent door lock.
The utility model is described with reference to the preferred embodiments, and those skilled in the art know, is not departing from this reality In the case where with novel spirit and scope, various changes or equivalence replacement can be carried out to these features and embodiment.This reality It is not limited to the particular embodiment disclosed with novel, other embodiments fallen into claims hereof all belong to In the range of the utility model protection.

Claims (5)

1. the controllable permission blue-tooth intelligence door lock of cell phone application, it is characterised in that:
Cell phone application (1) including intelligent door lock, for controlling the Intelligent door lock switch, respectively with the cell phone application (1) with And add with the server of intelligent door lock communication connection and for being communicated between the intelligent door lock and the cell phone application (1) It is close or decryption cipher key module, the cipher key module include authentication secret (10), initial key (11), session key (12) with And public keys (13), the server have the function of storage, modification subscriber data and carry out identifying mould to user identity Block;
The intelligent door lock includes electronic lock body (5), the drive module (4) for driving the electronic lock body (5) to switch, bluetooth Module (2), power module (9), control chip module (3) and reservoir module (6), the cell phone application (1) pass through bluetooth module (2) with the control chip module (3) communication connection, the control chip module (3) respectively with the drive module (4) and The reservoir module (6) be electrically connected the drive module (4), the bluetooth module (2), the control chip module (3) with And the reservoir module (6) is electrically connected with the power module (9), the server is communicated with the bluetooth module (2) Connection;
Decruption key, the initial key of the authentication secret (10) are stored in control chip module (3) respectively (11) decruption key of encryption key, the session key (12) and the decruption key of the public keys (13), it is described The encryption key of the authentication secret (10), the decruption key of the initial key (11) and institute are stored in server respectively The encryption key of session key (12) is stated, the encryption key of the public keys (13) is stored in the cell phone application (1);
The control chip module (3) generates two group between cell phone application (1) and the bluetooth module (2) when bluetooth connection One random number (100), wherein the first random number (100) described in one group be used for control chip module (3) and cell phone application (1) it Between transmission form bluetooth connection instruction, another first random number (100) is stored in the reservoir module (6) and is used for Be compared with wherein the first random number (100) described in one group, the authentication secret (10) for wherein described in one group first with Encryption and decryption of the machine number (100) from the cell phone application (1) to described control chip module (3) passback process;
The control chip module (3) generates two group of second random number when first random number (100) compares successfully (200), wherein the second random number (200) described in one group be used for the control chip module (3) and the cell phone application (1) it Between transmission form unlocking instruction, the second random number (200) described in another group be stored in the reservoir module (6) and for Wherein one group of second random number (200) is compared;
The initial key (11) is for wherein the second random number (200) described in one group in the control chip module (3) to institute The encryption and decryption in cell phone application (1) transmission process are stated, the session key (12) is for wherein the second random number described in one group (200) encryption and decryption in the cell phone application (1) into described control chip module (3) passback process, the public keys (13) for the encryption and decryption by encrypted second random number (200) of the session key (12), the control Chip module (3) drives the drive module (4) to drive the electronic lock when second random number (200) compares successfully Body (5) is opened.
2. the controllable permission blue-tooth intelligence door lock of cell phone application as described in claim 1, it is characterised in that:
The control chip module (3) is model STM32VET6 microcontroller development board, and the reservoir module (6) is AT24C128 reservoir, the bluetooth module (2) are CC2540 bluetooth module, and drive module (4) is L9110 motor driven mould Block;
Pin A0, pin A1 and the pin NC of the AT24C128 reservoir are grounded, and the AT24C128 reservoir draws Foot SCL is connect with the pin PB6 of the STM32VET6 microcontroller development board, the pin SDA of the AT24C128 reservoir and institute State the pin PB7 connection of STM32VET6 microcontroller development board;
The pin PIO1 of the CC2540 bluetooth module is grounded, the pin TX of the CC2540 bluetooth module with it is described The pin PA10 connection of STM32VET6 microcontroller development board, the pin RX and the STM32VET6 of the CC2540 bluetooth module The pin PA9 connection of microcontroller development board;
The pin IB of the L9110 motor drive module is connect with the pin PB0 of the STM32VET6 microcontroller development board, institute The pin IA for stating L9110 motor drive module is connect with the pin PB1 of the STM32VET6 microcontroller development board, the L9110 The pin OA of motor drive module is connect with the motor anode in the electronic lock body (5), the L9110 motor drive module Pin OB is connect with the motor cathode in the electronic lock body (5).
3. the controllable permission blue-tooth intelligence door lock of cell phone application as described in claim 1, it is characterised in that:
The reservoir module (6) is also used to store the operation note of intelligent door lock, and the cell phone application (1) logs in user Module, operation module and operation note read module.
4. the controllable permission blue-tooth intelligence door lock of cell phone application as described in claim 1, it is characterised in that:
It further include the LED signal lamp (7) being electrically connected with control chip module (3) and buzzer (8), the LED signal lamp (7) it is electrically connected with the power module (9) with the buzzer (8).
5. the controllable permission blue-tooth intelligence door lock of cell phone application as described in claim 1, it is characterised in that:
Bluetooth of first random number (100) when comparing failure, between the cell phone application (1) and the bluetooth module (2) Connection can disconnect within the time of 3s~5s.
CN201820857022.3U 2018-06-04 2018-06-04 The controllable permission blue-tooth intelligence door lock of cell phone application Expired - Fee Related CN208335313U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201820857022.3U CN208335313U (en) 2018-06-04 2018-06-04 The controllable permission blue-tooth intelligence door lock of cell phone application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201820857022.3U CN208335313U (en) 2018-06-04 2018-06-04 The controllable permission blue-tooth intelligence door lock of cell phone application

Publications (1)

Publication Number Publication Date
CN208335313U true CN208335313U (en) 2019-01-04

Family

ID=64773231

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201820857022.3U Expired - Fee Related CN208335313U (en) 2018-06-04 2018-06-04 The controllable permission blue-tooth intelligence door lock of cell phone application

Country Status (1)

Country Link
CN (1) CN208335313U (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109949457A (en) * 2019-03-04 2019-06-28 北京华大智宝电子系统有限公司 Intelligent door lock control method and relevant apparatus
CN110232754A (en) * 2019-04-22 2019-09-13 深圳市昇润科技有限公司 A kind of blue-tooth intelligence unlocking system and method
CN110351929A (en) * 2019-07-17 2019-10-18 苏州佩林网络科技有限公司 A kind of wireless lamp control system based on Bluetooth technology
CN111818377A (en) * 2020-07-09 2020-10-23 华为技术有限公司 Control method of multimedia unit, electronic equipment and remote control device
CN111815810A (en) * 2020-06-22 2020-10-23 北京智辉空间科技有限责任公司 Safe unlocking method and device for electronic lock
CN112466012A (en) * 2020-11-30 2021-03-09 福州汇思博信息技术有限公司 Method and system for controlling cash register cashbox through Bluetooth
CN113269909A (en) * 2020-02-17 2021-08-17 上海新微技术研发中心有限公司 Intelligent lock data management system based on Bluetooth communication

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109949457A (en) * 2019-03-04 2019-06-28 北京华大智宝电子系统有限公司 Intelligent door lock control method and relevant apparatus
CN110232754A (en) * 2019-04-22 2019-09-13 深圳市昇润科技有限公司 A kind of blue-tooth intelligence unlocking system and method
CN110351929A (en) * 2019-07-17 2019-10-18 苏州佩林网络科技有限公司 A kind of wireless lamp control system based on Bluetooth technology
CN110351929B (en) * 2019-07-17 2021-11-16 苏州佩林软件技术有限公司 Wireless lamp control system based on Bluetooth technology
CN113269909A (en) * 2020-02-17 2021-08-17 上海新微技术研发中心有限公司 Intelligent lock data management system based on Bluetooth communication
CN111815810A (en) * 2020-06-22 2020-10-23 北京智辉空间科技有限责任公司 Safe unlocking method and device for electronic lock
CN111818377A (en) * 2020-07-09 2020-10-23 华为技术有限公司 Control method of multimedia unit, electronic equipment and remote control device
CN112466012A (en) * 2020-11-30 2021-03-09 福州汇思博信息技术有限公司 Method and system for controlling cash register cashbox through Bluetooth
CN112466012B (en) * 2020-11-30 2023-02-14 福州汇思博信息技术有限公司 Method and system for controlling cash register cashbox through Bluetooth

Similar Documents

Publication Publication Date Title
CN208335313U (en) The controllable permission blue-tooth intelligence door lock of cell phone application
CN109040067A (en) A kind of user authentication device and authentication method based on the unclonable technology PUF of physics
CN104123768B (en) A kind of safe and intelligent lock system and unlocking, shut control method
CN110462691A (en) Method for unlocking, mobile terminal, intelligent door lock and the Cloud Server of intelligent door lock
CN106097487A (en) A kind of off-line type gate control system based on smart mobile phone and control method thereof
CN104637117B (en) Method, intelligent lock core, lockset and key that intelligent lock core and key are realized
CN104123769B (en) The unblanking of a kind of safety intelligent lock, close lock control method
CN204904392U (en) Intelligent lock system is encrypted in high in clouds
CN109191616A (en) intelligent lock system
CN108171831A (en) A kind of bidirectional safe authentication method based on NFC mobile phone and smart lock
CN205121680U (en) Bluetooth lock system based on intelligent terminal
CN104052817A (en) Intelligent door and intelligent door control method and system
CN102542449A (en) Wireless communication device and payment authentication method
CN109816831A (en) A kind of authentication method and system of the smart lock based on national secret algorithm
CN109905869A (en) Data transmission method between a kind of charging equipment and smart machine
CN107016756A (en) It is equipped with the smart lock of remote password key
CN109495251A (en) Anti- quantum calculation wired home cloud storage method and system based on key card
CN108266061A (en) Fingerprint lock
CN109035519A (en) A kind of biometric devices and method
CN106384040A (en) Intelligent module and intelligent household appliance
CN109889669A (en) A kind of unlocked by mobile telephone method and system based on secure cryptographic algorithm
CN104978515A (en) Computer intelligent hole-locking device
CN109410375A (en) The switch locking method and its system of the passive electronic lock core of built-in security chip
CN104469752B (en) A kind of encryption method, device and terminal
CN109389710A (en) Intelligent door lock system based on RSA Algorithm Yu BLE low-power consumption bluetooth

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190104

Termination date: 20200604

CF01 Termination of patent right due to non-payment of annual fee