WO2019218328A1 - 一种智能门锁无线通信方法、智能门锁、网关及通信设备 - Google Patents
一种智能门锁无线通信方法、智能门锁、网关及通信设备 Download PDFInfo
- Publication number
- WO2019218328A1 WO2019218328A1 PCT/CN2018/087400 CN2018087400W WO2019218328A1 WO 2019218328 A1 WO2019218328 A1 WO 2019218328A1 CN 2018087400 W CN2018087400 W CN 2018087400W WO 2019218328 A1 WO2019218328 A1 WO 2019218328A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- door lock
- smart door
- gateway
- data
- control instruction
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Definitions
- the invention relates to the field of smart home technology, in particular to a smart door lock wireless communication method, a smart door lock, a gateway and a communication device.
- wireless communication chip such as ZigBee, Bluetooth, WiFi, NBIOT, and 433 is commonly installed in the smart door lock, so that the user can interact with the gateway through the smart door lock client running in the terminal, and then The smart door lock is remotely controlled through the gateway, for example, viewing the unlock record of the smart door lock, etc., thereby improving the user experience.
- the prior art In order to improve the security of wireless communication between the smart door lock and the gateway, the prior art generally uses a hardware encryption scheme to encrypt data transmitted between the smart door lock and the gateway during the communication process, but this solution needs to be additionally added in the smart door lock.
- the encryption chip is added, which leads to the excessive size of the smart door lock, which causes the production cost of the smart door lock to remain high.
- the present invention provides a smart door lock wireless communication method, a smart door lock, a gateway, and a communication device.
- a method for wireless communication of a smart door lock comprising: receiving control instruction data forwarded by a gateway, wherein the control instruction data is obtained by encrypting, by the gateway, a control instruction generated by a client according to a user triggering operation; Decrypting the control instruction data to obtain decrypted data; performing secondary decryption of the decrypted data according to an encryption algorithm configured in a specified communication protocol, to obtain a control instruction, where the specified communication protocol is used to establish a communication connection with the gateway; Controlling the smart door lock to perform a corresponding operation according to the control instruction.
- a smart door lock wireless communication method includes: a gateway receiving a control instruction sent by a client, where the control instruction is generated by the client according to a user triggering operation; and the control instruction is performed according to an encryption algorithm configured in a specified communication protocol Performing encryption to obtain encrypted data; performing second encryption on the encrypted data according to a symmetric encryption algorithm to obtain control instruction data; and transmitting the control instruction data to the smart door lock.
- a smart door lock comprising: a control instruction data receiving module, configured to receive control instruction data sent by a gateway, where the control instruction data is obtained by encrypting, by the gateway, a control instruction generated by a client according to a user triggering operation; a decryption module, configured to decrypt the control instruction data according to a symmetric encryption algorithm to obtain decrypted data; and a second decryption module, configured to perform secondary decryption on the decrypted data according to an encryption algorithm configured in a specified communication protocol, to obtain a control command, the designated communication protocol is used to establish a communication connection with the gateway; and the control instruction execution module is configured to control the smart door lock to perform a corresponding operation according to the control instruction.
- a gateway includes: a control instruction receiving module, configured to receive a control instruction sent by a client, where the control instruction is generated by the client according to a user triggering operation; and a first encryption module configured to be configured according to a specified communication protocol The encryption algorithm encrypts the control instruction to obtain encrypted data; the second encryption module is configured to perform second encryption on the encrypted data according to the symmetric encryption algorithm to obtain control instruction data; and control instruction data sending module, And transmitting the control instruction data to the smart door lock.
- a communication device includes a processor and a memory having stored thereon computer readable instructions that, when executed by the processor, implement a smart door lock wireless communication method as described above.
- control instruction data sent by the gateway to the smart door lock is obtained by the gateway encrypting the control command generated by the client according to the user triggering operation, and the smart door lock receives the control command data and then sequentially encrypts according to the symmetric
- the algorithm and the encryption algorithm configured in the specified communication protocol perform the decryption twice to obtain the control instruction, and then perform the corresponding operation according to the control instruction obtained by the decryption.
- the complexity of decrypting the control command data is increased, and even if the control command data sent by the gateway to the smart door lock is eavesdropped, the risk of leaking the third party may be reduced due to the inability to crack, thereby fully ensuring
- the security of wireless communication between the smart door lock and the gateway greatly improves the wireless communication security of the smart door lock.
- FIG. 1 is a schematic illustration of an implementation environment in accordance with the present invention.
- FIG. 2 is a block diagram showing the hardware structure of a smart door lock according to an exemplary embodiment.
- FIG. 3 is a flowchart of a smart door lock wireless communication method according to an exemplary embodiment.
- FIG. 4 is a flow chart of an embodiment of step 130 in the corresponding embodiment of FIG.
- Figure 5 is a flow diagram of an embodiment of step 135 of the corresponding embodiment of Figure 4.
- FIG. 6 is a flowchart of another smart door lock wireless communication method according to an exemplary embodiment.
- FIG. 7 is a flowchart of a smart door lock wireless communication method according to an exemplary embodiment.
- FIG. 8 is a flowchart of another smart door lock wireless communication method according to an exemplary embodiment.
- FIG. 9 is a flowchart of a smart door lock wireless communication method applied to a smart door lock wireless communication system, according to an exemplary embodiment.
- FIG. 10 is a block diagram of another smart door lock, according to an exemplary embodiment.
- FIG. 11 is a block diagram of a gateway, according to an exemplary embodiment.
- FIG. 1 is a schematic illustration of an implementation environment in accordance with the present invention.
- the implementation environment is a smart door lock wireless communication system in an Internet of Things
- the smart door lock wireless communication system includes a terminal 100, a gateway 200, and a smart door lock 300.
- the smart door lock 300 establishes a wireless or wired network connection with the gateway 200 through the communication module configured by itself, and further realizes communication with the gateway 200 through the network connection.
- the communication module configured by the smart door lock 300 itself includes any one or several of a ZigBee communication module, a Bluetooth module, and a WiFi communication module.
- the gateway 200 may be a router, and may be any other electronic device capable of establishing a wireless or wired network connection with the smart door lock 300, which is not limited herein.
- the terminal 100 can be a smart phone, a tablet computer, a notebook computer, a computer, or any other electronic device that can be operated by the smart door lock client, which is not limited herein.
- a wireless or wired network connection is established in advance between the terminal 100 and the gateway 200 to implement interaction between the terminal 100 and the gateway 200 through the network connection.
- FIG. 2 is a block diagram showing the hardware structure of a smart door lock according to an exemplary embodiment. It should be noted that the smart door lock is merely an example that is adapted to the present invention and is not considered to provide any limitation on the scope of use of the present invention. Nor can the smart door lock be interpreted as having to rely on or must have one or more of the exemplary smart door locks shown in FIG. 2.
- the smart door lock includes a microprocessor 401, a memory 402, a communication module 403, a pairing module 404, a fingerprint collection module 405, an image acquisition module 406, and a power supply module 407. These components communicate with one another via one or more communication buses or signal lines.
- the microprocessor 401 is used as a core module of the smart door lock data processing for computing data stored in the smart door lock memory 402.
- the memory 402 will also be used to store computer readable instructions and modules, such as the smart door lock wireless communication method and system corresponding computer readable instructions and modules in an exemplary embodiment of the present invention, the processor 401 being stored in the memory 402 by execution.
- Memory 402 can be a random access memory, such as a high speed random access memory, a non-volatile memory such as one or more magnetic storage devices, flash memory, or other solid state memory.
- the storage method can be short-term storage or permanent storage.
- the communication module 403 is configured to establish a communication connection between the smart door lock and the gateway according to the specified communication protocol, so that the smart door lock and the gateway perform data transmission, for example, the control instruction data sent by the gateway to the smart door lock, and the smart door lock report to the gateway. Data to be sent, etc.
- the communication module 403 may be a wireless communication chip.
- the wireless communication chip may be any one of a ZigBee chip, a Bluetooth chip, or a WiFi chip.
- the pairing module 404 is configured to perform pairing between the smart door lock and the gateway, and the pairing module 404 can be a pairing button disposed on the smart door lock, and the user can perform pairing between the smart door lock and the gateway through the pairing button.
- the fingerprint collection module 405 is configured to collect the fingerprint of the unlocking person. Only when the fingerprint of the unlocked person collected by the fingerprint is a valid fingerprint can the smart door lock be controlled to perform the unlocking operation. For example, when the unlocking person fingerprint collected by the fingerprint collecting module 405 can be matched with the user fingerprint stored in the smart door lock memory 402, the unlocking person fingerprint collected by the fingerprint collecting module 405 is a valid fingerprint.
- the image acquisition module 406 is configured to collect image information of the environment surrounding the smart door lock.
- the image acquisition module 406 is a built-in camera, thereby increasing the security of the smart door lock.
- the fingerprint collection module 405 collects the fingerprint of the unlocked person
- the image acquisition module 406 simultaneously performs an image collection operation on the face of the unlocked person to facilitate verification of the identity of the unlocked person.
- the smart door lock further includes an image recognition module (not shown in FIG. 2), and the image recognition module identifies the unlocked face image collected by the image acquisition module 406, if the unlocked face data is recognized. Matching the user face data pre-stored in the smart door lock memory 402 indicates that the unlocking person is a legitimate user, and thus the smart door lock is controlled to perform an unlocking operation.
- the structure shown in FIG. 2 is merely illustrative, and the smart door lock may also include more or less components than those shown in FIG. 2, or have different components than those shown in FIG. 2.
- the components shown in FIG. 2 can be implemented in hardware, software, or a combination thereof.
- FIG. 3 is a flowchart of a smart door lock wireless communication method, which is applicable to the smart door lock shown in the implementation environment of FIG. 1 , and the hardware of the smart door lock, according to an exemplary embodiment.
- the structure is shown in Figure 2.
- the smart door lock wireless communication method is executed by the smart door lock, and may include the following steps:
- step 110 the control instruction data forwarded by the gateway is received, and the control instruction data is obtained by the gateway encrypting the control instruction generated by the client according to the user triggering operation.
- the user triggering operation is a user triggering an operation in the client interface.
- the user triggering the operation of the client interface causes the client to generate a corresponding control command, which is used to control the smart door lock to perform the corresponding operation.
- the client interface adds an unlock user add-on entry for the user, and if the user wishes to add a new unlock user, the user add entry in the client interface triggers an "add unlock user" operation, so that The smart door lock knows that the user wishes to add a new unlocking user, and accordingly generates an "add unlock user” control command.
- control command generated by the client in response to the user triggering operation may further include a “delete unlock user” control command, a “synchronous unlock user” control command, a “set temporary unlock password” control command, and “set the user”.
- the check-in password control command, the smart door lock unlock record acquisition control command, etc. do not arbitrarily limit the specific type of the control command, and accordingly, the smart door lock wireless communication provided by the embodiment according to the type of the control command
- the method is applicable to different application scenarios.
- the “add unlock user” control command corresponds to the fingerprint adding application scenario
- the “smart door lock unlock record acquisition” control command corresponds to the unlocking behavior to obtain the application scenario.
- the gateway After the client generates a control command according to the user trigger operation, and sends the generated control command to the gateway, the gateway can receive the control command sent by the client, and encrypt the control command, thereby ensuring The security of wireless communication between the gateway and the smart door lock.
- control command is first encrypted according to the encryption algorithm configured in the specified communication protocol to obtain the encrypted data, and then the encrypted data is secondarily encrypted according to the symmetric encryption algorithm to obtain the control instruction data.
- the control command data sent by the gateway can be received after the gateway performs two encryptions on the control command sent by the client to obtain the control command data.
- the smart door lock and the gateway are respectively configured with a communication module, so that the smart door lock and the gateway respectively perform a wireless or wired network connection according to a specified communication protocol supported by the communication module configured by the smart door lock, and the second connection is realized through the network connection. Communication between people.
- the designated communication protocol may be any one of a ZigBee protocol, a Bluetooth protocol, and a WiFi protocol.
- the communication modules configured by the two are identical, and may be a ZigBee communication module. Any one or several of the Bluetooth module and the WiFi communication module.
- the above specified communication protocol is configured with an encryption algorithm.
- the encryption algorithm configured is an initial symmetric encryption algorithm. This effectively reduces the complexity of encryption while ensuring the security of wireless communications.
- the symmetric encryption algorithm includes but is not limited to: DES algorithm, 3DES algorithm, TDEA algorithm, Blowfish algorithm, RC5 algorithm, IDEA algorithm, ASE algorithm, etc., thereby simply and effectively ensuring wireless connection between the smart door lock and the gateway. The security of communication.
- an asymmetric encryption algorithm with higher complexity and higher security may be adopted according to the actual processing capability of the smart door lock.
- the asymmetric encryption algorithm includes but is not limited to: RSA algorithm, Elgamal algorithm. , backpack algorithm, Rabin algorithm, DH algorithm, ECC (elliptic curve encryption) algorithm and so on.
- step 130 the control instruction data is decrypted according to a symmetric encryption algorithm to obtain decrypted data.
- control instruction data is obtained by the gateway encrypting the control command sent by the client twice, that is, the first encryption is performed according to the encryption algorithm configured in the specified communication protocol, and the second encryption is performed according to the symmetric encryption algorithm.
- the symmetric encryption algorithm means that the encryption algorithms used for encryption and decryption are consistent. Therefore, after receiving the control command data sent by the gateway, the smart door lock first uses the symmetric encryption algorithm to decrypt the control command data for the first time.
- the symmetric encryption algorithm used by the gateway to encrypt the encrypted data is the ASE algorithm
- the symmetric encryption algorithm used by the smart door lock to decrypt the control instruction data is correspondingly the ASE algorithm.
- step 150 the decryption data is decrypted twice according to an encryption algorithm configured in the specified communication protocol to obtain a control command, and the designated communication protocol is used to establish a communication connection with the gateway.
- the smart door lock performs the second decryption of the decrypted data according to the encryption algorithm configured in the specified communication protocol after performing the first decryption of the control command data sent by the gateway by performing the symmetric encryption algorithm.
- the smart door lock and the gateway are respectively configured with a communication module, so that the smart door lock and the gateway respectively perform a wireless or wired network connection according to a specified communication protocol supported by the communication module configured by the smart door lock, and then connect through the network. Achieve communication between the two.
- the specified communication protocol employed is consistent with the specified communication protocol in the gateway to facilitate secondary decryption of the decrypted data.
- the specified communication protocol adopted by the communication module configured by the gateway is the ZigBee protocol
- the encryption algorithm configured by the specified communication protocol is the initial symmetric encryption algorithm
- the communication protocol is specified in the communication module configured by the smart door lock.
- the encryption algorithm configured by the specified communication protocol is also an initial symmetric encryption algorithm.
- step 170 the smart door lock is controlled to perform a corresponding operation according to the control instruction.
- the smart door lock uses the symmetric encryption algorithm and the encryption algorithm configured in the specified communication protocol to decrypt the control command data twice, and after obtaining the control command generated by the client according to the user trigger operation, the smart door lock can be controlled according to the control.
- the instruction performs the corresponding operation.
- the smart door lock performs the operation of adding the unlocking user accordingly, and stores the fingerprint acquired at this time in the memory as a user fingerprint, so as to facilitate the user. The fingerprint can then be used to control the smart door lock to perform the unlock operation.
- control instruction data sent by the gateway to the smart door lock is encrypted twice by the encryption algorithm configured by the specified communication protocol and the symmetric encryption algorithm, which fully ensures that the control instruction data is transmitted between the smart door lock and the gateway.
- the security greatly improves the security of wireless communication between the smart door lock and the gateway.
- the encryption algorithm and the symmetric encryption algorithm configured in the smart door lock can be run in the smart door lock microprocessor through the client mode, that is, the software encryption scheme is used between the smart door lock and the gateway in the communication process. Encryption of the transmitted data does not increase the volume of the smart door lock, which in turn helps to reduce the production cost of the smart door lock.
- FIG. 4 is a flow diagram of a smart door lock generating a first key for performing a symmetric encryption algorithm, in accordance with an exemplary embodiment.
- the process of generating the first key by the smart door lock may include the following steps:
- step 131 the first key base number sent by the gateway is received, and the second key base number is randomly generated according to the first key base number.
- the smart door lock to which this embodiment is applied is configured with a two-dimensional code, which is regarded as a third key base for generating the first key.
- the third key base is a random number, and the number of bits of the random number is preset. For example, the number of bits of the random number is 128 bits.
- the two-dimensional code of the smart door lock configuration is used for scanning by the smart door lock client, or the user inputs the two-dimensional code into the smart door lock client, so that the smart door lock client performs the two-dimensional code on the two-dimensional code.
- Identification thereby obtaining a third key base represented by the two-dimensional code, and then transmitting the third key base to the gateway through interaction between the terminal and the gateway operated by the smart door lock client.
- the gateway After receiving the third key base sent by the smart door lock client, the gateway randomly generates the first key base and stores it in itself, and sends the first key base to the smart door lock.
- the first key base number sent by the gateway is received, and the second key base number is randomly generated according to the first key base number and stored in itself, and the second key base number is reported. To the gateway.
- step 133 a third key base is read from the memory of the smart door lock.
- the smart door lock is configured with a two-dimensional code that is considered to be the third key base used to generate the first key.
- the two-dimensional code will be burned into the smart door lock, so that the smart door lock stores the two-dimensional code, for example, as the third key base.
- the QR code is stored in the memory.
- the two-dimensional code is further affixed to the smart door lock, such as the inside of the battery back cover of the smart door lock, in a two-dimensional code label, so that the user can perform two-dimensional code scanning by means of the smart door lock client.
- the third key base can be read from the memory before the first key is generated.
- step 135 a key operation is performed on the first key base number, the second key base number, and the third key base number to obtain a first key for executing the symmetric encryption algorithm.
- the smart door lock After obtaining the first key base number, the second key base number and the third key base number, the smart door lock can perform a key operation according to the three key base numbers to obtain the first key.
- symmetric encryption algorithm means that the encryption algorithms used for encryption and decryption are consistent, that is, the keys used for encryption and decryption are symmetric.
- the gateway after obtaining the first key base number, the second key base number, and the third key base number, the symmetric operation of the three key base numbers obtained by using the symmetric encryption algorithm is performed accordingly. To obtain a second key that is symmetric with the first key.
- the key operation is implemented by a message digest algorithm, for example, the message digest algorithm may include a hash operation.
- the first key acquired by the smart door lock is obtained by performing key calculation on the first key base number, the second key base number and the third key base number, and therefore, the first key
- the generation is derived from multi-party data, which increases the complexity of the first key being cracked, and further enhances the security of wireless communication between the smart door lock and the gateway.
- FIG. 5 is a flowchart of a key operation performed by a smart door lock according to a first key base, a second key base, and a third key base according to an exemplary embodiment.
- the process of performing key operation by the smart door lock according to the above three key bases may include the following steps:
- step 1351 the first key base, the second key base, and the third key base are operated according to a message digest algorithm to obtain message digest data.
- the message digest algorithm preferably performs an irreversible digest operation to ensure that the generated first key is not easily cracked.
- the message digest algorithm may employ a hash operation including, but not limited to, a SHA-1 operation or an MD5 operation. This embodiment is preferably a SHA-1 operation.
- the first key base is A
- the second key base is B
- the third key base is C
- the first key base and the second key base are used by the SHA-1 operation.
- the operation formula for performing the digest operation with the third key base is SHA-1 (A+B+C).
- A+B+C indicates that the first key base number, the second key base number, and the third key base number are numerically spliced, for example, assuming that A is "1010", B is "1101”, and C is " 1001", "A+B+C" is "101011011001".
- the third key base is a random number of 128 bits
- the first key base is a 32-bit random number
- the second key base is also a 32-bit random number.
- the three key bases are spliced to obtain a 192-bit random number, and the message digest algorithm operates on the 192-bit random number to obtain message digest data.
- message digest data of 160 bits is generated; if MD5 operation is used, message digest data of 128 bits is generated.
- step 1353 the specified data is extracted from the message summary data as the first key.
- the smart door lock extracts the specified data from the generated message summary data, uses the extracted specified data as the first key, and stores the generated first key for subsequent use.
- the smart door lock is called during the wireless pass between the smart door lock and the gateway.
- the message digest data of 160 bits is generated, and the lower 128 bits of the message digest data of 160 bits can be extracted as the first key, and the 160 bits can also be extracted.
- the upper 128 bits of the message digest data are used as the first key, or the 128-bit number is randomly extracted from the message digest data of the 160-bit number as the first key, which is not limited herein.
- the smart door lock adopts a message digest algorithm to generate message digest data, and extracts the specified data as the first key from the generated message digest data, since the message digest algorithm is irreversible, and the generated message digest data
- the extraction of the fixed number of bits is randomly assignable, thereby fully ensuring the complexity of the first key being cracked.
- the gateway uses the same message digest algorithm as the smart door lock to calculate the first key base number, the second key base number and the third key base number obtained by the gateway, and the obtained message is obtained.
- the abstract data is extracted as the second key to ensure that the second key is completely consistent with the first key, thereby providing a basis for executing the symmetric key algorithm, so as to implement the smart door lock and the gateway later.
- FIG. 6 is a flowchart of a smart door lock wireless communication method according to another exemplary embodiment. As shown in FIG. 6, the smart door lock wireless communication method may further include the following steps:
- step 210 the door lock data stored by the smart door lock is encrypted according to an encryption algorithm configured in the specified communication protocol to obtain encrypted data.
- the door lock data stored by the smart door lock includes behavior data generated by the smart door lock and status data of the smart door lock component.
- the behavior data generated by the smart door lock includes an unlock record and an abnormal alarm record.
- the unlocking record includes at least one of an unlocking time, an unlocking environment, and user information.
- the unlocking time is a time when the smart door lock performs an unlocking operation
- the unlocking environment is a built-in camera captured by the smart door lock when performing the unlocking operation.
- the image of the face is unlocked
- the user information may be an unlocked person fingerprint collected by the fingerprint collection module when the smart door lock performs the unlocking operation or a user account that the client performs remote unlocking control.
- the abnormal alarm record includes at least one of an abnormal alarm time and an abnormal alarm cause, wherein the abnormal alarm time is a time when the smart door lock performs an abnormal alarm action, and the abnormal alarm cause is a trigger cause of the intelligent door lock triggering an abnormal alarm action.
- the smart door lock assembly includes at least one of a doorbell, a speaker, and a lock tongue.
- the status data of the smart door lock assembly includes at least one of a doorbell state, a speaker volume, a speaker language, and a lock tongue state.
- the doorbell state includes a doorbell closing/opening state
- the speaker volume is a volume state of the speaker playing the door lock prompting voice
- the speaker language state includes a language type of the speaker playing the door lock prompting voice, such as Chinese voice, English voice, Korean voice, etc. .
- the behavior data generated by the smart door lock and the status data of the smart door lock component are stored in the memory configured by itself.
- the reporting of the door lock data may be performed according to the actual needs of the user.
- the client may report the response to the gateway according to the control command generated by the user triggering the operation, or may be performed automatically, for example, after the smart door lock is executed. After the unlock operation, the lock record is automatically reported to the gateway.
- the encryption algorithm configured in the specified communication protocol is the same as the encryption algorithm configured in the specified communication protocol described in step 150, and details are not described herein again.
- step 230 the encrypted data is secondarily encrypted according to the symmetric encryption algorithm to obtain data to be transmitted.
- the smart door lock performs the first encryption on the unlock record according to the encryption algorithm configured in the specified communication protocol, and then performs the second encryption on the encrypted data according to the symmetric encryption algorithm stored in the communication module to obtain the data to be sent.
- the smart door lock performs the second encryption of the encrypted data using the first key when performing the symmetric encryption algorithm.
- the obtained data to be sent is data that is secondarily encrypted by the smart door lock according to the encryption algorithm configured by the specified communication protocol and the symmetric encryption algorithm.
- step 250 the to-be-sent data is reported to the gateway.
- the smart door lock reports the to-be-sent data obtained by the secondary encryption to the gateway, so that the gateway performs the secondary decryption of the received data to be sent, and then sends the decrypted unlocked record to the client.
- the gateway after receiving the data to be sent sent by the smart door lock, the gateway first decrypts the data to be sent according to the same symmetric encryption algorithm as the smart door lock, obtains corresponding decrypted data, and then configures according to the specified communication protocol.
- the encryption algorithm performs the second decryption of the decrypted data to obtain the door lock data.
- the gateway decrypts the unlock record sent by the smart door lock
- the decrypted door lock data is sent to the client, so that the client displays the door lock data in the client interface for the user to view.
- the smart door lock encrypts the door lock data according to the encryption algorithm and the symmetric encryption algorithm configured in the specified communication protocol, and the data to be sent obtained by the smart door lock secondary encryption must be according to the corresponding secondary decryption method.
- the decryption ensures the security of the smart door lock to send data out, further increasing the security of the smart door lock wireless communication.
- FIG. 7 is a flowchart of a smart door lock wireless communication method according to another exemplary embodiment. As shown in FIG. 7, the smart door lock wireless communication method may further include the following steps:
- step 310 the smart door lock pairing command sent by the gateway is received, and the user-triggered pairing operation is detected according to the smart door lock pairing instruction.
- the smart door lock needs to be paired with the gateway before establishing a communication connection with the gateway. After the smart door lock and the gateway are successfully paired, the smart door lock can establish a communication connection with the gateway, and then perform data transmission through the communication connection.
- the smart door lock pairing command received by the smart door lock and paired with the gateway is generated by the client and forwarded to the smart door lock via the gateway.
- the client adds a pairing entry for the user in the client interface. If the user wants to perform pairing between the gateway and the smart door lock, the related operation is triggered at the pairing entry, so that the client generates the smart door according to the related operation.
- the lock pairing command is reported to the gateway, and the smart door lock pairing command is sent to the smart door lock through the gateway.
- the user-triggered pairing operation in the smart door lock is detected in response to the smart door lock pairing command.
- the smart door lock is configured with a pairing button, and when the user presses the pairing button, the smart door lock can detect the user-triggered pairing operation.
- the pressing operation is the pairing operation triggered by the user in the smart door lock.
- the pairing operation triggered by the user may be a long press of the pairing button, or a short press of the pairing button, which is related to the triggering manner of the smart door lock preset by the user, and is not limited herein.
- step 330 if the user-triggered pairing operation is detected, pairing between the smart door lock and the gateway is performed to establish a communication connection between the smart door lock and the gateway.
- the smart door lock performs a pairing operation with the gateway if a user-triggered pairing operation is detected, so as to facilitate establishing a communication connection with the gateway.
- the pairing result can be sent to the client via the gateway, so that the user can obtain the pairing result of the smart door lock and the gateway through the client.
- FIG. 8 is a flowchart of a smart door lock wireless communication method according to another exemplary embodiment. As shown in FIG. 8, the smart door lock wireless communication method may further include the following steps:
- step 410 the verification information stored by the smart door lock is encrypted according to the symmetric encryption algorithm to obtain verification information.
- the first key is used to perform a symmetric encryption algorithm
- the gateway uses the second secret when decrypting/encrypting the received/transmitted data.
- the key implementation of the symmetric encryption algorithm must ensure that the first key generated by the smart door lock and the second key generated by the gateway are consistent, so as to ensure that the process of encrypting data transmission between the smart door lock and the gateway is accurate.
- the smart door lock In order to verify the consistency between the first key and the second key, the smart door lock encrypts the stored verification information using the first key as a key of the symmetric encryption algorithm to obtain verification information.
- the verification information stored in the smart door lock may specifically include a smart number locked by the smart door lock and the gateway, and the magic number is stored in the smart door lock and the gateway.
- step 430 the verification information is sent to the gateway.
- the smart door lock sends the encrypted verification information to the gateway, so that the gateway decrypts the data according to the corresponding symmetric encryption algorithm.
- the gateway when the gateway performs the symmetric encryption algorithm, the second key is used to decrypt the verification information, and the decrypted verification information is verified.
- the process of verifying the decrypted verification information by the gateway is specifically a process of numerical comparison.
- the verification information carries the magic number pre-negotiated between the smart door lock and the gateway. If the magic number obtained by the gateway performing the symmetric encryption algorithm is the same as the magic number stored by the gateway itself, the first key is The second key is consistent and proceeds to the content described in step 450.
- the magic number obtained by the gateway decryption is different from the magic number stored by the gateway itself, it means that the verification fails, indicating that the first key and the second key are inconsistent.
- the communication connection between the smart door lock and the gateway is interrupted, so that the smart door lock and the gateway cannot perform data transmission.
- step 450 a communication connection between the smart door lock and the gateway is established when the verification information indicates verification of the smart door lock by the gateway.
- the smart door lock passes the verification of the gateway. Only after the smart door lock is verified by the gateway, the smart door lock can establish a communication connection with the gateway to perform data transmission with the gateway.
- the smart door lock encrypts the verification information stored by itself and sends it to the gateway through the symmetric encryption algorithm, so that the gateway verifies the verification information after decryption, and only after the verification information indicates that the smart door lock passes the verification of the gateway.
- the intelligent door lock can establish a communication connection with the gateway, ensuring that the data transmission process between the subsequent smart door lock and the gateway can be performed accurately.
- FIG. 9 is a flowchart of a smart door lock wireless communication method applied to a smart door lock system, according to an exemplary embodiment.
- the intelligent door lock system includes a gateway and a smart door lock.
- the smart door lock wireless communication method includes the following steps:
- step 510 the gateway receives a control command generated by the client according to a user triggered operation.
- the client generates a corresponding control instruction according to the user triggering operation, and sends the generated control instruction to the gateway, so that the gateway receives the control instruction.
- the control instructions generated by the client are used to control the smart door lock to perform the corresponding operations.
- control command is encrypted according to an encryption algorithm configured in the specified communication protocol to obtain encrypted data.
- the gateway After receiving the control command sent by the client, the gateway performs the first encryption on the control command according to the encryption algorithm configured in the specified communication protocol to obtain the encrypted data.
- the specified communication protocol executed by the gateway is configured in the communication module of the gateway.
- the specific protocol type is as described above and will not be described here.
- step 530 the encrypted data is secondarily encrypted according to a symmetric encryption algorithm, and control command data sent to the smart door lock is obtained.
- the gateway After the gateway encrypts the received control command for the first time to obtain the encrypted data, the encrypted data is secondarily encrypted according to the symmetric encryption algorithm to obtain the control command data, and the obtained control command data is sent to the smart door lock.
- the symmetric encryption algorithm executed by the gateway is also configured in its communication module, and the gateway uses the second key as a key when performing the symmetric encryption algorithm.
- the symmetric encryption algorithm performed by the gateway may be an ASE 128 encryption algorithm.
- step 540 the smart door lock receives control command data sent by the gateway.
- the gateway sends the control command data to the smart door lock by the secondary encryption, so that the smart door lock receives the control command data.
- step 550 the control command data is decrypted according to a symmetric encryption algorithm to obtain decrypted data.
- the smart door lock After receiving the control command data sent by the gateway, the smart door lock first decrypts the control command data by using a symmetric encryption algorithm to obtain decrypted data.
- the symmetric encryption algorithm is configured in the communication module of the smart door lock, and the communication module configured by the smart door lock corresponds to the communication module in the gateway, and the symmetric encryption algorithm executed by the smart door lock is the same as the symmetric encryption algorithm executed in the gateway. .
- the first key is used to decrypt the control instruction data, and the first key is the same as the second key used by the gateway, so that the smart door lock completes the first decryption of the control instruction data. operating.
- step 560 the decryption data is decrypted twice according to an encryption algorithm configured in the specified communication protocol to obtain a control command, and the designated communication protocol is used to establish a communication connection with the gateway.
- the decrypted data is decrypted a second time according to the encryption algorithm configured in the specified communication protocol, and the control command is obtained.
- the specified communication protocol used by the smart door lock is also configured in the communication module of the smart door lock, and is the same as the designated communication protocol configured by the communication module in the gateway, so that the smart door lock establishes a communication connection with the gateway and performs data transmission.
- the encryption algorithm configured by the smart door lock using the specified communication protocol is also the same as the encryption algorithm configured by the specified communication protocol in the gateway.
- step 570 the smart door lock is controlled to perform a corresponding operation according to the control instruction.
- the gateway performs secondary decryption on the control instruction data according to the symmetric encryption algorithm and the encryption algorithm configured in the specified communication protocol, and the obtained control instruction is a control instruction generated by the client according to the user trigger operation.
- the smart door lock obtains the control command
- the corresponding operation indicated by the control command is executed, so that the client controls the smart door lock through the gateway.
- the gateway after the gateway performs secondary encryption on the control command sent by the client, the encrypted control command data is sent to the smart door lock, and the smart door lock performs corresponding secondary decryption on the control command data to obtain a control command. . Therefore, in the smart door lock system, the data transmitted between the gateway and the smart door lock is obtained by the gateway for secondary encryption, and only the same decryption method as the secondary encryption can be used to decrypt the data, thereby fully ensuring the smart door lock. The security of wireless communication between the smart door lock and the gateway in the system.
- FIG. 10 is a block diagram of a smart door lock, according to an exemplary embodiment.
- the smart door lock performs all or part of the steps of the smart door lock wireless communication method shown in FIG. 3, as shown in FIG. 10, the smart door lock includes, but is not limited to, a control command data receiving module 610 and a first decryption module. 630.
- the control instruction data receiving module 610 is configured to receive control instruction data forwarded by the gateway, where the control instruction data is generated by the client according to a user triggered operation and sent to the gateway.
- the first decryption module 630 is configured to decrypt the control instruction data according to a symmetric encryption algorithm to obtain decrypted data.
- the second decryption module 650 is configured to perform secondary decryption on the decrypted data according to an encryption algorithm configured in the specified communication protocol, to obtain a control command, and specify a communication protocol for establishing a communication connection with the gateway.
- the control instruction execution module 670 is configured to control the smart door lock to perform a corresponding operation according to the decrypted control instruction.
- FIG. 11 is a block diagram of a gateway, according to an exemplary embodiment. As shown in FIG. 11, the gateway includes, but is not limited to, a control instruction receiving module 710, a first encryption module 730, a second encryption module 750, and a control instruction data sending module 770.
- the control command receiving module 710 is configured to receive a control command sent by the client, where the control command is generated by the client according to a user triggering operation.
- the first encryption module 730 is configured to encrypt the control instruction according to an encryption algorithm configured in a specified communication protocol to obtain encrypted data.
- the second encryption module 750 is configured to perform second encryption on the encrypted data according to the symmetric encryption algorithm to obtain control instruction data.
- the control command data transmitting module 770 is configured to send the control command data to the smart door lock.
- a communication device includes:
- the memory is stored on the memory with computer readable instructions that, when executed by the processor, implement the methods of the various embodiments described above.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Lock And Its Accessories (AREA)
Abstract
本发明涉及了一种智能门锁无线通信方法、智能门锁、网关及通信设备。本发明涉及的智能门锁无线通信方法包括:接收网关转发的控制指令数据,所述控制指令数据是所述网关对客户端根据用户触发操作生成的控制指令进行加密得到的;根据对称加密算法对所述控制指令数据进行解密,得到解密数据;按照指定通信协议中配置的加密算法进行所述解密数据的二次解密,得到控制指令,所述指定通信协议用于与所述网关建立通信连接;根据所述控制指令控制所述智能门锁执行相应操作。采用本发明解决了现有技术中智能门锁与网关之间无线通信安全性较差的问题。
Description
本发明涉及智能家居技术领域,尤其涉及一种智能门锁无线通信方法、智能门锁、网关及通信设备。
随着智能家居技术的迅速发展,智能门锁应运而生。
目前的智能门锁,普遍置入ZigBee、Bluetooth、WiFi、NBIOT、433等无线通信芯片的至少一种,使得用户可以借由终端中运行的智能门锁客户端实现与网关之间的交互,进而通过网关远程控制智能门锁,例如,查看智能门锁的开锁记录等等,以此提升用户体验。
然而,智能门锁与网关之间的通信过程很容易被窃听,导致二者之间无线通信的安全性较差。
为了提高智能门锁与网关之间无线通信的安全性,现有技术通常采用硬件加密方案对通信过程中智能门锁与网关之间传输的数据进行加密,但是此方案需要在智能门锁中额外增加加密芯片,进而导致智能门锁的体积过大,造成智能门锁的生产成本居高不下。
由上可知,如何提供一种低成本且无线通信安全性高的智能门锁仍有待解决。
发明内容
基于上述技术问题,本发明提供了一种智能门锁无线通信方法、智能门锁、网关及通信设备。
其中,本发明所采用的技术方案为:
一种智能门锁无线通信的方法,包括:接收网关转发的控制指令数据,所述控制指令数据是所述网关对客户端根据用户触发操作生成的控制指令进行加密得到的;根据对称加密算法对所述控制指令数据进行解密,得到解密数据;按照指定通信协议中配置的加密算法进行所述解密数据的二次解密,得到控制指令,所述指定通信协议用于与所述网关建立通信连接;根据所述 控制指令控制所述智能门锁执行相应操作。
一种智能门锁无线通信方法,包括:网关接收客户端发送的控制指令,所述控制指令是所述客户端根据用户触发操作生成的;按照指定通信协议中配置的加密算法对所述控制指令进行加密,得到加密数据;根据对称加密算法对所述加密数据进行第二次加密,得到控制指令数据;向所述智能门锁发送所述控制指令数据。
一种智能门锁,包括:控制指令数据接收模块,用于接收网关发送的控制指令数据,所述控制指令数据是所述网关对客户端根据用户触发操作生成的控制指令进行加密得到的;第一解密模块,用于根据对称加密算法对所述控制指令数据进行解密,得到解密数据;第二解密模块,用于按照指定通信协议中配置的加密算法进行所述解密数据进行二次解密,得到控制指令,所述指定通信协议用于与所述网关建立通信连接;控制指令执行模块,用于根据所述控制指令控制所述智能门锁执行相应操作。一种网关,包括:控制指令接收模块,用于接收客户端发送的控制指令,所述控制指令是所述客户端根据用户触发操作生成的;第一加密模块,用于按照指定通信协议中配置的加密算法对所述控制指令进行加密,得到加密数据;第二加密模块,用于根据所述对称加密算法对所述加密数据进行第二次加密,得到控制指令数据;控制指令数据发送模块,用于向所述智能门锁发送所述控制指令数据。
一种通信设备,包括处理器以及存储器,所述存储器上存储有计算机可读指令,所述计算机可读指令被所述处理器执行时实现如上所述的智能门锁无线通信方法。
在上述技术方案中,由网关发送给智能门锁的控制指令数据是网关对客户端根据用户触发操作生成的控制指令进行加密得到的,智能门锁接收到该控制指令数据后将依次按照对称加密算法和指定通信协议中配置的加密算法进行两次解密方可获得控制指令,进而根据解密得到的控制指令执行相应操作。
由此,通过两次加密,增加了对控制指令数据解密的复杂度,即使网关发送给智能门锁的控制指令数据被窃听也可能因无法破解而降低在泄漏第三方的风险,从而充分地保证了智能门锁与网关之间无线通信的安全性,极大地提升了智能门锁的无线通信安全。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本发明。
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本发明的实施例,并于说明书一起用于解释本发明的原理。
图1是根据本发明所涉及的实施环境的示意图。
图2是根据一示例性实施例示出的一种智能门锁的硬件结构框图。
图3是根据一示例性实施例示出的一种智能门锁无线通信方法的流程图。
图4是图3对应实施例中步骤130在一个实施例的流程图。
图5是图4对应实施例中步骤135在一个实施例的流程图。
图6是根据一示例性实施例示出的另一种智能门锁无线通信方法的流程图。
图7是根据一示例性实施例示出的一种智能门锁无线通信方法的流程图。
图8是根据一示例性实施例示出的另一种智能门锁无线通信方法的流程图。
图9是根据一示例性实施例示出的一种应用于智能门锁无线通信系统的智能门锁无线通信方法的流程图。
图10是根据一示例性实施例示出的另一种智能门锁的框图。
图11是根据一示例性实施例所示出的一种网关的框图。
通过上述附图,已示出本发明明确的实施例,后文中将有更详细的描述,这些附图和文字描述并不是为了通过任何方式限制本发明构思的范围,而是通过参考特定实施例为本领域技术人员说明本发明的概念。
这里将详细地对示例性实施例执行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本发明相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本发明的一 些方面相一致的装置和方法的例子。
图1是根据本发明涉及的实施环境的示意图。如图1所示,该实施环境为一物联网中的智能门锁无线通信系统,该智能门锁无线通信系统包括终端100、网关200以及智能门锁300。
其中,智能门锁300通过自身配置的通信模块与网关200建立无线或者有线网络连接,进而通过此网络连接实现与网关200之间的通信。智能门锁300自身配置的通信模块包括ZigBee通信模块、Bluetooth模块、WiFi通信模块中的任意一种或几种。
网关200可以是路由器,还可以是其他任何能够与智能门锁300之间建立无线或者有线网络连接的电子设备,在此不进行限定。
终端100可以是智能手机、平板电脑、笔记本电脑、计算机或者其他任何可供智能门锁客户端运行的电子设备,在此也不加以限定。终端100与网关200之间预先建立无线或者有线网络连接,以通过此网络连接实现终端100与网关200之间的交互。
请参阅图2,图2是根据一示例性实施例示出的一种智能门锁的硬件结构框图。需要说明的是,该智能门锁只是一个适配于本发明的示例,不能认为是提供了对本发明的使用范围的任何限制。该智能门锁也不能解释为需要依赖于或者必须具有图2中示出的示例性的智能门锁中的一个或者多个组件。
如图2所示,智能门锁包括微处理器401、存储器402、通信模块403、配对模块404、指纹采集模块405、图像采集模块406、供电模块407。这些组件通过一条或多条通讯总线或者信号线相互通讯。
其中,微处理器401作为智能门锁数据处理的核心模块,用于运算智能门锁存储器402中存储的数据。
存储器402还将用于存储计算机可读指令以及模块,如本发明示例性实施例中的智能门锁无线通信方法及系统对应的计算机可读指令及模块,处理器401通过执行存储在存储器402内的计算机可读指令,从而执行各种功能以及数据处理,即完成智能门锁无线通信方法。存储器402可以是随机存储器、例如高速随机存储器、非易失性存储器,如一个或多个磁性存储装置、闪存、或者其它固态存储器。存储方式可以是短暂存储或者永久存储。
通信模块403用于按照指定通信协议建立智能门锁与网关之间的通信连接,以使智能门锁与网关进行数据传输,例如网关向智能门锁发送的控制指令数据、智能门锁向网关上报的待发送数据等等。通信模块403可以是无线通信芯片,例如,无线通信芯片可以是ZigBee芯片、Bluetooth芯片或者WiFi芯片中任意一种。
配对模块404用于执行智能门锁与网关之间的配对,配对模块404可以是设置在智能门锁上的配对按键,用户通过该配对按键实现智能门锁与网关之间的配对。
指纹采集模块405用于采集开锁人指纹,只有当其采集到的开锁人指纹是有效指纹时,才能控制智能门锁执行开锁操作。举例来说,当指纹采集模块405采集的开锁人指纹能够与智能门锁存储器402中预先存储的用户指纹相匹配,则指纹采集模块405采集的开锁人指纹是有效指纹。
图像采集模块406用于采集智能门锁周边环境的图像信息,例如,图像采集模块406为内置摄像头,以此增加智能门锁的安全性。例如,当指纹采集模块405在采集开锁人的指纹时,图像采集模块406同时对开锁人的脸部进行图像采集操作,以便于核实开锁人身份。
进一步地,智能门锁还包括图像识别模块(图2中并未示出),此图像识别模块对图像采集模块406采集到的开锁人脸部图像进行识别,如果识别得到的开锁人人脸数据与智能门锁存储器402中预先存储的用户人脸数据相匹配,则表明此开锁人为合法用户,进而控制智能门锁执行开锁操作。
可以理解的是,图2所示的结构仅为示意,智能门锁还可以包括比图2中所示更多或更少的组件,或者具有与图2所示不同的组件。图2中所示的各组件可以采用硬件、软件或者其组合来实现。
图3是根据一示例性实施例示出的一种智能门锁无线通信方法的流程图,该智能门锁无线通信方法适用于图1实施环境中示出的智能门锁,此智能门锁的硬件结构如图2所示。
该智能门锁无线通信方法由此智能门锁执行,可以包括以下步骤:
在步骤110中,接收网关转发的控制指令数据,所述控制指令数据是网关对客户端根据用户触发操作生成的控制指令进行加密得到的。
其中,用户触发操作是用户触发客户端界面中的操作。用户触发客户端 界面的操作会使得客户端生成相应的控制指令,该控制指令用于控制智能门锁执行相应操作。例如,在一种实施例中,客户端界面为用户增设了开锁用户添加入口,如果用户希望添加新的开锁用户,将在客户端界面中的用户添加入口触发“添加开锁用户”操作,以使智能门锁获知用户希望添加新的开锁用户,进而相应地生成“添加开锁用户”控制指令。
当然,在其他实施例中,客户端响应用户触发操作而生成的控制指令还可以包括“删除开锁用户”控制指令、“同步开锁用户”控制指令、“设置临时开锁密码”控制指令、“设置用户签到密码”控制指令、“智能门锁开锁记录获取”控制指令等,在此不对控制指令的具体类型作任何限定,相应地,根据控制指令的类型使得本实施例所提供的智能门锁无线通信方法适用于不同的应用场景,例如,“添加开锁用户”控制指令对应于指纹添加应用场景,“智能门锁开锁记录获取”控制指令则对应于开锁行为获取应用场景。
对于网关而言,在客户端根据用户触发操作生成控制指令,并将生成的控制指令发送至网关之后,网关即可接收到客户端发送的控制指令,并针对此控制指令进行加密,以此保证网关与智能门锁之间无线通信的安全性。
具体而言,首先根据指定通信协议中配置的加密算法对控制指令进行第一次加密,得到加密数据,然后根据对称加密算法对加密数据进行第二次加密,以得到控制指令数据。
由此,对于智能门锁而言,在网关对客户端发送的控制指令进行两次加密得到控制指令数据之后,方可接收到由网关发送的控制指令数据。
进一步地,智能门锁和网关分别配置有通信模块,以便智能门锁和网关之间分别根据自身所配置的通信模块所支持的指定通信协议进行无线或者有线网络连接,进而通过此网络连接实现二者之间的通信。
其中,指定通信协议可以是ZigBee协议、Bluetooth协议、WiFi协议中的任意一种,相应地,无论是智能门锁亦或者网关,二者自身所配置的通信模块相一致,可以是ZigBee通信模块、Bluetooth模块、WiFi通信模块中的任意一种或几种。
为了保证智能门锁与网关之间无线通信的安全性,上述指定通信协议中均配置有加密算法,例如,指定通信协议为ZigBee协议,则其所配置的加密算法为初始对称型加密算法,以此在保证无线通信安全的前提下,有效地降 低了加密的复杂度。
更进一步地,对称加密算法包括但不限于:DES算法、3DES算法、TDEA算法、Blowfish算法、RC5算法、IDEA算法、ASE算法等等,以此简单有效地保证了智能门锁与网关之间无线通信的安全性。
当然,在其他应用场景中,还可以根据智能门锁的实际处理能力采用复杂度更高且安全性更高的非对称加密算法,例如,非对称加密算法包括但不限于:RSA算法、Elgamal算法、背包算法、Rabin算法、D-H算法、ECC(椭圆曲线加密)算法等等。
在步骤130中,根据对称加密算法对所述控制指令数据进行解密,得到解密数据。
其中,由于控制指令数据是网关对客户端发送的控制指令进行两次加密得到的,即第一次加密根据指定通信协议中配置的加密算法,第二次加密根据对称加密算法。
应当理解,对称加密算法即是指加密和解密所采用的加密算法是一致的。因此,智能门锁在接收到网关发送的控制指令数据之后,首先使用对称加密算法对控制指令数据进行第一次解密。
例如,如果网关对加密数据进行加密所采用的对称加密算法为ASE算法,则智能门锁对控制指令数据进行解密所采用的对称加密算法相应地为ASE算法。
在步骤150中,按照指定通信协议中配置的加密算法进行所述解密数据的二次解密,得到控制指令,所述指定通信协议用于与所述网关建立通信连接。
其中,智能门锁在执行上述对称加密算法对网关发送的控制指令数据进行第一次解密后,还将按照指定通信协议中配置的加密算法对解密数据进行第二次解密。
如前所述,智能门锁和网关分别配置有通信模块,以便智能门锁和网关之间分别根据自身所配置的通信模块所支持的指定通信协议进行无线或者有线网络连接,进而通过此网络连接实现二者之间的通信。
由此,对于智能门锁而言,其所采用的指定通信协议与网关中的指定通信协议相一致,以便于实现对解密数据的二次解密。
例如,如果网关配置的通信模块所采用的指定通信协议为ZigBee协议,且指定通信协议所配置的加密算法为初始对称型加密算法,那么,在智能门锁所配置的通信模块中,指定通信协议也为ZigBee协议,相应地,此指定通信协议所配置的加密算法也为初始对称型加密算法。
在步骤170中,根据所述控制指令控制所述智能门锁执行相应操作。
其中,智能门锁分别采用对称加密算法和指定通信协议中配置的加密算法对控制指令数据进行两次解密,得到上述客户端根据用户触发操作生成的控制指令之后,智能门锁便能够根据该控制指令执行对应的操作。
在一实施例中,若该控制指令指示智能门锁执行添加开锁用户操作,智能门锁则相应执行添加开锁用户的操作,将此时获取到的指纹存储于存储器中作为用户指纹,以方便用户后续可以使用该指纹控制智能门锁执行开锁操作。
在本实施例中,由网关发送至智能门锁的控制指令数据是经由指定通信协议配置的加密算法和对称加密算法两次加密的,充分确保了控制指令数据在智能门锁与网关之间传输的安全性,极大地提升了智能门锁与网关之间无线通信的安全性。
此外,智能门锁中指定通信协议配置的加密算法和对称加密算法均可通过客户端的方式运行于智能门锁的微处理器中,即采用软件加密方案对通信过程中智能门锁与网关之间传输的数据进行加密,并不会额外增加智能门锁的体积,进而有利于降低智能门锁的生产成本。
图4为根据一示例性实施例所示出的智能门锁生成用于执行对称加密算法的第一密钥的流程图。
如图4所示,智能门锁生成该第一密钥的过程可以包括以下步骤:
在步骤131中,接收所述网关发送的第一密钥基数,并根据所述第一密钥基数随机生成第二密钥基数。
首先需要说明的是,本实施例适用的智能门锁配置有一个二维码,该二维码被视为用于生成第一密钥的第三密钥基数。此第三密钥基数为一个随机数,该随机数的位数是预设的,例如,随机数的位数为128比特位数。
在一实施例中,智能门锁配置的二维码用于供智能门锁客户端扫描,或者用户将二维码输入智能门锁客户端,以使智能门锁客户端对此二维码进行 识别,由此得到二维码所表示的第三密钥基数,进而通过智能门锁客户端所运行的终端与网关之间的交互,将此第三密钥基数发送至网关。
网关接收到智能门锁客户端发送的第三密钥基数之后,即可随机生成第一密钥基数存储于自身,并将此第一密钥基数发送给智能门锁。
对于智能门锁而言,便可接收到网关发送的第一密钥基数,进而根据此第一密钥基数随机生成第二密钥基数并存储于自身,同时,将此第二密钥基数上报至网关。
在步骤133中,从所述智能门锁的存储器中读取第三密钥基数。
如前所述,智能门锁配置有一个二维码,该二维码被视为用于生成第一密钥的第三密钥基数。
在一实施例中,在智能门锁出厂前,二维码将被烧录至智能门锁中,以便于智能门锁对此二维码进行存储,例如,被视为第三密钥基数的二维码存储于存储器中。
在另一实施例中,二维码进一步地以二维码标签的方式粘贴于智能门锁,例如智能门锁的电池后盖内侧,以便于用户借助智能门锁客户端进行二维码扫描。
对于智能门锁而言,在生成第一密钥之前,则可从存储器中读取第三密钥基数。
在步骤135中,对所述第一密钥基数、所述第二密钥基数以及所述第三密钥基数进行密钥运算,得到用于执行所述对称加密算法的第一密钥。
其中,智能门锁在获取第一密钥基数、第二密钥基数和第三密钥基数后,便可根据这三个密钥基数进行密钥运算,以得到第一密钥。
应当理解,对称加密算法即是指加密和解密所采用的加密算法是一致的,亦即加密和解密所采用的密钥是对称的。
由此,对于网关而言,在得到第一密钥基数、第二密钥基数和第三密钥基数之后,将相应地采用对称加密算法对所得到的上述三个密钥基数进行密钥运算,以得到与第一密钥对称的第二密钥。
在一实施例中,密钥运算是通过消息摘要算法实现的,例如消息摘要算法可以包括哈希运算。
在上述实施例的作用下,智能门锁获取的第一密钥是基于对第一密钥基 数、第二密钥基数和第三密钥基数进行密钥计算得到的,因此,第一密钥的生成来源于多方数据,增加了第一密钥被破解的复杂度,进一步加强了智能门锁与网关之间无线通信的安全性。
图5是根据一示例性实施例所示出的智能门锁根据第一密钥基数、第二密钥基数和第三密钥基数进行密钥运算的流程图。
如图5所示,智能门锁根据上述三个密钥基数进行密钥运算的过程可以包括以下步骤:
在步骤1351中,根据消息摘要算法对所述第一密钥基数、所述第二密钥基数以及所述第三密钥基数进行运算,得到消息摘要数据。
其中,消息摘要算法优选不可逆的摘要运算,以保证生成的第一密钥不易被破解。消息摘要算法可以采用哈希运算,包括但不仅限于SHA-1运算或者MD5运算,本实施例优选SHA-1运算。
为了便于理解,举例来说,假设第一密钥基数为A、第二密钥基数为B、第三密钥基数为C,采用SHA-1运算对第一密钥基数、第二密钥基数和第三密钥基数进行摘要运算的运算公式为SHA-1(A+B+C)。其中,“A+B+C”表示对第一密钥基数、第二密钥基数和第三密钥基数进行数值拼接,例如,假设A为“1010”、B为“1101”、C为“1001”,“A+B+C”则为“101011011001”。
在一种实施例中,第三密钥基数为128比特位数的随机数,第一密钥基数为32比特位数的随机数,第二密钥基数也为32比特位数的随机数,将这三个密钥基数拼接得到192比特位数的随机数,消息摘要算法则对该192比特位数的随机数进行运算,以获得消息摘要数据。
例如,若采用SHA-1运算,则生成160比特位数的消息摘要数据;若采用MD5运算,则生成128比特位数的消息摘要数据。
在步骤1353中,从所述消息摘要数据中提取指定数据作为所述第一密钥。
为进一步保证第一密钥不被破解,智能门锁从生成的消息摘要数据中提取指定数据,将提取的指定数据作为第一密钥,并将生成的第一密钥进行存储,以便于后续在智能门锁与网关之间的无线通过过程中供智能门锁调用。
以SHA-1运算为例进行说明,假设生成160比特位数的消息摘要数据, 可以提取160比特位数的消息摘要数据中低128比特位数作为第一密钥,也可以提取160比特位数的消息摘要数据中高128比特位数作为第一密钥,或者,与网关协商由此160比特位数的消息摘要数据中随机提取128比特位数作为第一密钥,此处不进行限定。
在本实施例中,智能门锁采取消息摘要算法生成消息摘要数据,并从生成的消息摘要数据中提取指定数据作为第一密钥,由于消息摘要算法是不可逆的,并且从生成的消息摘要数据中提取固定比特位数是能够随机指定的,以此充分地保证了第一密钥被破解的复杂度。
同理,在网关设备中,网关采用与智能门锁同样的消息摘要算法对其获取到的第一密钥基数、第二密钥基数和第三密钥基数进行运算,并对运算得到的消息摘要数据提取同样的指定数据作为第二密钥进行存储,以保证第二密钥与第一密钥是完全一致的,进而为执行对称密钥算法提供依据,以便于后续实现智能门锁与网关之间无线通信的安全性。
图6是根据另一示例性实施例示出的一种智能门锁无线通信方法的流程图。如图6所示,该智能门锁无线通信方法还可以包括以下步骤:
在步骤210中,按照所述指定通信协议中配置的加密算法对所述智能门锁存储的门锁数据进行加密,得到加密数据。
其中,智能门锁存储的门锁数据包括智能门锁产生的行为数据以及智能门锁组件的状态数据。在一实施例中,智能门锁产生的行为数据包括开锁记录、异常报警记录。
其中,开锁记录包括开锁时间、开锁环境、用户信息中的至少一种,具体的,开锁时间是智能门锁执行开锁操作的时间,开锁环境是智能门锁在执行开锁操作时内置摄像头拍摄到的开锁人脸部图像,用户信息可以是智能门锁执行开锁操作时由指纹采集模块采集得到的开锁人指纹或者是客户端执行控制远程开锁的用户账号。
异常报警记录包括异常报警时间、异常报警原因中的至少一种,其中,异常报警时间是智能门锁执行异常报警动作的时间,异常报警原因是智能门锁触发异常报警动作的触发原因。
在另一实施例中,智能门锁组件包括门铃、扬声器、锁舌中的至少一种,智能门锁组件的状态数据包括门铃状态、扬声器音量、扬声器语言、锁舌状 态中的至少一种,具体的,门铃状态包括门铃关闭/开启状态,扬声器音量是扬声器播放门锁提示语音的音量大小状态,扬声器语言状态包括扬声器播放门锁提示语音的语言种类,如中文语音、英文语音、韩文语音等。
智能门锁产生的行为数据以及智能门锁组件状态数据均存于自身配置的存储器。
门锁数据的上报,可以是根据用户的实际需求进行的,例如,响应客户端根据用户触发操作而生成的控制指令而向网关上报,还可以是自动进行的,例如,在智能门锁执行完开锁操作后即自动向网关上报开锁记录。
指定通信协议中配置的加密算法与步骤150所述的指定通信协议配置的加密算法相同,此处不再赘述。
在步骤230中,根据所述对称加密算法对所述加密数据进行二次加密,得到待发送数据。
其中,智能门锁根据指定通信协议中配置的加密算法对开锁记录进行第一次加密后,再根据通信模块中存储的对称加密算法对加密数据进行第二次加密,以得到待发送数据。
如前所述,智能门锁执行对称加密算法时使用第一密钥对加密数据进行第二次加密。得到的待发送数据为智能门锁分别根据指定通信协议配置的加密算法以及对称加密算法对开锁记录进行二次加密后的数据。
在步骤250中,向所述网关上报所述待发送数据。
其中,智能门锁将二次加密得到的待发送数据上报给网关,以使网关对接收的待发送数据进行二次解密后,将解密得到的开锁记录发送给客户端。
具体地,对于网关而言,网关接收到智能门锁发送的待发送数据后,先根据与智能门锁相同的对称加密算法对待发送数据进行解密,得到对应的解密数据,然后按照指定通信协议配置的加密算法对该解密数据进行第二次解密,得到门锁数据。
网关将智能门锁发送的开锁记录解密完毕后,将解密得到的门锁数据发送客户端,以使得客户端将此门锁数据显示在客户端界面中,以供用户查看。
在本实施例中,智能门锁分别按照指定通信协议中配置的加密算法以及对称加密算法将门锁数据进行加密,智能门锁二次加密获得的待发送数据必须根据相应的二次解密方法才能对其解密,确保了智能门锁向外发送数据的 安全性,进一步增加智能门锁无线通信的安全性。
图7是根据另一示例性实施例示出的一种智能门锁无线通信方法的流程图。如图7所示,该智能门锁无线通信方法还可以包括以下步骤:
在步骤310中,接收所述网关发送的智能门锁配对指令,根据所述智能门锁配对指令对用户触发的配对操作进行检测。
其中,智能门锁在与网关建立通信连接前,还需与网关进行配对,智能门锁与网关成功配对后,智能门锁才能够与网关建立通信连接,进而通过通信连接进行数据传输。
智能门锁接收的与网关进行配对的智能门锁配对指令是由客户端生成的,并经由网关转发至智能门锁的。
具体而言,客户端在客户端界面中为用户增设配对入口,如果用户希望进行网关与智能门锁之间的配对,即在配对入口触发相关操作,以便于客户端根据此相关操作生成智能门锁配对指令,并将智能门锁配对指令上报至网关,进而通过网关将此智能门锁配对指令发送给智能门锁。
对于智能门锁而言,在接收到网关发送的智能门锁配对指令之后,便响应此智能门锁配对指令而检测智能门锁中用户触发的配对操作。
在一实施例中,智能门锁配置有配对按键,用户按下配对按键时,则智能门锁即可检测到用户触发的配对操作。其中,按下操作即为用户在智能门锁中触发的配对操作。
此处,用户触发的配对操作可以是长按配对按键,还可以是短按配对按键,这与用户对智能门锁预设的触发方式有关,此处不作限制。
在步骤330中,如果检测到所述用户触发的配对操作,则进行所述智能门锁与所述网关之间的配对,以使所述智能门锁与所述网关之间建立通信连接。
其中,智能门锁如果检测到用户触发的配对操作,则执行与网关之间的配对操作,以利于建立与网关之间的通信连接。
进一步地,智能门锁与网关配对成功之后,可以将配对结果经由网关发送至客户端,以使得用户可以通过客户端获取智能门锁与网关的配对结果。
图8是根据另一示例性实施例示出的一种智能门锁无线通信方法的流程图。如图8所示,该智能门锁无线通信方法还可以包括以下步骤:
在步骤410中,根据所述对称加密算法对所述智能门锁存储的验证信息进行加密,得到验证信息。
其中,智能门锁对其接收/发送的数据进行解密/加密操作时,均使用第一密钥执行对称加密算法,网关对其接收/发送的数据进行解密/加密操作时,均使用第二密钥执行对称加密算法,必须保证智能门锁生成的第一密钥和网关生成的第二密钥是一致的,才能确保智能门锁和网关之间进行加密数据传输的过程是准确无误的。
为了验证第一密钥与第二密钥的一致性,智能门锁使用第一密钥作为对称加密算法的密钥对其存储的验证信息进行加密,得到验证信息。智能门锁存储的验证信息具体可以包括智能门锁与网关预先约定的魔数,该魔数存储于智能门锁以及网关中。
在步骤430中,向所述网关发送所述验证信息。
其中,智能门锁将加密得到的验证信息发送至网关,以使得网关根据相应的对称加密算法对其解密。
具体地,对于网关而言,网关执行对称加密算法时使用第二密钥对验证信息解密,并对解密得到的验证信息进行验证。网关对解密得到的验证信息进行验证的过程具体是数值比较的过程。
举例来说,以验证信息携带智能门锁与网关之间预先协商的魔数进行说明,若网关执行对称加密算法解密得到的魔数与网关自身存储的魔数相同,则表示第一密钥与第二密钥是一致的,继续执行步骤450所述的内容。
反之,若网关解密得到的魔数与网关自身存储的魔数不相同则表示验证不通过,则表示第一密钥与第二密钥是不一致的,为了防止智能门锁数据泄露,此时可以中断智能门锁与网关之间的通信连接,使得智能门锁与网关无法进行数据传输。
在步骤450中,当所述验证信息指示所述智能门锁通过所述网关的验证,建立所述智能门锁与所述网关之间的通信连接。
其中,当网关执行对称加密算法解密得到的验证信息与网关自身存储的验证信息完全一致,才表示智能门锁通过网关的验证。只有在智能门锁通过网关验证后,智能门锁才能够建立与网关之间的通信连接,才能与网关之间进行数据传输。
在本实施例中,智能门锁将自身存储的验证信息经由对称加密算法加密后发送给网关,以使网关对验证信息解密后进行验证,只有在验证信息指示智能门锁通过网关的验证后,智能门锁才能与网关建立通信连接,确保了后续智能门锁与网关之间的数据传输过程能够准确无误进行。
图9是根据一示例性实施例所示出的一种智能门锁无线通信方法的流程图,该智能门锁无线通信方法应用于智能门锁系统。智能门锁系统包括网关以及智能门锁。
如图9所示,该智能门锁无线通信方法包括如下步骤:
在步骤510中,网关接收客户端根据用户触发操作生成的控制指令。
其中,客户端根据用户触发操作生成相应控制指令,并将生成的控制指令发送给网关,以使网关接收该控制指令。
客户端所生成的控制指令用于控制智能门锁执行相应操作。
在步骤520中,按照指定通信协议中配置的加密算法对所述控制指令进行加密,得到加密数据。
网关接收客户端发送的控制指令后,按照指定通信协议中配置的加密算法对该控制指令进行第一次加密,得到加密数据。
网关所执行的指定通信协议配置在网关的通信模块中,其具体协议类型如前所述,此处不再赘述。
在步骤530中,根据对称加密算法对所述加密数据进行二次加密,得到发送至所述智能门锁的控制指令数据。
网关对其接收的控制指令进行第一次加密得到加密数据后,再根据对称加密算法对该加密数据进行第二次加密,得到控制指令数据,并将得到的控制指令数据发送给智能门锁。
网关所执行的对称加密算法也配置在其通信模块中,网关在执行对称加密算法时使用第二密钥作为密钥。在一种示例性的实施例中,网关执行的对称加密算法可以是ASE128加密算法。
在步骤540中,智能门锁接收所述网关发送的控制指令数据。
其中,网关将二次加密得到控制指令数据发送给智能门锁,以使智能门锁接收该控制指令数据。
在步骤550中,根据对称加密算法对所述控制指令数据进行解密,得到 解密数据。
智能门锁在接收到网关发送的控制指令数据后,采用对称加密算法对该控制指令数据进行第一次解密,得到解密数据。
对称加密算法配置在智能门锁的通信模块中,智能门锁所配置的通信模块与网关中的通信模块是相对应的,智能门锁所执行的对称加密算法与网关中执行的对称加密算法相同。
智能门锁执行对称加密算法时使用第一密钥对控制指令数据进行解密,第一密钥与网关所使用的第二密钥也相同,以使智能门锁对控制指令数据完成第一次解密操作。
在步骤560中,按照指定通信协议中配置的加密算法进行所述解密数据的二次解密,得到控制指令,所述指定通信协议用于与所述网关建立通信连接。
智能门锁执行对称加密算法得到解密数据后,再按照指定通信协议中配置的加密算法对解密数据进行第二次解密,得到控制指令。
智能门锁使用的指定通信协议也配置在智能门锁的通信模块中,且与网关中通信模块配置的指定通信协议相同,以使智能门锁与网关建立通信连接,并进行数据传输。智能门锁使用指定通信协议配置的加密算法也与网关中指定通信协议配置的加密算法相同。
在步骤570中,根据所述控制指令控制所述智能门锁执行相应操作。
其中,网关分别根据对称加密算法以及指定通信协议中配置的加密算法对控制指令数据进行二次解密后,得到的控制指令为客户端根据用户触发操作生成的控制指令。
智能门锁得到控制指令后,执行该控制指令所指示的相应操作,以实现客户端通过网关对智能门锁进行操控。
在本实施例中,网关将客户端发送的控制指令进行二次加密后,再将加密得到的控制指令数据发送给智能门锁,智能门锁对控制指令数据进行相应的二次解密得到控制指令。因此,在智能门锁系统中,网关与智能门锁之间传输的数据是网关进行二次加密得到的,只有采用与二次加密相同的解密方法才能对该数据解密,充分保证了智能门锁系统中智能门锁与网关之间无线通信的安全性。
图10是根据一示例性实施例示出的一种智能门锁的框图。该智能门锁执行图3任一所示的智能门锁无线通信方法的全部或者部分步骤,如图10所示,该智能门锁包括但不限于:控制指令数据接收模块610、第一解密模块630、第二解密模块650和控制指令执行模块670。
控制指令数据接收模块610用于接收网关转发的控制指令数据,该控制指令数据是客户端根据用户触发的操作生成并发送至网关的
第一解密模块630用于根据对称加密算法对控制指令数据进行解密,得到解密数据。
第二解密模块650用于按照指定通信协议中配置的加密算法对解密数据进行二次解密,得到控制指令,指定通信协议用于与所述网关建立通信连接。
控制指令执行模块670用于根据解密得到的控制指令控制所述智能门锁执行相应操作。
图11是根据一示例性实施例所示出的一种网关的框图。如图11所示,该网关包括但不限于:控制指令接收模块710、第一加密模块730、第二加密模块750和控制指令数据发送模块770。
其中,控制指令接收模块710用于接收客户端发送的控制指令,所述控制指令是所述客户端根据用户触发操作生成的。
第一加密模块730用于按照指定通信协议中配置的加密算法对所述控制指令进行加密,得到加密数据。
第二加密模块750用于根据所述对称加密算法对所述加密数据进行第二次加密,得到控制指令数据。
控制指令数据发送模块770用于向所述智能门锁发送所述控制指令数据。
在一个示例性实施例中,一种通信设备,包括:
处理器;及
存储器,所存储器上存储有计算机可读指令,计算机可读指令被处理器执行时实现上述各实施例中的方法。
上述内容,仅为本发明的较佳示例性实施例,并非用于限制本发明的实施方案,本领域普通技术人员根据本发明的主要构思和精神,可以十分方便地进行相应的变通或修改,故本发明的保护范围应以权利要求书所要求的保 护范围为准。
Claims (12)
- 一种智能门锁无线通信方法,其特征在于,包括:接收网关发送的控制指令数据,所述控制指令数据是所述网关对客户端根据用户触发操作生成的控制指令进行加密得到的;根据对称加密算法对所述控制指令数据进行解密,得到解密数据;按照指定通信协议中配置的加密算法进行所述解密数据的二次解密,得到控制指令,所述指定通信协议用于与所述网关建立通信连接;根据所述控制指令控制所述智能门锁执行相应操作。
- 如权利要求1所述的方法,其特征在于,所述方法还包括:按照所述指定通信协议中配置的加密算法对所述智能门锁存储的门锁数据进行加密,得到加密数据;根据所述对称加密算法对所述加密数据进行二次加密,得到待发送数据;向所述网关上报所述待发送数据。
- 如权利要求1所述的方法,其特征在于,所述方法还包括:接收所述网关发送的智能门锁配对指令,根据所述智能门锁配对指令对用户触发的配对操作进行检测;如果检测到所述用户触发的配对操作,则进行所述智能门锁与所述网关之间的配对,以使所述智能门锁与所述网关之间建立通信连接。
- 如权利要求1所述的方法,其特征在于,所述方法还包括:根据所述对称加密算法对所述智能门锁存储的验证信息进行加密,得到验证信息;向所述网关发送所述验证信息;当所述验证信息指示所述智能门锁通过所述网关的验证,建立所述智能门锁与所述网关之间的通信连接。
- 如权利要求1至4任一项所述的方法,其特征在于,所述方法还包括:接收所述网关发送的第一密钥基数,并根据所述第一密钥基数随机生成第二密钥基数;从所述智能门锁的存储器中读取第三密钥基数;对所述第一密钥基数、所述第二密钥基数以及所述第三密钥基数进行密 钥运算,得到用于执行所述对称加密算法的第一密钥。
- 如权利要求5所述的方法,其特征在于,所述对所述第一密钥基数、所述第二密钥基数以及所述第三密钥基数进行密钥运算,得到第一密钥,包括:根据消息摘要算法对所述第一密钥基数、所述第二密钥基数以及所述第三密钥基数进行运算,得到消息摘要数据;从所述消息摘要数据中提取指定数据作为所述第一密钥。
- 一种智能门锁无线通信方法,其特征在于,包括:网关接收客户端发送的控制指令,所述控制指令是所述客户端根据用户触发操作生成的;按照指定通信协议中配置的加密算法对所述控制指令进行加密,得到加密数据;根据对称加密算法对所述加密数据进行第二次加密,得到控制指令数据;向所述智能门锁发送所述控制指令数据。
- 如权利要求7所述的方法,其特征在于,所述方法还包括:所述网关接收所述智能门锁上报的待发送数据,所述待发送数据是所述智能门锁对其存储的门锁数据加密得到的;根据所述对称加密算法对所述待发送数据进行解密,得到解密数据;按照所述指定通信协议中配置的加密算法对所述解密数据进行第二次解密,得到所述门锁数据;将所述门锁数据发送至所述客户端。
- 如权利要求7或8所述的方法,其特征在于,所述方法还包括:所述网关接收所述客户端发送的第三密钥基数,并根据所述第三密钥基数随机生成第一密钥基数;接收所述智能门锁发送的第二密钥基数;对所述第一密钥基数、所述第二密钥基数以及所述第三密钥基数进行密钥运算,得到用于执行所述对称加密算法的第二密钥。
- 一种智能门锁,其特征在于,包括:控制指令数据接收模块,用于接收网关发送的控制指令数据,所述控制指令数据是所述网关对客户端根据用户触发操作生成的控制指令进行加密得 到的;第一解密模块,用于根据对称加密算法对所述控制指令数据进行解密,得到解密数据;第二解密模块,用于按照指定通信协议中配置的加密算法进行所述解密数据进行二次解密,得到控制指令,所述指定通信协议用于与所述网关建立通信连接;控制指令执行模块,用于根据所述控制指令控制所述智能门锁执行相应操作。
- 一种网关,其特征在于,包括:控制指令接收模块,用于接收客户端发送的控制指令,所述控制指令是所述客户端根据用户触发操作生成的;第一加密模块,用于按照指定通信协议中配置的加密算法对所述控制指令进行加密,得到加密数据;第二加密模块,用于根据所述对称加密算法对所述加密数据进行第二次加密,得到控制指令数据;控制指令数据发送模块,用于向所述智能门锁发送所述控制指令数据。
- 一种通信设备,其特征在于,包括:处理器;及存储器,所述存储器上存储有计算机可读指令,所述计算机可读指令被所述处理器执行时实现如权利要求1至9中任一项所述的智能门锁无线通信方法。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2018/087400 WO2019218328A1 (zh) | 2018-05-18 | 2018-05-18 | 一种智能门锁无线通信方法、智能门锁、网关及通信设备 |
CN201880094566.1A CN112425116B (zh) | 2018-05-18 | 2018-05-18 | 智能门锁无线通信方法、智能门锁、网关及通信设备 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2018/087400 WO2019218328A1 (zh) | 2018-05-18 | 2018-05-18 | 一种智能门锁无线通信方法、智能门锁、网关及通信设备 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019218328A1 true WO2019218328A1 (zh) | 2019-11-21 |
Family
ID=68539569
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/087400 WO2019218328A1 (zh) | 2018-05-18 | 2018-05-18 | 一种智能门锁无线通信方法、智能门锁、网关及通信设备 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN112425116B (zh) |
WO (1) | WO2019218328A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114513303A (zh) * | 2022-01-28 | 2022-05-17 | 无锡台翔电子技术发展有限公司 | 一种加密密码生成方法及具有加密模块的装置 |
CN116321538A (zh) * | 2023-02-21 | 2023-06-23 | 深圳市丰润达科技有限公司 | 动态修改ZigBee设备基础信息的方法、模块、设备及介质 |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114399854A (zh) * | 2021-12-30 | 2022-04-26 | 荣耀终端有限公司 | 智能门锁的开锁方法、移动设备及存储介质 |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1769637A (zh) * | 2004-11-01 | 2006-05-10 | 华为技术有限公司 | 一种电子钥匙和电子锁装置及其实现方法 |
CN101815289A (zh) * | 2009-02-12 | 2010-08-25 | 通用汽车有限责任公司 | 利用微证书保护和鉴定数据的方法 |
CN103617659A (zh) * | 2013-11-01 | 2014-03-05 | 南京物联传感技术有限公司 | 一种无线开锁方法 |
CN104537739A (zh) * | 2014-12-23 | 2015-04-22 | 江苏思瑞德物联科技有限公司 | 固定式主密码控制器及应用该控制器的安全卸油系统 |
CN104618204A (zh) * | 2015-01-29 | 2015-05-13 | 杭州晟元芯片技术有限公司 | 一种基于安全模块保障安全可远程控制的智能家居系统及实现方法 |
CN106846573A (zh) * | 2017-01-17 | 2017-06-13 | 宁波耀龙软件科技有限公司 | 在无互联网接入时打开电子锁的方法以及相应的电子锁 |
WO2017116586A1 (en) * | 2015-12-31 | 2017-07-06 | Google Inc. | Remote alarm hushing with acoustic presence verification |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104574598B (zh) * | 2014-12-29 | 2018-02-09 | 托斯卡尼(上海)酒店管理有限公司 | 一种智能门锁的集中控制方法和系统 |
CN104680630A (zh) * | 2014-12-29 | 2015-06-03 | 深圳市进林科技有限公司 | 一种控制门锁的方法和系统 |
US10122685B2 (en) * | 2015-08-26 | 2018-11-06 | Tatung Company | Method for automatically establishing wireless connection, gateway device and client device for internet of things using the same |
-
2018
- 2018-05-18 CN CN201880094566.1A patent/CN112425116B/zh active Active
- 2018-05-18 WO PCT/CN2018/087400 patent/WO2019218328A1/zh active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1769637A (zh) * | 2004-11-01 | 2006-05-10 | 华为技术有限公司 | 一种电子钥匙和电子锁装置及其实现方法 |
CN101815289A (zh) * | 2009-02-12 | 2010-08-25 | 通用汽车有限责任公司 | 利用微证书保护和鉴定数据的方法 |
CN103617659A (zh) * | 2013-11-01 | 2014-03-05 | 南京物联传感技术有限公司 | 一种无线开锁方法 |
CN104537739A (zh) * | 2014-12-23 | 2015-04-22 | 江苏思瑞德物联科技有限公司 | 固定式主密码控制器及应用该控制器的安全卸油系统 |
CN104618204A (zh) * | 2015-01-29 | 2015-05-13 | 杭州晟元芯片技术有限公司 | 一种基于安全模块保障安全可远程控制的智能家居系统及实现方法 |
WO2017116586A1 (en) * | 2015-12-31 | 2017-07-06 | Google Inc. | Remote alarm hushing with acoustic presence verification |
CN106846573A (zh) * | 2017-01-17 | 2017-06-13 | 宁波耀龙软件科技有限公司 | 在无互联网接入时打开电子锁的方法以及相应的电子锁 |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114513303A (zh) * | 2022-01-28 | 2022-05-17 | 无锡台翔电子技术发展有限公司 | 一种加密密码生成方法及具有加密模块的装置 |
CN114513303B (zh) * | 2022-01-28 | 2024-05-28 | 无锡台翔电子技术发展有限公司 | 一种加密密码生成方法及具有加密模块的装置 |
CN116321538A (zh) * | 2023-02-21 | 2023-06-23 | 深圳市丰润达科技有限公司 | 动态修改ZigBee设备基础信息的方法、模块、设备及介质 |
Also Published As
Publication number | Publication date |
---|---|
CN112425116B (zh) | 2023-09-26 |
CN112425116A (zh) | 2021-02-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11070364B2 (en) | Secure communication method and smart lock system based thereof | |
KR102328725B1 (ko) | 하나의 장치를 이용하여 다른 장치를 언로크하는 방법 | |
EP3657370B1 (en) | Methods and devices for authenticating smart card | |
CN110995642B (zh) | 使用预共享密钥提供安全连接 | |
WO2018133832A1 (zh) | 智能门锁的开锁方法、移动终端、智能门锁及云服务器 | |
US11997193B2 (en) | Secure communication method and smart lock system based thereof | |
JP2019506789A (ja) | パスコード検証のためのフォワードセキュア型暗号技術を使用した方法、システム、及び装置。 | |
CN108650219B (zh) | 一种用户身份识别方法、相关装置、设备和系统 | |
WO2019218328A1 (zh) | 一种智能门锁无线通信方法、智能门锁、网关及通信设备 | |
CN104852800A (zh) | 数据传输方法及装置 | |
KR101745482B1 (ko) | 스마트홈 시스템에서의 통신 방법 및 그 장치 | |
CN115037451B (zh) | 数据保护方法及电子设备 | |
KR101790121B1 (ko) | 전자 기기 인증 방법 및 시스템 | |
CN108768621B (zh) | 一种密码获取方法、验证方法、相关装置、设备和系统 | |
CN115909559A (zh) | 一种基于量子随机数的智能锁控制方法和系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18919271 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18919271 Country of ref document: EP Kind code of ref document: A1 |