WO2020030132A1 - 智能门锁的控制方法、设备及存储介质 - Google Patents

智能门锁的控制方法、设备及存储介质 Download PDF

Info

Publication number
WO2020030132A1
WO2020030132A1 PCT/CN2019/100037 CN2019100037W WO2020030132A1 WO 2020030132 A1 WO2020030132 A1 WO 2020030132A1 CN 2019100037 W CN2019100037 W CN 2019100037W WO 2020030132 A1 WO2020030132 A1 WO 2020030132A1
Authority
WO
WIPO (PCT)
Prior art keywords
door lock
password
terminal
smart
smart door
Prior art date
Application number
PCT/CN2019/100037
Other languages
English (en)
French (fr)
Inventor
董志华
李小虎
岳光军
王波
牟婷娥
Original Assignee
南京中兴新软件有限责任公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 南京中兴新软件有限责任公司 filed Critical 南京中兴新软件有限责任公司
Publication of WO2020030132A1 publication Critical patent/WO2020030132A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B45/00Alarm locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00412Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted

Definitions

  • the present disclosure relates to the field of smart door locks, and in particular, to a control method, device, and storage medium for a smart door lock.
  • a method for controlling a smart door lock which is applied to a smart door lock, the smart door lock communicates with a cloud platform and a first terminal, respectively, and the method includes: receiving the cloud
  • the door lock control information sent by the platform is configured to control the use right of the smart door lock; based on the door lock control information, it is determined that when the smart door lock is started, a door lock password is generated; Lock the door lock password; and send the door lock password to the first terminal.
  • a method for controlling a smart door lock is provided, which is applied to a first terminal, and the first terminal communicates with a cloud platform and a smart door lock, respectively, and the method includes: communicating with the The cloud platform negotiates an encryption method to generate a key; wherein the key includes a door lock encryption key and a door lock decryption key; sends the door lock encryption key to the cloud platform; and receives the smart door lock send An encrypted door lock password, wherein the encrypted door lock password is generated by the smart door lock using the door lock encryption key to encrypt the door lock password; and the door lock decryption key is used to decrypt the encrypted door lock Password to generate an unlock password.
  • a method for controlling a smart door lock is provided, which is applied to a cloud platform that communicates with a first terminal, a second terminal, and a smart door lock, respectively.
  • the method includes: receiving An instruction for controlling the smart door lock by the second terminal; negotiating an encryption method with the first terminal, receiving a door lock encryption key sent by the first terminal; and encrypting the door lock according to the control instruction Key, generates door lock control information; and sends the door lock control information to the smart door lock.
  • an intelligent door lock which includes a first processor, a first memory, a first communication interface, and a first bus, and the first bus is configured to connect the first processor, The first memory and the first communication interface, and the first processor is configured to execute a smart door lock control program stored in the first memory to implement the above method.
  • a terminal including a second processor, a second memory, a second communication interface, and a second bus, and the second bus is configured to connect the second processor and the second bus.
  • a second memory and a second bus second communication interface, and the second processor is configured to execute an intelligent door lock control program stored in the second memory to implement the above method.
  • a cloud platform including a third processor, a third memory, and a third bus.
  • the third bus is configured to connect the third processor, the third memory, and the third bus.
  • the three processors are configured to execute an intelligent door lock control program stored in the third memory to implement the above method.
  • a computer-readable storage medium on which a smart door lock control program is stored and applied to a smart door lock, the smart door lock control program is implemented when the first processor is executed Method; or, when the smart door lock control program is executed by a second processor in a terminal, the above method is implemented; or when the smart door lock control program is executed by a third processor in a cloud platform, The above method.
  • FIG. 1 is a structural diagram of a smart door lock control system according to an exemplary embodiment of the present disclosure
  • FIG. 2-1 is a first schematic flowchart of an intelligent door lock control method according to an exemplary embodiment of the present disclosure
  • FIG. 2-2 is a second schematic flowchart of an intelligent door lock control method according to an exemplary embodiment of the present disclosure
  • FIG. 2-3 is a third schematic flowchart of an intelligent door lock control method according to an exemplary embodiment of the present disclosure
  • FIG. 3 is a topology structure diagram of an intelligent door lock management system according to an exemplary embodiment of the present disclosure
  • FIG. 4 is a structural diagram of a smart door lock system integrating an NB-IoT module according to an exemplary embodiment of the present disclosure
  • FIG. 5-1 is a first schematic flowchart of an intelligent door lock control method according to an exemplary embodiment of the present disclosure
  • 5-2 is a second schematic flowchart of an intelligent door lock control method according to an exemplary embodiment of the present disclosure
  • FIG. 6 is a schematic flowchart of an intelligent door lock control method according to an exemplary embodiment of the present disclosure
  • FIG. 7 is an interaction flowchart of a method for controlling a smart door lock according to an exemplary embodiment of the present disclosure
  • FIG. 8 is an interaction flowchart II of a smart door lock control method according to an exemplary embodiment of the present disclosure
  • FIG. 9 is an interaction flowchart III of a smart door lock control method according to an exemplary embodiment of the present disclosure.
  • FIG. 10 is an interaction flowchart IV of a smart door lock control method according to an exemplary embodiment of the present disclosure
  • FIG. 11 is a state diagram of a smart door lock password acquisition process according to an exemplary embodiment of the present disclosure.
  • FIG. 12 is a schematic structural diagram of a smart door lock according to an exemplary embodiment of the present disclosure.
  • FIG. 13 is a schematic diagram of a composition structure of a terminal according to an exemplary embodiment of the present disclosure.
  • FIG. 14 is a schematic diagram of a composition structure of a cloud platform according to an exemplary embodiment of the present disclosure.
  • FIG. 1 is a structural diagram of a smart door lock control system according to an exemplary embodiment of the present disclosure.
  • the smart door lock control system proposed by the present disclosure may include a first terminal, a second terminal, a cloud platform, and a smart door lock.
  • the first terminal may be understood as a terminal operated by a tenant
  • the second terminal may be understood as a terminal operated by a landlord
  • the first terminal and the second terminal may have wireless communication functions.
  • Smart terminals such as mobile phones and tablets.
  • the cloud platform communicates with the second terminal first, receives the control instruction of the second door on the smart door lock, generates door lock control information according to the control instruction, and sends it to the smart door lock; the smart door lock is based on the received door
  • the lock control information generates a door lock password, and sends the door lock password to the first terminal.
  • the smart door lock can generate a password according to the door lock control information sent by the cloud platform and forward the password to the first terminal, avoiding the complicated process of forwarding the door lock password to the smart door lock and the first terminal through the cloud platform. , Reduce the password transfer process, and achieve end-to-end transmission.
  • the security of remote control of the smart door lock is effectively improved.
  • control device of the smart door lock may be a first terminal, a second terminal, a cloud platform, and a smart door lock.
  • FIG. 2-1 is a schematic flowchart of an implementation method of a smart door lock control method according to an exemplary embodiment of the present disclosure.
  • a control method of a smart door lock It can include the following steps:
  • Step 201 Receive door lock control information sent by a cloud platform, and the door lock control information is configured to control a use right of a smart door lock.
  • the smart door lock communicates with the cloud platform and the first terminal, respectively, to realize information interaction.
  • the cloud platform after the cloud platform performs information interaction with the tenant client (first terminal) and the landlord client (second terminal) to obtain door lock control information for controlling the use right of the smart door lock, the cloud platform will The door lock control information can be sent to the smart door lock for the smart door lock to perform door lock control based on the door lock control information.
  • the exemplary embodiment of the present disclosure is based on the installation of NB modules in smart door locks, and proposes a feature that uses NB-IoT technology ’s low power consumption and strong penetration to perform safe and reliable operations. Smart door lock password control method.
  • FIG. 3 is a topology structure diagram of a smart door lock management system according to an exemplary embodiment of the present disclosure.
  • the smart door lock management system proposed by the exemplary embodiment of the present disclosure may include a cloud platform that supports NB-IoT Standardization, the cloud platform based on NB-IoT technology is interconnected with the external Internet through the mobile core network, so as to realize the communication between the first terminal, the second terminal and the cloud platform.
  • the smart door lock management system further includes a base station and a smart door lock integrated with an NB module, wherein the base station is configured to realize the communication between the cloud platform and the smart door lock; the smart door lock has a basic password unlocking function, and the password can be dynamic It is updated, and the smart door lock can perform wireless communication with the first terminal.
  • the smart door lock and the cloud platform communicate based on the NB-IoT network, and the smart door lock receives door lock control information sent by the cloud platform through the NB-IoT network to implement Smart door lock use permission control.
  • the transfer point of network information transmission is reduced, and end-to-end transmission is realized.
  • the smart door lock may adopt a heartbeat keep-alive mechanism to receive the door sent by the cloud platform.
  • Lock control information Specifically, when the smart door is locked, a data packet (heartbeat packet) is sent to the cloud platform to inform the cloud platform that the smart door lock itself is in a connected state, so as to ensure the validity of the connection between the smart door lock and the cloud platform.
  • Step 202 Based on the door lock control information, it is determined that when the smart door lock is started, a door lock password is generated.
  • the smart door lock based on the connection between the smart door lock and the cloud platform, the smart door lock generates a door lock password according to the door lock control information after receiving the door lock control information sent by the cloud platform.
  • the smart door lock correspondingly generates a door lock password according to the door lock control information sent by the cloud platform, that is, when the door lock control information sent by the cloud platform does not change, the door lock password also Does not change; when the door lock control information sent by the cloud platform changes, the door lock password also changes.
  • Step 203 Use the door lock password to lock.
  • the door lock password is updated and set into the smart door lock to achieve the lock of the smart door lock.
  • the second terminal sends control information to the smart door lock through the cloud platform, so that the second terminal can remotely control the smart door lock, which improves the convenience of the smart door lock control.
  • Step 204 Send the door lock password to the first terminal.
  • the smart door lock after the smart door lock updates the door lock password, the smart door lock sends the door lock password to the first terminal, thereby avoiding the cloud platform management password, and achieving the direct control of the smart door lock on the first terminal. .
  • the smart door lock when the smart door lock sends the door lock password to the first terminal, the smart door lock may be sent based on a wireless network protocol, or may be sent through a short message to enhance the security of data transmission. Further, in the exemplary embodiment of the present disclosure, the NB module in the NB-IoT smart combination lock may be used to send the door lock password to the first terminal in the form of a short message based on SIM NB-IoT communication.
  • antennas when transmitting through the SIM NB-IoT, in order to avoid signal shielding, when designing the integration of smart door locks and NB-IoT communication modules, antennas can be installed to enhance signal transmission.
  • An exemplary embodiment of the present disclosure provides a control method for a smart door lock, which is applied to a smart door lock.
  • the smart door lock generates a password in the smart door lock according to the control information sent by the cloud platform, and the smart door lock
  • the password is sent to the first terminal, avoiding the complicated process of forwarding the door lock password to the smart door lock and the first terminal through the cloud platform, reducing the password transfer relay, enabling end-to-end transmission, and generating in the smart door lock
  • the door lock password effectively improves the remote control security of the smart door lock.
  • FIG. 2-2 is a schematic diagram of an implementation process of a smart door lock control method according to an exemplary embodiment of the present disclosure.
  • an exemplary embodiment of the present disclosure provides A smart door lock control method further includes step 202A; and after step 203 and before step 204, a smart door lock control method provided by an exemplary embodiment of the present disclosure further includes step 203A.
  • Step 202A According to the door lock age information, set an unlock age corresponding to the door lock password.
  • the smart door lock after receiving the door lock control information sent by the cloud platform, the smart door lock generates a door lock password based on the door lock control information when it is determined that the smart door lock is activated.
  • the door lock control information may include: door lock aging information. After receiving the door lock control information with the door lock aging information, the smart door lock sets the door lock aging information into the smart door lock to set the unlock aging corresponding to the door lock password.
  • the door lock aging information is configured to control the use time limit of the smart door lock by the first terminal, and the format of the door lock aging information is not specifically limited in the present disclosure.
  • the door lock aging information may exist in the form of time stamp and use time, such as the time stamp information is June 1, 2018, and the use time is two years; or the door lock aging information is in the form of specific use time period, such as From June 1, 2018 to June 1, 2020.
  • the door lock aging information in the door lock control information sent by the cloud platform may be sent in the form of a token.
  • the more popular explanation of the Token can be called a secret code.
  • the verification of the secret code must be performed first. Different passwords are authorized for different data operations. Therefore, after acquiring the token, the smart door lock needs to be decoded to obtain the door lock aging information. After the smart door lock decodes and obtains the lock age information, it sets the unlock age corresponding to the door lock password, thereby realizing the dynamic management of the smart door lock password.
  • Step 203A The door lock password is encrypted by using a door lock encryption key to obtain an encrypted door lock password.
  • the door lock password is encrypted to obtain an encrypted door lock password.
  • the smart door lock may include a door lock encryption key in the door lock control information sent by the cloud platform.
  • the smart door lock uses the door lock encryption key to encrypt the smart door lock to obtain the encrypted door lock password.
  • the smart door lock and the cloud platform may perform communication connection based on the NB-IoT network. It should be noted that the generation of the encrypted door lock password depends on the communication between the cloud platform and the smart door lock. Although the NB-IoT network has a certain delay, considering that the password setting process does not require high real-time performance, Will affect the user experience.
  • the process of step 204 may send an encrypted door lock password to the first terminal for the smart door lock.
  • the NB module in the NB-IoT smart combination lock can be used to send the encrypted door lock password to the first terminal in the form of a short message based on SIM NB-IoT communication.
  • FIG. 4 is a structural diagram of an intelligent door lock system integrated with an NB module according to an exemplary embodiment of the present disclosure.
  • the NB module and the intelligent door lock are integrated together. Information can be exchanged.
  • NB-IoT smart combination lock is composed of three parts, including: lock body part, password module, NB module.
  • the cloud platform includes: a Token management module and a key management module.
  • the second terminal (landlord client) has the function of door lock and time-effective selection. By selecting the door lock identity (ID) on the second terminal for aging, the Token management module of the cloud platform generates a Token, and uses the generated Token and the door lock encryption key received by the key management module as the door lock.
  • ID door lock identity
  • the control information is sent to the smart door lock together through the NB-IoT network.
  • the smart door lock decodes the Token, obtains the lock age information, and updates the door lock password to the password module.
  • the smart door lock uses encryption The key encrypts the door lock password and sends the encrypted encrypted door lock password to the first terminal, thereby completing the time-sensitive door lock password setting and sending the non-plaintext password in steps 201-204 of FIG. 2-2.
  • the smart door lock sends a time-sensitive encrypted door lock password to the terminal, which enables the smart door lock to dynamically set a non-plaintext password in one direction, thereby minimizing the password Risk of leakage. It supplements the security aspects of the current mainstream smart door locks with fingerprints, irises, and fixed passwords, which greatly enriches the application scenarios of smart door locks.
  • FIG. 2-3 is a schematic flowchart of an intelligent door lock control method according to an exemplary embodiment of the present disclosure.
  • An intelligent door lock control method may further include steps 205-209, as follows:
  • Step 205 Receive an unlock request sent by the first terminal, where the unlock request carries an unlock password.
  • the smart door lock after the smart door lock sends the door lock password to the first terminal, the smart door lock receives the unlock request that the first terminal carries the unlock password.
  • the manner in which the smart door lock receives the unlock request of the first terminal may include: receiving the first terminal, that is, the unlock request sent by the tenant client; or receiving the first terminal through An unlock request sent by Near Field Communication (NFC); or receiving an unlock request sent by a Bluetooth chip of a first terminal.
  • NFC Near Field Communication
  • the smart door lock when the smart door lock sends the encrypted door lock password to the first terminal, the smart door lock needs to decrypt the encrypted door lock password first to obtain the unlock password.
  • the decryption process is completed in the first terminal, and the unlocking password is obtained by decrypting the encrypted door lock by using a decryption key corresponding to the encryption key.
  • Step 206 When the unlock password is within the time limit for unlocking, use the unlock password to unlock.
  • the smart door lock after receiving the unlock password request from the first terminal, the smart door lock first determines whether the unlock password is within the unlock time limit, and only uses the unlock password to unlock when the unlock password is within the unlock time limit.
  • determining whether the unlocking password is within the time limit is to determine whether the unlocking password is within the time limit of unlocking according to the current time when the smart door lock receives the unlocking password request.
  • the current time when the smart door lock receives the unlocking password may be the timestamp carried in the unlock request, or the current time recorded in the smart door lock.
  • the current time when the smart door lock receives the unlock password request is February 1, 2017, and if the unlock time limit set in step 202A is June 1, 2016 to June 1, 2018, the unlock password is Within the time limit for unlocking.
  • the specific unlocking process of the smart door lock using the unlock password is as follows: the smart door lock determines whether the unlock password is consistent with the door lock password. When the unlock password is consistent, the smart door lock is successfully unlocked; When the unlock password is inconsistent with the door lock password, the unlock fails and the smart door lock remains locked.
  • Step 207 Feedback the unlocked state of the smart door lock to the first terminal; wherein the unlocked state includes successful unlocking or unsuccessful unlocking.
  • the unlock password when the unlock password is within the unlock limitation period, the unlock password is used for unlocking.
  • the smart door lock matches whether the unlock password is consistent with the door lock password and reports the unlock status to the first terminal. Through the status feedback, it is convenient for the first terminal to grasp the status of the unlock request in real time.
  • Step 208 Keep the lock when the unlock password is not within the time limit for unlocking.
  • the smart door lock after receiving the unlock password request from the first terminal, the smart door lock first determines whether the unlock password is within the unlock time limit, and when the unlock password is not within the unlock time limit, the smart door lock remains locked.
  • the current time when the smart door lock receives the unlocking password may be the timestamp carried in the unlock request, or the current time recorded in the smart door lock.
  • the current time when the smart door lock record received the unlock password request is February 1, 2023, and in the unlocking aging information set in step 202A, the time stamp information is June 1, 2018, and the use time is Two years, the unlock password is no longer within the time limit for unlocking.
  • the decryption password is invalidated, and the smart door lock remains locked.
  • Step 209 Send an aging reminder to the first terminal.
  • the smart door lock when the smart door lock determines that the unlock password is not within the unlock time limit, the smart door lock feedbacks the time limit reminder to the first terminal.
  • the aging reminder may be sent in the form of a short message based on SIM NB-IoT communication, or may be sent based on wireless communication. Through the aging reminder, it is convenient for the first terminal to know the current lease status in real time.
  • the unlocking result is fed back to the first terminal through the smart door lock, which improves the management efficiency of the smart door lock.
  • FIG. 5-1 is a schematic flowchart of a smart door lock control method according to an exemplary embodiment of the present disclosure.
  • a terminal implements a door lock control method. It can include the following steps:
  • Step 301 Negotiate an encryption method with a cloud platform to generate a key.
  • the key includes a door lock encryption key and a door lock decryption key.
  • the first terminal communicates with the cloud platform and the smart door lock, respectively, to implement information interaction.
  • the first terminal performs information interaction with the cloud platform, it generates door lock control information through the cloud platform and sends it to the smart door lock, so that the smart door lock and the first terminal can directly communicate with each other to achieve end-to-end transmission.
  • the first terminal supports encryption algorithms and key management functions. After the first terminal establishes a connection with the cloud platform, it negotiates the encryption method with the cloud platform, and the first terminal Key in.
  • the first terminal and the cloud platform may negotiate and adopt an asymmetric encryption algorithm or a symmetric encryption algorithm.
  • the asymmetric encryption algorithm uses different keys in the encryption and decryption process, including a public key and a private key.
  • the public key and the private key are a pair. If the public key is used to encrypt the data, only the corresponding private key can be used to decrypt it. If the private key is used to encrypt the data, then only the corresponding public key can be used. Decrypt.
  • the public and private keys are the same key. It should be noted that, in the exemplary embodiment of the present disclosure, the asymmetric encryption algorithm and the symmetric encryption algorithm are conventional algorithms, which are not described in this disclosure.
  • the asymmetric encryption system does not require the communicating parties to pass the key in advance or have any agreement to complete the confidential communication, and the key management is convenient, it can prevent counterfeiting and non-repudiation, and is suitable for the network. Confidential communication requirements in communication. Compared with symmetric encryption algorithm, its security performance is better. Therefore, in the exemplary embodiment of the present disclosure, the first terminal negotiates with the cloud platform to adopt the asymmetric encryption algorithm to generate the corresponding public and private keys.
  • Step 302 Send the door lock encryption key to the cloud platform.
  • the first terminal after the first terminal negotiates with the cloud platform to generate a key, the first terminal sends the door lock encryption key to the cloud platform based on a wireless communication manner. After receiving the encryption key, the cloud platform forwards the door lock encryption key to the smart door lock, thereby realizing the docking of the first terminal with the smart door lock.
  • Step 303 Receive the encrypted door lock password sent by the smart door lock.
  • the encrypted door lock password is generated by the smart door lock using the door lock encryption key to encrypt the door lock password.
  • the smart door lock uses the encryption key to encrypt the door lock password, and sends the encrypted door lock password to the first terminal, realizing smart The door lock controls the first terminal.
  • the encrypted door lock password received by the first terminal and received by the smart door lock is obtained by encrypting the public key generated by using the asymmetric encryption algorithm negotiated between the first terminal and the cloud platform.
  • the first terminal can receive the encrypted door lock password sent by the smart door lock through the SIM NB-IoT through a short message.
  • Step 304 Use the door lock decryption key to decrypt the encrypted door lock password to generate an unlock password.
  • the first terminal uses an decryption key generated by an encryption algorithm negotiated with the cloud platform to decrypt the encrypted door lock password to obtain an unlock password.
  • the first terminal may verify the login information of the first terminal to determine the use right of the first terminal.
  • the verification may use conventional methods such as user account name, password verification, and mobile phone number verification, which are not described in the exemplary embodiment of the present disclosure.
  • the first terminal may decrypt the private key generated by the asymmetric encryption algorithm to obtain the unlock password.
  • the unlock password generated in the first terminal may be written into the NFC chip when the first terminal is equipped with an NFC chip, or may be a Bluetooth chip in the first terminal.
  • the unlock password may be written into the NFC chip when the first terminal is equipped with an NFC chip, or may be a Bluetooth chip in the first terminal.
  • An exemplary embodiment of the present disclosure provides a control method for a smart door lock.
  • the above control method is applied to a first terminal, and uses a cryptographic processing and key management function of the first terminal to set a password generated by the smart door lock to non- Clear text passwords, thereby minimizing the risk of password leakage, supplementing the current mainstream smart door locks with fingerprint, iris, and fixed password unlocking methods, which greatly enriches the application scenarios of smart door locks.
  • FIG. 5-2 is a schematic flowchart of an intelligent door lock control method according to an exemplary embodiment of the present disclosure.
  • an exemplary embodiment of the present disclosure provides a The smart door lock control method may further include steps 305-306, as follows:
  • Step 305 Send an unlock request to the smart door lock, and the unlock request carries an unlock password.
  • the first terminal uses the door lock decryption key to decrypt the encrypted door lock password to obtain the unlock password, it sends an unlock request carrying the unlock password to the smart door lock.
  • the first terminal when the first terminal sends a decoding request to the smart door lock, the first terminal may send an unlock request to the smart door lock through an unlock password displayed on the tenant client interface, or by using NFC, Bluetooth, or the like.
  • Step 306 Receive an unlocking result fed back by the smart door lock; wherein the unlocking result includes an aging reminder or an unlocking state.
  • the first terminal after the first terminal sends a decoding request to the smart door lock, the first terminal receives the unlocking result fed back by the smart door lock. specifically:
  • the first terminal When the unlock request sent by the first terminal is not within the unlocking aging period set by the smart door lock, the first terminal will receive a aging reminder of the smart door lock;
  • the unlock password sent by the first terminal will match the door lock password of the smart door lock. After the matching is completed, the first terminal will receive the smart The status identifier of the successful or unsuccessful unlocking sent by the door lock.
  • the status feedback of the first terminal can facilitate the first terminal to immediately grasp the status of the unlock request, and improve the management efficiency of the smart door lock.
  • FIG. 6 is a schematic flowchart of implementing a smart door lock control method according to an exemplary embodiment of the present disclosure.
  • a method of implementing a door lock control by a cloud platform may include the following steps :
  • Step 601 Receive a control instruction of the smart door lock by the second terminal.
  • the cloud platform communicates with the first terminal, the second terminal, and the smart door lock, respectively, to implement information interaction.
  • the cloud platform based on the information interaction with the tenant client and the landlord client to obtain the door lock control information configured to control the use right of the smart door lock, and then forward the door lock control information to the smart door lock, thereby avoiding the cloud platform To manage the risk of door lock passwords.
  • the cloud platform receives the control instruction of the second terminal, including the door lock ID corresponding to the smart door lock and the time limit for use of the door lock, and the cloud platform needs to verify the landlord customer when receiving the control instruction Login information on the terminal to determine whether the landlord has the operation authority for the smart door lock.
  • the verification may use conventional methods such as user account name, password verification, and mobile phone number verification, which are not described in the exemplary embodiment of the present disclosure.
  • Step 602 Negotiate an encryption method with the first terminal, and receive a door lock encryption key sent by the first terminal.
  • the cloud platform negotiates the encryption algorithm with the first terminal, and after the encryption algorithm is determined, the door lock encryption key sent by the first terminal is received.
  • the cloud platform and the first terminal negotiate to adopt an asymmetric encryption algorithm to improve security.
  • Step 603 Generate door lock control information according to the control instruction and the door lock encryption key.
  • the cloud platform generates door lock control information according to a control instruction and a door lock encryption key sent by the second terminal.
  • the door lock control information includes a token Token
  • the Token includes door lock aging information.
  • the door lock aging information is configured to control the use time limit of the smart door lock by the first terminal, and the format of the door lock aging information is not specifically limited in the present disclosure.
  • the door lock aging information may exist in the form of time stamp and use time, such as the time stamp information is June 1, 2018, and the use time is two years; or the door lock aging information is in the form of specific use time period, such as From June 1, 2018 to June 1, 2020.
  • the door lock control information further includes: a door lock encryption key.
  • Step 604 Send the door lock control information to the smart door lock.
  • the cloud platform sends the door lock control information to the smart door lock after generating the door lock control information, thereby avoiding the risk that the cloud platform manages the door lock password.
  • the cloud platform supports NB-IoT communication, and can realize narrow-band IoT with smart door locks.
  • the transmission rate of NB-IoT network is generally 200kbps, and the length of the door lock control information can be communicated at one time.
  • the cloud platform may also use the heartbeat keep-alive mechanism to send the door lock control information.
  • the cloud platform regularly receives data packets (heartbeat packets) sent by the smart door lock.
  • the cloud platform after receiving the data packets, the cloud platform notifies the smart door lock that the data packet has been received, thereby ensuring the cloud platform and the smart door lock. The status is consistent between them.
  • each time the cloud platform receives a control instruction from the second terminal it will generate time-sensitive control information according to the control instruction and send it to the smart door lock to achieve this. Dynamic control of smart door locks.
  • An exemplary embodiment of the present disclosure provides a control method for a smart door lock.
  • the above control method is applied to a cloud platform.
  • the cloud platform has token generation and password negotiation functions, and sends the generated door lock control information to the smart door lock to avoid
  • the related technology is used to generate passwords on the cloud platform to minimize the risk of password leakage. It supplements the current mainstream smart door locks with fingerprint, iris, and fixed passwords and other unlocking methods, which greatly enriches smart door locks. Application scenarios.
  • the exemplary embodiment of the present disclosure provides a method for controlling a smart door lock, which is applied to a smart door lock, a cloud platform, a first terminal, and a second terminal.
  • the first terminal and the second terminal are smart terminals with communication functions, such as mobile phones and tablet computers, and the first terminal (tenant client) supports encryption algorithms and key management functions; the second terminal (landlord) The client) has the function of setting door lock information; both the first terminal and the second terminal can be connected to the cloud platform.
  • the cloud platform sends the door lock control information after receiving the door lock encryption key sent by the first terminal to generate the door lock control information based on the second terminal's control instruction for the smart door lock and the encryption method negotiated with the first terminal.
  • Lock the smart door.
  • the smart door lock determines, based on the door lock control information, that when the smart door lock is started, a door lock password is generated and locked using the door lock password.
  • the smart door lock uses an encryption key to encrypt the door lock password to generate an encrypted door lock password, and sends the encrypted door lock password to the first terminal.
  • the first terminal uses the decryption key to decrypt the encrypted door lock password, generates an unlock password, and then initiates an unlock request to the smart door lock.
  • the smart door lock feedbacks the unlocking result to the first terminal, thereby implementing end-to-end control of the smart door lock and the first terminal.
  • FIG. 7 is an interactive flowchart of a smart door lock control method based on the first exemplary embodiment according to the exemplary embodiment of the present disclosure.
  • the smart door The interaction process between the lock, the cloud platform, the first terminal, and the second terminal may include the following steps:
  • Step 701 The second terminal sends a control instruction for the smart door lock to the cloud platform.
  • Step 702 The cloud platform generates door lock control information according to the control instruction.
  • Step 703 The cloud platform sends door lock control information to the smart door lock.
  • Step 704 Based on the door lock control information, the smart door lock generates a door lock password when it is determined that the smart door lock is activated.
  • Step 705 The smart door lock is locked with a door lock password.
  • Step 706 The smart door lock sends a door lock password to the first terminal.
  • FIG. 8 is a second interactive flowchart of a method for controlling a smart door lock according to an exemplary embodiment of the present disclosure.
  • a smart door lock The interaction process between the cloud platform, the first terminal, and the second terminal may include the following steps:
  • Step 801 The second terminal selects the corresponding smart door lock and aging information and sends it to the cloud platform.
  • Step 802 The cloud platform and the first terminal negotiate an encryption algorithm and a key.
  • Step 803 The cloud platform and the smart door lock establish a connection and interaction.
  • Step 804 The smart door lock generates a door lock password, and sends the encrypted door lock password to the first terminal.
  • Step 805 The smart door lock updates the door lock password.
  • Step 806 The first terminal decrypts the encrypted door lock password to obtain an unlock password.
  • Step 807 The first terminal uses the unlock password to unlock.
  • the time-sensitive door lock password is set in the smart door lock, and the non-clear text password is exchanged between the smart door lock and the first terminal, thereby ensuring the security of the door lock password.
  • FIG. 9 is a third schematic diagram of an interactive flow of a smart door lock control method according to an exemplary embodiment of the present disclosure.
  • the interaction process between the smart door lock, the cloud platform, the first terminal and the second terminal may further include the following steps:
  • Step 901 The second terminal sends the operated smart door lock, the use time of the door lock and the customer information to the cloud platform.
  • the second terminal sends the operated smart door lock, unlocking time limit, and customer information to the cloud platform, where the customer information refers to the login information of the landlord client.
  • Step 902 The cloud platform establishes a connection with the first terminal.
  • Step 903 The first terminal sends an encryption algorithm and a door lock encryption key to the cloud platform.
  • Step 904 The cloud platform sends the door lock encryption key and Token to the designated smart door lock.
  • Step 905 Set the time limit of the smart door lock and generate a door lock password.
  • Step 906 The smart door lock uses the encryption key to encrypt the door lock password.
  • Step 907 The smart door lock message sends the encrypted door lock password to the first terminal.
  • Step 908 The first terminal decrypts the encrypted door lock password, obtains the unlock password, and sends it to the smart door lock.
  • Step 909 The smart door lock determines whether the unlock password is consistent with the door lock password.
  • Step 910 If the unlock password is consistent with the door lock password, the smart door lock performs unlocking.
  • the time-sensitive door lock password is set in the smart door lock, and the non-plaintext password is exchanged with the first terminal through a short message, thereby further ensuring the security of the door lock password.
  • the smart door lock includes an NB-IoT module, and the cloud platform supports the NB-IoT specification.
  • the system consisting of the smart door lock, cloud platform, first terminal, and second terminal is referred to as a smart door lock management system.
  • the following uses a smart door lock management system based on NB-IoT technology as an example to explain.
  • FIG. 10 is a schematic diagram 3 of an interaction flow of a smart door lock control method according to an exemplary embodiment of the present disclosure.
  • the smart door lock, cloud platform, and first terminal may include the following steps:
  • Step 1001 The second terminal sends a door lock control instruction to the cloud platform; the control instruction includes a door lock ID and a door lock use time limit.
  • Step 1002 The cloud platform generates a token according to a door lock control instruction.
  • Step 1003 The first terminal initiates a door lock control request to the cloud platform to establish a connection.
  • the first terminal initiating the door lock control request to the cloud platform refers to the tenant initiating the door lock control request to the cloud platform through the tenant client.
  • the tenant needs to register in the first terminal in advance to obtain the operation authority of the corresponding smart door lock.
  • Step 1004 The first terminal negotiates with the cloud platform using an asymmetric encryption algorithm.
  • Step 1005 Generate a public key and a private key in the first terminal.
  • Step 1006 The first terminal sends a public key and a token to the cloud platform.
  • Step 1007 The cloud platform sends the public key and the token to the smart door lock based on the NB-IoT network, and a heartbeat keep-alive mechanism is added between the cloud platform and the smart door lock.
  • Step 1008 The smart door lock decodes the Token, obtains the door lock age information, and sets the door lock age information into the smart door lock. At the same time, the smart door lock updates the door lock password.
  • time-sensitive token trigger the generation of the door lock password, and set the update of the door lock password to the smart door lock, thereby realizing the function of dynamically setting the smart door lock password.
  • the door lock age information set in the smart door lock is configured to limit the unlock age of the door lock password.
  • Step 1009 The smart door lock uses a public key to encrypt the door lock password to generate an encrypted door lock password.
  • Step 1010 Send the encrypted door lock password to the first terminal in the form of a short message through the SIM NB-IoT communication.
  • Step 1011 The first terminal uses the private key to decrypt the encrypted door lock password to obtain an unlock password.
  • Step 1012 The first terminal sends an unlock request carrying the unlock password to the smart door lock.
  • Step 1013 The smart door lock verifies the timeliness of the unlock password.
  • the smart door lock When receiving the unlock password, the smart door lock first determines whether the unlock password is within the time limit according to the unlock time limit in step 1008.
  • unlock password is not within the time limit, it means that the first terminal has no permission to use the smart door lock, and the unlock password is invalid.
  • the smart door lock feedbacks the aging reminder to the first terminal.
  • unlock password is within the time limit, it means that the first terminal is authorized to use the smart door lock, and the subsequent steps are continued.
  • Step 1014 The smart door lock verifies whether the unlock password matches the door lock password.
  • the user can put the mobile phone NFC into the sensing range of the door lock NFC module.
  • the smart door lock reads the door lock password accessed in the NFC of the mobile phone. If the reading is successful, the password verification is continued.
  • the smart door lock performs the unlock operation; otherwise, the smart door lock remains locked.
  • the smart door lock feedbacks the unlocked status of the successful unlocking or unlocking failure to the first terminal.
  • Exemplary embodiments of the present disclosure provide a smart door lock control method, which is applied to a smart door lock configured with an NB-IoT module, a cloud platform supporting the NB-IoT specification, and an encryption algorithm and First terminal for key management function.
  • 11 is a state diagram corresponding to a process in which a first terminal acquires a smart door lock unlock password in an exemplary embodiment of the present disclosure.
  • the time limit is input to the cloud platform through the second terminal (the landlord client).
  • the cloud platform generates door lock control information and negotiates the encryption algorithm with the first terminal. After receiving the public key of the first terminal, it will have the time limit
  • the sexual token and public key are sent to the smart door lock.
  • the smart door lock After receiving the public key and Token information, the smart door lock decodes the Token, sets the door lock password and the corresponding unlocking aging time in the smart door lock, and sends the encrypted door lock password to the first terminal in the form of a short message.
  • the exemplary embodiment of the present disclosure uses the NB-IoT technology to reduce the transfer point of network information transfer.
  • the exemplary embodiment of the present disclosure uses a dynamic one-way setting of a non-plaintext password by a smart door lock, and uses an asymmetric encryption algorithm. Encryption, which minimizes the risk of password leakage, supplements the current mainstream smart door locks with fingerprint, iris, and fixed password unlocking methods, which greatly enriches the application scenarios of smart door locks.
  • FIG. 12 is a schematic structural diagram of a smart door lock according to an exemplary embodiment of the present disclosure.
  • the smart door lock 0 proposed by the present disclosure may include a first processor 01,
  • the first processor 01 can execute a first memory 02, a first communication interface 03, and a first bus 04 of an instruction.
  • the first bus 04 is configured to connect the first process 01, the first memory 02, and the first communication interface 03.
  • the first processor 01 is configured to execute a smart door lock control program stored in a memory to implement the following steps:
  • the first processor 01 is further specifically configured to: when the door lock control information includes the door lock aging information, after generating the door lock password, set the door according to the door lock aging information. The unlocking period corresponding to the lock password.
  • the first processor 01 is further specifically configured to: when the door lock control information includes a door lock encryption key, after generating the door lock password, use the door lock encryption key to encrypt the door lock password to generate an encrypted door lock.
  • the password is sent to the first terminal.
  • the first processor 01 is further configured to send a door lock password or an encrypted door lock password to the first terminal through a short message.
  • the above-mentioned first processor 01 is further specifically configured to determine whether the unlock password is within the unlocking aging range; if it is not within the unlocking aging range, a feedback aging alert is provided to the first terminal, At the same time, the smart door lock remains locked.
  • the above-mentioned first processor 01 is further specifically configured to receive an unlock request from the first terminal, and determine whether the unlock password carried in the unlock request matches the door lock password.
  • the above-mentioned first processor 01 is further specifically configured to feedback an unlocking state to the first terminal according to a matching result of the unlocking password and the door lock password carried in the unlocking request.
  • the above-mentioned first processor 01 is further specifically configured to add a heartbeat keep-alive mechanism to update the door lock control information in time when receiving the door lock control information sent by the cloud platform.
  • the first processor 01 may be an application specific integrated circuit (ASIC), a digital signal processor (DSP), or a digital signal processing device (digital signal processor). At least one of Processing Device (DSPD), Programmable Logic Device (ProgRAMmable, Logic Device, PLD), Field Programmable Gate Array (Field, ProgRAMmable, GateArray, FPGA), CPU, controller, microcontroller, and microprocessor. It can be understood that, for different devices, the electronic devices used to implement the processor functions may also be other types of devices, which are not specifically limited in the exemplary embodiments of the present disclosure.
  • the smart door lock 0 may further include a first memory 02, which may be connected to the first processor 01.
  • the first memory 02 is configured to store a smart door lock control program code, and the program code includes a computer operation instruction.
  • the first memory 02 may include a high-speed RAM memory, and may also include a non-volatile memory, for example, at least two disk memories.
  • the first memory 02 may be a volatile first memory (volatile memory), such as a random-access first memory (Random-Access Memory, RAM); or a non-volatile first memory (non- volatile memory, such as Read-Only Memory (ROM), Flash Memow, Hard Disk Drive (HDD), or Solid-State Drive (SSD); or A combination of the above-mentioned first memories, and provides instructions and data to the first processor 01.
  • volatile memory volatile memory
  • RAM random-access first memory
  • non- volatile memory such as Read-Only Memory (ROM), Flash Memow, Hard Disk Drive (HDD), or Solid-State Drive (SSD)
  • ROM Read-Only Memory
  • HDD Hard Disk Drive
  • SSD Solid-State Drive
  • the functional modules in this exemplary embodiment may be integrated in one processing unit, or each unit may exist separately physically, or two or more units may be integrated in one unit.
  • the above integrated unit may be implemented in the form of hardware or in the form of software functional modules.
  • the integrated unit is implemented in the form of a software functional module and is not sold or used as an independent product, it may be stored in a computer-readable storage medium.
  • the technical solution of this exemplary embodiment is essentially or It is said that the part that contributes to the related technology or all or part of the technical solution can be embodied in the form of a software product.
  • the computer software product is stored in a storage medium and includes several instructions to make a computer device (which can be A personal computer, server, or network device, etc.) or processor executes all or part of the steps of the method of the exemplary embodiment.
  • the foregoing storage media include: U disks, mobile hard disks, read-only memory (ROM), random access memory (RAM), magnetic disks, or optical disks, which can store program codes.
  • An exemplary embodiment of the present disclosure provides a smart door lock that receives door lock control information sent by a cloud platform, and the door lock control information is configured to control the use right of the smart door lock; based on the door lock control information, determine the smart When the door lock is started, a door lock password is generated; the door lock password is used for locking; and the door lock password is sent to the first terminal. That is, a smart door lock control method provided by an exemplary embodiment of the present disclosure generates a password in the smart door lock according to the control information sent by the cloud platform, and sends the password to the first terminal through the smart door lock.
  • the smart door lock sends a time-sensitive encrypted door lock password to the terminal, which enables the smart door lock to dynamically set a non-plaintext password in one direction, thereby minimizing the risk of password leakage. It supplements the security aspects of the current mainstream smart door locks with fingerprints, irises, and fixed passwords, which greatly enriches the application scenarios of smart door locks.
  • the exemplary embodiment of the present disclosure provides a first computer-readable storage medium on which a smart door lock control program is stored, which is applied to the smart door lock, and when the program is executed by a processor, the method in the first exemplary embodiment is implemented.
  • FIG. 13 is a schematic structural diagram of a first terminal according to an exemplary embodiment of the present disclosure.
  • the first terminal provided by the exemplary embodiment of the present disclosure may include: A second processor 11, a second memory 12 storing executable instructions of the second processor 11, a second communication interface 13, and a second bus 14, and the second bus 14 is configured to be connected to the second processor 11 and the second memory 12 And second communication interface 13.
  • the second processor 11 is configured to execute a smart door lock control program stored in a memory to implement the following steps:
  • the door lock decryption key is used to decrypt the encrypted door lock password to generate an unlock password.
  • the above-mentioned second processor 11 is further specifically configured to receive the encrypted door lock password sent by the smart door lock in the form of a short message.
  • the second processor 11 is further specifically configured to send an unlock request to the smart door lock, the unlock request carrying an unlock password; receiving an unlock result fed back by the smart door lock; Results include aging reminders or unlocked status.
  • the first terminal may further include an NFC module 15 for sending an unlock request to the smart door lock through near field communication.
  • the above-mentioned second processor 11 may be a special-purpose integrated circuit, a digital signal processor, a digital signal processing device, a programmable logic device, a field programmable gate array, a CPU, a controller, a microcomputer At least one of a controller and a microprocessor. It can be understood that, for different devices, the electronic device for implementing the processor function may be other devices, which are not specifically limited in the exemplary embodiments of the present disclosure.
  • the terminal 1 may further include a second memory 12, which may be connected to the second processor 11, wherein the second memory 12 is configured to store a smart door lock control program code, where the program code includes a computer operation instruction, the first
  • the second memory 12 may include a high-speed RAM memory, and may also include a non-volatile memory, for example, at least two disk memories.
  • the second memory 12 may be a volatile second memory, such as a random access second memory; or a non-volatile second memory, such as a read-only second memory, a flash second memory, and a hard disk. Or a solid state hard disk; or a combination of the above-mentioned types of second memories, and provides instructions and data to the second processor 11.
  • a volatile second memory such as a random access second memory
  • a non-volatile second memory such as a read-only second memory, a flash second memory, and a hard disk.
  • a solid state hard disk or a combination of the above-mentioned types of second memories, and provides instructions and data to the second processor 11.
  • the functional modules in this exemplary embodiment may be integrated in one processing unit, or each unit may exist separately physically, or two or more units may be integrated in one unit.
  • the above integrated unit may be implemented in the form of hardware or in the form of software functional modules.
  • the integrated unit is implemented in the form of a software functional module and is not sold or used as an independent product, it may be stored in a computer-readable storage medium.
  • the technical solution of this exemplary embodiment is essentially or It is said that a part that contributes to the existing technology or all or part of the technical solution can be embodied in the form of a software product.
  • the computer software product is stored in a storage medium and includes several instructions for making a computer device (can It is a personal computer, a server, or a network device, etc.) or a processor that executes all or part of the steps of the method of the exemplary embodiment.
  • the foregoing storage medium includes various media that can store program codes, such as a U disk, a mobile hard disk, a read-only memory, a random access memory, a magnetic disk, or an optical disk.
  • An exemplary embodiment of the present disclosure provides a terminal that negotiates an encryption method with a cloud platform to generate a key; wherein the key includes a door lock encryption key and a door lock decryption key; and sends the door lock encryption key to Cloud platform; receiving the encrypted door lock password sent by the smart door lock; wherein the encrypted door lock password is generated by encrypting the door lock password with the door lock encryption key in the smart door lock; using the door lock decryption key to decrypt the encrypted door Lock password to generate unlock password.
  • a smart door lock control method utilizes encryption processing and key management functions of the first terminal; sets a password generated by the smart door lock to a non-plaintext password, thereby maximizing The risk of password leakage is reduced to a limited extent, and the current mainstream smart door locks use fingerprints, irises, and fixed passwords to unlock the way to supplement security aspects, which greatly enriches the application scenarios of smart door locks.
  • An exemplary embodiment of the present disclosure provides a second computer-readable storage medium on which a smart door lock control program is stored, which is applied to a terminal, and when the program is executed by a processor, implements the method in the second exemplary embodiment.
  • FIG. 14 is a schematic structural diagram of a cloud platform according to the exemplary embodiment of the present disclosure.
  • the cloud platform proposed by the exemplary embodiment may include a third processor 21, a third memory 22 that stores executable instructions of the third processor 21, and a third bus 23, and the third bus 23 is configured to connect the third processor 21, Third memory 22.
  • the third processor 21 is configured to execute a smart door lock control program stored in a memory to implement the following steps:
  • the third processor 21 is further specifically configured to generate door lock age information according to the control instruction of the second terminal, and use the door lock age information and the door lock encryption key as Door lock control information.
  • the third processor 22 is further specifically configured to use a heartbeat keep-alive mechanism to send door lock control information to the smart door lock.
  • the third processor 21 may be a special-purpose integrated circuit, a digital signal processor, a digital signal processing device, a programmable logic device, a field programmable gate array, a CPU, a controller, a microcomputer At least one of a controller and a microprocessor. It can be understood that, for different devices, the electronic device for implementing the processor function may be other devices, which are not specifically limited in the exemplary embodiments of the present disclosure.
  • the cloud platform 2 may further include a third memory 22, which may be connected to the third processor 21.
  • the third memory 22 is configured to store a smart door lock control program code, and the program code includes a computer operation instruction.
  • the third memory 22 may include a high-speed RAM memory, and may also include a non-volatile memory, for example, at least two disk memories.
  • the third memory 22 may be a volatile third memory, such as a random access third memory; or a non-volatile third memory, such as a read-only third memory, a flash third memory, and a hard disk. Or a solid state hard disk; or a combination of the above-mentioned third memories, and provides instructions and data to the third processor 21.
  • a volatile third memory such as a random access third memory
  • a non-volatile third memory such as a read-only third memory, a flash third memory, and a hard disk.
  • a solid state hard disk or a combination of the above-mentioned third memories, and provides instructions and data to the third processor 21.
  • the functional modules in this exemplary embodiment may be integrated in one processing unit, or each unit may exist separately physically, or two or more units may be integrated in one unit.
  • the above integrated unit may be implemented in the form of hardware or in the form of software functional modules.
  • the integrated unit is implemented in the form of a software functional module and is not sold or used as an independent product, it may be stored in a computer-readable storage medium.
  • the technical solution of this exemplary embodiment is essentially or It is said that a part that contributes to the existing technology or all or part of the technical solution can be embodied in the form of a software product.
  • the computer software product is stored in a storage medium and includes several instructions for making a computer device (can It is a personal computer, a server, or a network device, etc.) or a processor that executes all or part of the steps of the method of the exemplary embodiment.
  • the foregoing storage medium includes various media that can store program codes, such as a U disk, a mobile hard disk, a read-only memory, a random access memory, a magnetic disk, or an optical disk.
  • An exemplary embodiment of the present disclosure provides a cloud platform that receives a control instruction of a smart door lock by a second terminal; negotiates an encryption method with the first terminal to obtain a door lock encryption key; and according to the control instruction and the door lock encryption Key to generate door lock control information; send the door lock control information to the smart door lock. That is, a smart door lock control method provided by an exemplary embodiment of the present disclosure.
  • the cloud platform has functions of token generation and password negotiation, and sends the generated door lock control information to the smart door lock, avoiding the existing technology.
  • China Cloud generates passwords on the cloud platform to minimize the risk of password leakage. It supplements the current mainstream smart door locks with fingerprint, iris, and fixed password unlocking methods, which greatly enriches the application scenarios of smart door locks.
  • An exemplary embodiment of the present disclosure provides a third computer-readable storage medium on which a smart door lock control program is stored, which is applied to a cloud platform, and when the program is executed by a processor, implements the method in the third exemplary embodiment.
  • the exemplary embodiments of the present disclosure may be a method, a system, or a computer program product. Therefore, the present disclosure may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Moreover, the present disclosure may take the form of a computer program product implemented on one or more computer-usable storage media (including, but not limited to, magnetic disk storage, optical storage, and the like) containing computer-usable program code therein.
  • computer-usable storage media including, but not limited to, magnetic disk storage, optical storage, and the like
  • These computer program instructions may be provided to a processor of a general-purpose computer, special-purpose computer, embedded processor, or other programmable data processing device to produce a machine, so that the instructions generated by the processor of the computer or other programmable data processing device are used to generate instructions Means for implementing functions specified in one or more processes in the schematic diagram of the process and / or one or more blocks in the block diagram.
  • These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing device to work in a particular manner such that the instructions stored in the computer-readable memory produce a manufactured article including an instruction device, the instructions
  • the device implements the functions specified in one or more processes in the implementation flow diagram and / or in one or more blocks in the block diagram.
  • These computer program instructions can also be loaded on a computer or other programmable data processing device, so that a series of steps can be performed on the computer or other programmable device to produce a computer-implemented process, which can be executed on the computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in implementing one or more of the processes in the flow diagram and / or one or more of the blocks in the block diagram.

Abstract

本公开提供了一种智能门锁控制方法,其应用于智能门锁,所述智能门锁分别与云平台,以及第一终端进行通信,该方法包括:接收所述云平台发送的门锁控制信息,所述门锁控制信息构造为控制智能门锁的使用权限;基于所述门锁控制信息,确定所述智能门锁启动时,生成门锁密码;采用所述门锁密码进行锁定;以及发送所述门锁密码给所述第一终端。本公开还提供了一种智能门锁控制设备及存储介质。

Description

智能门锁的控制方法、设备及存储介质 技术领域
本公开涉及智能门锁领域,并且具体涉及一种智能门锁的控制方法、设备及存储介质。
背景技术
传统门锁易损坏、无远程开锁功能,安全性和效率都难以保证。基于此,现在市面上出现了可远程操作的智能门锁。可远程操作的智能门锁,可解决房东的效率问题,但需要依靠基于IEEE802.15.4标准的低功耗局域网协议Zigbee和无线协议(Wireless-Fidelity,Wi-Fi)等协议来传输数据,这种方式需要专用的终端物联网网关,网关通过网络通讯协议(Transmission Control Protocol/Internet Protocol,TCP/IP)来传输数据。此过程中转过程多,容易造成数据的泄露。
发明内容
根据本公开的一个方面,提供一种智能门锁的控制方法,其应用于智能门锁,所述智能门锁分别与云平台,以及第一终端进行通信,所述方法包括:接收所述云平台发送的门锁控制信息,所述门锁控制信息构造为控制所述智能门锁的使用权限;基于所述门锁控制信息,确定所述智能门锁启动时,生成门锁密码;采用所述门锁密码进行锁定;以及发送所述门锁密码给所述第一终端。
根据本公开的另一个方面,提供一种智能门锁的控制方法,其应用于第一终端,所述第一终端分别与云平台,以及智能门锁进行通信,所述方法包括:与所述云平台协商加密方法,生成密钥;其中,所述密钥包括门锁加密密钥和门锁解密密钥;发送所述门锁加密密钥给所述云平台;接收所述智能门锁发送的加密门锁密码,其中,所述加密门锁密码通过所述智能门锁采用所述门锁加密密钥对门锁密码加密而生成;以及采用所述门锁解密密钥解密所述加密门锁密码,生成解锁密码。
根据本公开的又一个方面,提供一种智能门锁的控制方法,其应用于云平台,所述云平台分别与第一终端、第二终端以及智能门锁进行通信,所述方法包括:接收所述第二终端对所述智能门锁的控制指示;与所述第一终端协商加密方法,接收所述第一终端发送的门锁加密密钥;根据所述控制指示和所述门锁加密密钥,生成门锁控制信息;以及发送所述门锁控制信息给所述智能门锁。
根据本公开的又一个方面,提供一种智能门锁,包括第一处理器、第一存储器、第一通信接口和第一总线,所述第一总线构造为连接所述第一处理器、所述第一存储器以及所述第一通信接口,所述第一处理器构造为执行所述第一存储器中存储的智能门锁控制程序,以实现上述方法。
根据本公开的又一个方面,提供一种终端,包括第二处理器、第二存储器、第二通信接口和第二总线,所述第二总线构造为连接所述第二处理器、第二总线第二存储器以及第二总线第二通信接口,所述第二处理器构造为执行所述第二存储器中存储的智能门锁控制程序,以实现上述方法。
根据本公开的又一个方面,提供一种云平台,包括第三处理器、第三存储器和第三总线,所述第三总线构造为连接所述第三处理器、第三存储器,所述第三处理器构造为执行所述第三存储器中存储的智能门锁控制程序,以实现上述方法。
根据本公开的又一个方面,提供一种计算机可读存储介质,其上存储有智能门锁控制程序,应用于智能门锁中,所述智能门锁控制程序被第一处理器执行时实现上述方法;或者,应用于终端中,所述智能门锁控制程序被第二处理器执行时实现上述方法;或者,应用于云平台中,所述智能门锁控制程序被第三处理器执行时实现上述方法。
附图说明
图1为根据本公开示例性实施例的智能门锁控制系统结构图;
图2-1为根据本公开示例性实施例的一种智能门锁控制方法的实现流程示意图一;
图2-2为根据本公开示例性实施例的一种智能门锁控制方法的实现流程示意图二;
图2-3为根据本公开示例性实施例的一种智能门锁控制方法的实现流程示意图三;
图3为根据本公开示例性实施例的智能门锁管理系统的拓扑结构图;
图4为根据本公开示例性实施例的集成了NB-IoT模组的智能门锁系统结构图;
图5-1为根据本公开示例性实施例的一种智能门锁控制方法实现流程示意图一;
图5-2为根据本公开示例性实施例的一种智能门锁控制方法实现流程示意图二;
图6为根据本公开示例性实施例的一种智能门锁控制方法实现流程示意图;
图7为根据本公开示例性实施例的一种智能门锁控制方法的交互流程图一;
图8为根据本公开示例性实施例的一种智能门锁控制方法的交互流程图二;
图9为根据本公开示例性实施例的一种智能门锁控制方法的交互流程图三;
图10为根据本公开示例性实施例的一种智能门锁控制方法的交互流程图四;
图11为根据本公开示例性实施例的智能门锁密码获取过程的状态图;
图12为根据本公开示例性实施例的智能门锁的组成结构示意图;
图13为根据本公开示例性实施例的终端的组成结构示意图;以及
图14为根据本公开示例性实施例的云平台的组成结构示意图。
具体实施方式
为使本公开示例性实施例的目的、技术方案和优点更加清楚,下面将结合本公开实施例中的附图,对公开的具体技术方案做进一步详细描述。以下实施例用于说明本公开,但不用来限制本公开的范围。
图1为根据本公开示例性实施例的智能门锁控制系统结构图,如图1所示,本公开提出的智能门锁控制系统可以包括第一终端、第二终端、云平台以及智能门锁。在本公开示例性实施例中,所述第一终端可以理解为租客操作的终端,所述第二终端可以理解为房东操作的终端,上述第一终端和第二终端可以为具 有无线通信功能的智能终端,例如手机、平板电脑。基于上述图1,云平台先与第二终端相互通信,接收第二终端对智能门锁的控制指示,根据控制指示生成门锁控制信息并发送给智能门锁;智能门锁根据接收到的门锁控制信息生成门锁密码,并将门锁密码发送给第一终端。由此可见,智能门锁可以根据云平台发送的门锁控制信息生成密码,并将密码转发给第一终端,避免了通过云平台来转发门锁密码至智能门锁和第一终端的复杂过程,减少了密码传输中转过程,实现了端到端的传输。此外,通过在智能门锁中生成门锁密码,有效地提高了智能门锁远程控制的安全性。
在本公开示例性实施例中,智能门锁的控制设备可以为第一终端、第二终端、云平台以及智能门锁。
下面将结合附图,对本公开示例性实施例中的技术方案进行清楚、完整地描述。
示例性实施例一
本公开示例性实施例提供了一种智能门锁的控制方法,其应用于智能门锁,智能门锁分别与云平台,以及第一终端进行通信。图2-1为根据本公开示例性实施例的一种智能门锁控制方法的实现流程示意图一,如图2-1所示,在本公开的示例性实施例中,智能门锁的控制方法可以包括以下步骤:
步骤201、接收云平台发送的门锁控制信息,门锁控制信息构造为控制智能门锁的使用权限。
在本公开示例性实施例中,智能门锁分别与云平台、第一终端进行通信,实现信息交互。这里,在云平台基于与租客客户端(第一终端)和房东客户端(第二终端)进行信息交互,得到用于控制智能门锁的使用权限的门锁控制信息后,该云平台就可以发送门锁控制信息给智能门锁,供该智能门锁基于该门锁控制信息进行门锁控制了。
需要说明的是,随着万物互联时代的到来,物联网的概念在全球范围内迅速被认可,并成为新一轮科技革命和产业革命的核心驱动力,巨大的应用市场推动全球范围内广域网连接技术出现爆发式增长。运营商为了更好的支撑物联网发展,不断优化网络能力。运营商通过核心网侧部署物联网专用设备,以及在业务侧建立独立的物联网管理和应用平台,提供面向物联网的连接服务能力。 众多运营商都已加速布局基于蜂窝的窄带物联网(Narrow Band Internet of Things,NB-IoT)技术。
为了提升智能门锁的安全和效率,本公开示例性实施例基于在智能门锁中安装NB模组,提出了一种利用NB-IoT技术低功耗、穿透强的特性,进行安全可靠的智能门锁密码控制的方法。
需要说明的是,可以实现本公开示例性实施例的其他通信方式也可被使用,本公开不作限制。
下面以NB-IoT技术为例,进行说明。
图3为根据本公开示例性实施例的智能门锁管理系统的拓扑结构图,如图3所示,本公开示例性实施例提出的智能门锁管理系统可以包括云平台,其支持NB-IoT规范,基于NB-IoT技术的云平台通过移动核心网与外部互联网互连,以此实现第一终端、第二终端和云平台的通信。进一步地,智能门锁管理系统还包括基站和集成有NB模组的智能门锁,其中,基站构造为实现云平台和智能门锁的通信;智能门锁具有基本的密码开锁功能,密码可以动态被更新,且智能门锁可以和第一终端进行无线通信。
需要说明的是,在本公开的示例性实施例中,智能门锁和云平台基于NB-IoT网络进行通信,智能门锁接收云平台通过NB-IoT网络发送的门锁控制信息,以实现对智能门锁使用权限的控制。利用NB-IoT技术,减少了网络信息传递的中转点,实现了端到端的传输。
进一步地,智能门锁在接收云平台发送的门锁控制信息时,为保证云平台和智能门锁之间状态的一致性,智能门锁可以采用心跳保活机制接收所述云平台发送的门锁控制信息。具体地,智能门锁定时给云平台发送一个数据包(心跳包),告知云平台智能门锁自身处于连接状态,以此来确保智能门锁和云平台连接的有效性。
步骤202、基于门锁控制信息,确定智能门锁启动时,生成门锁密码。
在本公开的示例性实施例中,基于智能门锁和云平台的连接,智能门锁在接收到云平台发送的门锁控制信息后,根据门锁控制信息生成门锁密码。
需要说明的是,在本公开示例性实施例中,智能门锁根据云平台发送的门锁控制信息对应生成门锁密码,即当云平台发送的门锁控制信息不变时,门锁 密码也不会改变;当云平台发送的门锁控制信息改变时,门锁密码也随之改变。
步骤203、采用门锁密码进行锁定。
在本公开示例性实施例中,智能门锁在生成门锁密码之后,会将门锁密码更新设置到智能门锁中,以实现对智能门锁的锁定。
需要说明的是,在本公开示例性实施例中,第二终端通过云平台发送控制信息给智能门锁,使得第二终端能远程控制智能门锁,这提升了智能门锁控制的便利性。
步骤204、发送门锁密码给第一终端。
在本公开示例性实施例中,智能门锁在更新门锁密码之后,将门锁密码发送给第一终端,由此避开了云平台管理密码,实现了智能门锁对第一终端的直接控制。
需要说明的是,智能门锁在发送门锁密码给第一终端时,可基于无线网络协议发送,也可以是通过短消息发送来加强数据传输的安全性。进一步地,在本公开示例性实施例中,可以采用NB-IoT智能密码锁中的NB模组,将门锁密码基于SIM NB-IoT通信以短消息的形式发送到第一终端。
需要说明的是,在通过SIM NB-IoT进行发送时,为避免信号屏蔽,在设计智能门锁和NB-IoT通信模组集成时,可以安装天线以加强信号的传递。
本公开示例性实施例提供了一种智能门锁的控制方法,其应用于智能门锁中,智能门锁根据云平台发送的控制信息,在智能门锁中生成密码,并通过智能门锁将密码发给第一终端,避免了通过云平台来转发门锁密码至智能门锁和第一终端的复杂过程,减少了密码传输中转,实现了端到端的传输,且通过在智能门锁中生成门锁密码,有效地提高了智能门锁远程控制的安全性。
进一步地,如图2-2所示,图2-2为根据本公开示例性实施例的一种智能门锁控制方法的实现流程示意图二,在步骤202之后,本公开示例性实施例提供的一种智能门锁控制方法还包括步骤202A;以及,在步骤203之后且在步骤204之前,本公开示例性实施例提供的一种智能门锁控制方法还包括步骤203A。
步骤202A、根据门锁时效信息,设置门锁密码对应的解锁时效。
在本公开示例性实施例中,智能门锁在接收到云平台发送的门锁控制信息后,会基于门锁控制信息,在确定智能门锁启动时,生成门锁密码。
在本公开示例性实施例中,门锁控制信息可以包括:门锁时效信息。智能门锁在收到带有门锁时效信息的门锁控制信息后,会将门锁时效信息设置到智能门锁中,以此来设置与门锁密码对应的解锁时效。
需要说明的是,在本公开的示例性实施例中,门锁时效信息构造为控制第一终端对智能门锁的使用时限,门锁时效信息的格式在本公开中不做具体限制。具体地,门锁时效信息可以以时间戳和使用时长的形式存在,如时间戳信息为2018年6月1日,使用时长为二年;或者门锁时效信息以具体使用时间段形式存在,如2018年6月1日至2020年6月1日。
进一步地,在本公开示例性实施例中,云平台发送的门锁控制信息中的门锁时效信息,可以通过令牌Token的方式发送。Token更通俗点的解释可以称之为暗号,在一些数据传输之前,要先进行暗号的核对,不同的暗号被授权不同的数据操作。因此,智能门锁在获取Token后,需要先对其进行解码,以获取门锁时效信息。智能门锁在解码获得门锁时效信息后,设置门锁密码对应的解锁时效,从而实现智能门锁密码的动态管理。
步骤203A、采用门锁加密密钥对门锁密码进行加密,得到加密门锁密码。
在本公开示例性实施例中,智能门锁采用门锁密码锁定后,对门锁密码进行加密获取加密门锁密码。具体地,智能门锁在接收云平台发送的门锁控制信息中可以包括:门锁加密密钥。智能门锁利用门锁加密密钥对智能门锁进行加密得到加密门锁密码。
进一步地,在本公开的示例性实施例中,智能门锁和云平台可以基于NB-IoT网络进行通信连接。需要说明的是,加密门锁密码的生成依赖云平台和智能门锁间的通信,NB-IoT网络虽然有一定的时延,但考虑到设定密码过程对实时性要求并不高,所以不会影响用户体验。
在本公开示例性实施例中,基于步骤203A的实现,步骤204的过程可以为智能门锁发送加密门锁密码给第一终端。进一步地,可以采用NB-IoT智能密码锁中的NB模组,将加密门锁密码基于SIM NB-IoT通信以短消息的形式发送到第一终端。
图4为根据本公开示例性实施例的集成了NB模组的智能门锁系统结构图,在本公开示例性实施例中,如图4所示,NB模组和智能门锁集成到一起,可 进行信息交互。NB-IoT智能密码锁由三部分构成,包括:锁体部分、密码模块、NB模组。云平台包括:Token管理模块和密钥管理模块。第二终端(房东客户端),具备门锁及时效选择功能。通过在第二终端上选择门锁身份标识(Identity,ID)进行时效设置,云平台的Token管理模块生成Token,并将生成的Token和密钥管理模块收到的门锁加密密钥作为门锁控制信息通过NB-IoT网络一起发送给智能门锁,智能门锁在收到门锁控制信息后,解码Token,获取门锁时效信息,并更新门锁密码至密码模块,同时智能门锁采用加密密钥加密门锁密码并发送加密后的加密门锁密码给第一终端,由此完成图2-2的步骤201-204中的具有时效性的门锁密码设置以及非明文密码的发送。
可以理解的是,在本公开示例性实施例中,智能门锁发送带有时效性的加密门锁密码给终端,能实现智能门锁动态单向设置非明文密码,从而在最大限度上降低密码泄露风险。对目前主流智能门锁采用指纹、虹膜以及固定密码等开锁方式进行了安全方面的补充,极大丰富了智能门锁的应用场景。
进一步地,如图2-3所示,图2-3为根据本公开示例性实施例的一种智能门锁控制方法的实现流程示意图三,在步骤204之后,本公开示例性实施例提供的一种智能门锁控制方法还可以包括步骤205-209,如下:
步骤205、接收第一终端发送的解锁请求,解锁请求中携带有解锁密码。
在本公开示例性实施例中,在智能门锁发送门锁密码给第一终端后,智能门锁会收到第一终端携带有解锁密码的解锁请求。
需要说明的是,在本公开示例性实施例中,智能门锁接收第一终端的解锁请求的方式可以包括:接收第一终端,即租客客户端发送的解锁请求;或接收第一终端通过近场通信(Near Field Communication,NFC)方式发送的解锁请求;或接收第一终端蓝牙芯片发送的解锁请求。
进一步地,当智能门锁给第一终端发送的是加密门锁密码时,智能门锁需要先对加密门锁密码进行解密来获得解锁密码。其中,解密过程在第一终端中完成,通过采用与加密密钥对应的解密密钥对加密门锁解密获得解锁密码。
步骤206、当解锁密码在解锁时效内时,利用解锁密码进行解锁。
在本公开示例性实施例中,智能门锁在收到第一终端的解锁密码请求后,先判断解锁密码是否在解锁时效内,当解锁密码在解锁时效内时,才利用解锁 密码进行解锁。
具体地,判断解锁密码是否在时效内,是根据智能门锁收到解锁密码请求的当前时间来判断解锁密码是否在解锁时效内。其中,智能门锁收到解锁密码的当前时间可以是解锁请求中携带的时间戳,也可以是智能门锁中记录的当前时间。
示例性的,智能门锁收到解锁密码请求的当前时间是2017年2月1号,而如步骤202A中设置的解锁时效是2016年6月1号至2018年6月1号,则解锁密码在解锁时效内。
具体地,当解锁密码在解锁时效内时,智能门锁利用解锁密码进行解锁的具体解锁过程是:智能门锁判断解锁密码是否与门锁密码一致,当一致时,智能门锁解锁成功;当解锁密码与门锁密码不一致时,解锁失败,智能门锁保持锁定。
步骤207、反馈智能门锁的解锁状态给第一终端;其中解锁状态包括解锁成功或解锁失败。
在本公开示例性实施例中,当解锁密码在解锁时效内时,利用解锁密码进行解锁。智能门锁匹配解锁密码与门锁密码是否一致,并将解锁状态反馈给第一终端。通过状态反馈,方便第一终端即时掌握解锁请求状态。
步骤208、当解锁密码未在解锁时效内时,保持锁定。
在本公开示例性实施例中,智能门锁在收到第一终端的解锁密码请求后,先判断解锁密码是否在解锁时效内,当解锁密码不在解锁时效内时,智能门锁保持锁定。其中,智能门锁收到解锁密码的当前时间可以是解锁请求中携带的时间戳,也可以是智能门锁中记录的当前时间。
具体地,如智能门锁记录收到解锁密码请求的当前时间是2023年2月1号,而如步骤202A中设置的解锁时效信息中,时间戳信息为2018年6月1日,使用时长为二年,则解锁密码不再解锁时效内。
需要说明的是,在本公开示例性实施例中,当解锁密码不在解锁时效内时,解密密码失效,智能门锁保持锁定。
步骤209、发送时效提醒给第一终端。
本公开示例性实施例中,当智能门锁判断出解锁密码不在解锁时效内后, 智能门锁向第一终端反馈时效提醒。
进一步地,在本公开示例性实施例中,时效提醒可以是基于SIM NB-IoT通信以短消息的形式发送,也可以是基于无线通信来发送。通过时效提醒,方便第一终端即时获知当前的租赁状态。
可以理解的是,在本公开示例性实施例中,通过智能门锁反馈解锁结果给第一终端,提高了智能门锁的管理效率。
示例性实施例二
本公开示例性实施例还提供了一种智能门锁的控制方法,其应用于第一终端,所述第一终端分别与云平台,以及智能门锁进行通信。图5-1为根据本公开示例性实施例的一种智能门锁控制方法实现流程示意图一,如图5-1所示,在本公开的示例性实施例中,终端实现门锁控制的方法可以包括以下步骤:
步骤301、与云平台协商加密方法,生成密钥;其中,密钥包括门锁加密密钥和门锁解密密钥。
在本公开示例性实施例中,第一终端分别与云平台、智能门锁进行通信,实现信息交互。这里,第一终端在与云平台进行信息交互后,通过云平台生成门锁控制信息并发送给智能门锁,使得智能门锁和第一终端可以直接通信,实现端到端的传输。
需要说明的是,在本公开的示例性实施例中,第一终端支持加密算法和密钥管理功能,第一终端在与云平台建立连接后,与云平台协商加密方法,并在第一终端中生成密钥。
具体地,第一终端和云平台可以协商采用非对称加密算法或对称加密算法。其中,非对称加密算法是在加密和解密过程中采用不同的密钥,包括公开密钥(publickey)和私有密钥(privatekey)。公开密钥与私有密钥是一对,如果用公开密钥对数据进行加密,只有用对应的私有密钥才能解密;如果用私有密钥对数据进行加密,那么只有用对应的公开密钥才能解密。采用对称加密算法时,公钥和私钥为同一个密钥。需要说明的是,本公开示例性实施例中,非对称加密算法和对称加密算法为常规算法,本公开不再赘述。
进一步地,在本公开示例性实施例中,因非对称加密体系不要求通信双方事先传递密钥或有任何约定就能完成保密通信,并且密钥管理方便,可实现防 止假冒和抵赖,适合网络通信中的保密通信要求。相对于对称加密算法,其安全性能更优。因此,在本公开示例性实施例中,第一终端与云平台协商采用非对称加密算法生成对应的公钥和私钥。
步骤302、发送门锁加密密钥给云平台。
在本公开示例性实施例中,第一终端在与云平台协商生成密钥后,基于无线通信的方式将门锁加密密钥发送给云平台。云平台在收到加密密钥后,将门锁加密密钥再转发给智能门锁,以此实现第一终端和智能门锁的对接。
步骤303、接收智能门锁发送的加密门锁密码;其中,加密门锁密码通过智能门锁采用门锁加密密钥对门锁密码加密而生成。
本公开示例性实施例中,在云平台转发门锁加密密钥给智能门锁后,智能门锁采用加密密钥对门锁密码加密,并将加密门锁密码发送给第一终端,实现了智能门锁对第一终端的控制。
进一步地,在本公开示例性实施例中,第一终端接收智能门锁发送的加密门锁密码通过密第一终端与云平台协商采用非对称加密算法生成的公钥加密而获得。
进一步地,在智能门锁支持NB-IoT通信时,第一终端可以通过短消息接收智能门锁通过SIM NB-IoT发送的加密门锁密码。
步骤304、采用门锁解密密钥解密加密门锁密码,生成解锁密码。
在本公开示例性实施例中,第一终端采用与云平台协商的加密算法生成的解密密钥解密加密门锁密码而获得解锁密码。
需要说明的是,本公开示例性实施例中,第一终端在解密加密门锁密码之前,可以先对第一终端的登录信息进行校验,以判断第一终端的使用权限。所述校验,可以采用如用户账号名、密码校验、手机号校验等常规方法,本公开示例性实施例不再赘述。
进一步地,在本公开示例性实施例中,第一终端可以采用非对称加密算法生成的私钥解密获得解锁密码。
示例性的,在本公开示例性实施例中,第一终端中生成的解锁密码可以在第一终端具备NFC芯片时,将解锁密码写入NFC芯片,也可以是在第一终端中有蓝牙芯片时,将解锁密码写入蓝牙芯片。
本公开示例性实施例提供了一种智能门锁的控制方法,上述控制方法应用于第一终端中,利用第一终端的加密处理和密钥管理功能,将智能门锁生成的密码设置为非明文密码,从而在最大限度上降低密码泄露风险,对目前主流智能门锁采用指纹、虹膜以及固定密码等开锁方式进行了安全方面的补充,极大丰富了智能门锁的应用场景。
进一步地,如图5-2所示,图5-2为根据本公开示例性实施例的一种智能门锁控制方法实现流程示意图二,在步骤304之后,本公开示例性实施例提供的一种智能门锁控制方法还可以包括步骤305-306,如下:
步骤305、向智能门锁发送解锁请求,解锁请求中携带有解锁密码。
在本公开示例性实施例中,第一终端在采用门锁解密密钥解密加密门锁密码获得解锁密码后,向智能门锁发送携带有解锁密码的解锁请求。
示例性的,第一终端在向智能门锁发送解码请求时,可以通过租客客户端界面上显示的开锁密码、或通过NFC、蓝牙等方式向智能门锁发送解锁请求。
步骤306、接收智能门锁反馈的解锁结果;其中解锁结果包括时效提醒或解锁状态。
在本公开示例性实施例中,第一终端在向智能门锁发送解码请求后,会收到智能门锁反馈的解锁结果。具体地:
当第一终端发送的解锁请求不在智能门锁设置的解锁时效期内时,第一终端会收到智能门锁的时效提醒;
当第一终端发送的解锁请求在智能门锁设置的解锁时效期内时,第一终端发送的解锁密码会与智能门锁的门锁密码进行匹配,匹配完成后,第一终端会收到智能门锁发送的解锁成功或解锁失败的状态标识。
可以理解的是,本公开示例性实施例中,第一终端通过状态反馈,能方便第一终端即时掌握解锁请求状态,提高了智能门锁的管理效率。
示例性实施例三
本公开示例性实施例另提供了一种智能门锁的控制方法,其应用于云平台,云平台分别与第一终端、第二终端以及智能门锁进行通信。图6为根据本公开示例性实施例的一种智能门锁控制方法实现流程示意图,如图6所示,在本公开的示例性实施例中,云平台实现门锁控制的方法可以包括以下步骤:
步骤601、接收第二终端对智能门锁的控制指示。
在本公开示例性实施例中,云平台分别与第一终端、第二终端以及智能门锁进行通信,实现信息交互。这里,云平台基于与租客客户端和房东客户端进行信息交互,得到构造为控制智能门锁的使用权限的门锁控制信息后,将门锁控制信息转发给智能门锁,从而避免了云平台来管理门锁密码的风险。
在本公开示例性实施例中,云平台接收第二终端的控制指示,包括与智能门锁对应的门锁ID,以及门锁使用时效,且云平台在收到控制指示时,需要验证房东客户端的登录信息,以此来判断房东是否具备对该智能门锁的操作权限。所述验证可以采用如用户账号名、密码校验、手机号校验等常规方法,本公开示例性实施例不再赘述。
步骤602、与第一终端协商加密方法,接收第一终端发送的门锁加密密钥。
在本公开示例性实施例中,云平台与第一终端协商加密算法,确定好加密算法后,会收到第一终端发送的门锁加密密钥。
进一步地,在本公开示例性实施例中,云平台和第一终端协商采用非对称加密算法来提升安全性。
步骤603、根据控制指示和门锁加密密钥,生成门锁控制信息;
在本公开示例性实施例中,云平台根据第二终端发送的控制指示和门锁加密密钥,生成门锁控制信息。具体地,所述门锁控制信息,包括:令牌Token,所述Token中包含门锁时效信息。
需要说明的是,在本公开的示例性实施例中,门锁时效信息构造为控制第一终端对智能门锁的使用时限,门锁时效信息的格式在本公开中不做具体限制。具体地,门锁时效信息可以以时间戳和使用时长的形式存在,如时间戳信息为2018年6月1日,使用时长为二年;或者门锁时效信息以具体使用时间段形式存在,如2018年6月1日至2020年6月1日。
在本公开示例性实施例中,门锁控制信息还包括:门锁加密密钥。
步骤604、发送门锁控制信息给智能门锁。
在本公开示例性实施例中,云平台在生成门锁控制信息后,将门锁控制信息发送给智能门锁,从而避免了云平台来管理门锁密码的风险。
进一步地,为加强网络的安全性,本公开示例性实施例中,云平台支持NB-IoT通信,能实现和智能门锁的窄带物联。NB-IoT网络的传输速率一般为200kbps,门锁控制信息的长度可以一次性通信完成。
进一步地,云平台在发送门锁控制信息给智能门锁时,为保证云平台和智能门锁之间状态的一致性,云平台也可以采用心跳保活机制发送门锁控制信息。具体地,云平台定时接收智能门锁发送的数据包(心跳包),同时,云平台在接收到数据包后,告知智能门锁已经收到了数据包,以此来确保云平台和智能门锁之间的状态一致。
需要说明的是,在本公开示例性实施例中,云平台在每次收到第二终端的控制指示时,会依据控制指示生成具有时效性的控制信息并发送给智能门锁,以此实现对智能门锁的动态控制。
本公开示例性实施例提供了智能门锁的控制方法,上述控制方法应用于云平台中,通过云平台具备令牌生成以及密码协商功能,将生成的门锁控制信息发送到智能门锁,避开了相关技术中在云平台生成密码,在最大限度上降低密码泄露风险,对目前主流智能门锁采用指纹、虹膜以及固定密码等开锁方式进行了安全方面的补充,极大丰富了智能门锁的应用场景。
示例性实施例四
基于上述示例性实施例一至示例性实施例三的同一发明构思,本公开示例性实施例提供了一种智能门锁的控制方法,应用于智能门锁、云平台、第一终端、第二终端中。其中,所述第一终端和第二终端为具有通信功能的智能终端,例如手机、平板电脑等,且第一终端(租客客户端)支持加密算法和密钥管理功能;第二终端(房东客户端)具备门锁信息设置功能;第一终端和第二终端均可以和云平台连接。首先,云平台基于第二终端对智能门锁的控制指示以及与第一终端协商加密方法,接收第一终端发送的门锁加密密钥来生成门锁控制信息后,云平台发送门锁控制信息给智能门锁。其次,智能门锁在接收到门锁控制信息后,基于门锁控制信息,确定智能门锁启动时,生成门锁密码,并采用门锁密码进行锁定。进一步地,智能门锁利用加密密钥对门锁密码加密生成加密门锁密码,并将加密门锁密码发送给第一终端。最后,第一终端利用解密密钥解密加密门锁密码,生成解锁密码,进而向智能门锁发起解锁请求。智能门锁在接收到解锁请求后,反馈解锁结果给第一终端,以此实现了智能门锁与 第一终端端到端的控制。
图7为根据本公开示例性实施例的基于示例性实施例一提出的一种智能门锁控制方法的交互流程图一,如图7所示,在本公开的示例性实施例中,智能门锁、云平台、第一终端、第二终端之间的交互过程可以包括以下步骤:
步骤701、第二终端向云平台发送对智能门锁的控制指示。
步骤702、云平台根据控制指示生成门锁控制信息。
步骤703、云平台发送门锁控制信息给智能门锁。
步骤704、智能门锁基于门锁控制信息,在确定智能门锁启动时,生成门锁密码。
步骤705、智能门锁采用门锁密码进行锁定。
步骤706、智能门锁发送门锁密码给第一终端。
进一步地,图8为根据本公开示例性实施例的一种智能门锁控制方法的交互流程图二,如图8所示,示例性的,在本公开的示例性实施例中,智能门锁、云平台、第一终端和第二终端之间的交互过程可以包括以下步骤:
步骤801、第二终端选择相应智能门锁和时效信息发送给云平台。
步骤802、云平台和第一终端协商加密算法和密钥。
步骤803、云平台和智能门锁建立连接和交互。
步骤804、智能门锁生成门锁密码,发送加密门锁密码到第一终端。
步骤805、智能门锁更新门锁密码。
步骤806、第一终端解密加密门锁密码获得解锁密码。
步骤807、第一终端使用解锁密码开锁。
通过以上步骤801-807,智能门锁中设置的是具有时效性的门锁密码,且智能门锁与第一终端间交互非明文密码,保证了门锁密码的安全性。
进一步地,在图8所示的交互过程基础上,图9为根据本公开示例性实施例的一种智能门锁控制方法交互流程示意图三,如图9所示,示例性的,在本公开的示例性实施例中,智能门锁、云平台、第一终端和第二终端之间的交互过程进一步可以包括以下步骤:
步骤901、第二终端将被操作智能门锁、门锁使用时效和客户信息发送到云平台。
需要说明的是,本公开示例性实施例中,第二终端将被操作智能门锁、开锁时效和客户信息发送到云平台,所述客户信息是指房东客户端的登录信息。
步骤902、云平台和第一终端建立连接。
步骤903、第一终端发送加密算法和门锁加密密钥给云平台。
步骤904、云平台发送门锁加密密钥和Token到指定智能门锁。
步骤905、智能门锁设置时效及生成门锁密码。
步骤906、智能门锁使用加密密钥将门锁密码加密。
步骤907、智能门锁短信发送加密门锁密码给第一终端。
步骤908、第一终端对加密门锁密码解密,得到解锁密码并发送给智能门锁。
步骤909、智能门锁判断解锁密码与门锁密码是否一致。
步骤910、若解锁密码与门锁密码一致,智能门锁则执行开锁。
通过以上步骤901-910,智能门锁中设置的是具有时效性的门锁密码,并与第一终端通过短信的方式交互非明文密码,进一步保证了门锁密码的安全性。
基于上述图7-图9所述的方法,示例性的,为加强网络的安全性,在本公开示例性实施例中,智能门锁中含有NB-IoT模组,云平台支持NB-IoT规范,将上述智能门锁、云平台、第一终端、第二终端组成的系统称为智能门锁管理系统,下面以基于NB-IoT技术的智能门锁管理系统为例,进行说明。
图10为根据本公开示例性实施例的一种智能门锁控制方法的交互流程示意图三,如图10所示,在本公开的示例性实施例中,智能门锁、云平台、第一终端和第二终端实现远程控制的方法可以包括以下步骤:
步骤1001、第二终端向云平台发送门锁控制指示;其中控制指示中包括门锁ID、门锁使用时效。
步骤1002、云平台根据门锁控制指示,生成令牌Token。
步骤1003、第一终端向云平台发起门锁控制请求,建立连接。
需要说明的是,在本公开示例性实施例中,第一终端向云平台发起门锁控制请求,是指租客通过租客客户端向云平台发起门锁控制请求。租客需要事先在第一终端进行注册,以获取对应智能门锁的操作权限。
步骤1004、第一终端和云平台协商采用非对称加密算法。
步骤1005、第一终端中生成公钥和私钥。
步骤1006、第一终端向云平台发送公钥和令牌Token。
步骤1007、云平台基于NB-IoT网络将公钥和Token发送给智能门锁,其中,云平台和智能门锁之间增加了心跳保活机制。
步骤1008、智能门锁解码Token,获取门锁时效信息,并将门锁时效信息设置到智能门锁中,同时,智能门锁更新门锁密码。
根据具有时效性的Token,触发生成门锁密码,并将门锁密码更新设置到智能门锁中,从而实现智能门锁密码动态设置的功能。
智能门锁中设置的门锁时效信息构造为限制门锁密码的解锁时效。
步骤1009、智能门锁采用公钥对门锁密码加密,生成加密门锁密码。
步骤1010、通过SIM NB-IoT通信以短消息的形式将加密门锁密码发送给第一终端。
步骤1011、第一终端用私钥对加密门锁密码解密,获取解锁密码。
步骤1012、第一终端向智能门锁发送携带有解锁密码的解锁请求。
步骤1013、智能门锁验证解锁密码的时效性。
智能门锁在收到解锁密码时,先根据步骤1008中的解锁时效来判断解锁密码是否在时效期内。
若解锁密码不在时效期内,说明第一终端已经没有权限使用智能门锁,解锁密码失效。智能门锁反馈时效提醒给第一终端。
若解锁密码在时效期内,说明第一终端有权限使用智能门锁,继续执行后续步骤。
步骤1014、智能门锁验证解锁密码与门锁密码是否匹配。
进一步地,本公开示例性实施例中,若是将门锁密码写到了NFC中,用户 可将手机NFC放入门锁NFC模块可感应范围。智能门锁读取手机NFC中存取的门锁密码,读取成功则继续进行密码验证。
如果解锁密码和门锁密码可以匹配,则智能门锁进行解锁操作;否则智能门锁保持锁定。
智能门锁反馈解锁成功或解锁失败的解锁状态给第一终端。
本公开示例性实施例提供了一种智能门锁控制方法,上述智能门锁的控制方法应用于配置有NB-IoT模组的智能门锁、支持NB-IoT规范的云平台以及支持加密算法和密钥管理功能的第一终端。图11为对应于本公开示例性实施例四中的第一终端获取智能门锁解锁密码过程的状态图。如图11所示,通过第二终端(房东客户端)输入时效给云平台,云平台生成门锁控制信息,并与第一终端协商加密算法,接收第一终端的公钥后,将具有时效性的Token和公钥发送给智能门锁。在云平台和智能门锁交互的过程中,增加了心跳保活机制来更新Token信息以保证云平台和智能门锁之间状态的一致性。智能门锁在收到公钥和Token信息以后,解码Token,在智能门锁中设置门锁密码和对应的解锁时效,并将加密门锁密码以短信的形式发送到第一终端。首先,本公开示例性实施例利用NB-IoT技术,减少了网络信息传递的中转点;其次,本公开示例性实施例利用由智能门锁动态单向设置非明文密码,且采用非对称加密算法加密,从而在最大限度上降低密码泄露风险,对目前主流智能门锁采用指纹、虹膜以及固定密码等开锁方式进行了安全方面的补充,极大丰富了智能门锁的应用场景。
示例性实施例五
基于示例性实施例一,图12为根据本公开示例性实施例的智能门锁的组成结构示意图,如图12所示,本公开提出的智能门锁0可以包括第一处理器01、存储有第一处理器01可执行指令的第一存储器02、第一通信接口03和第一总线04,第一总线04构造为连接第一处理01、第一存储器02以及第一通信接口03。在本公开的示例性实施例中,第一处理器01构造为执行存储器中存储的智能门锁控制程序,以实现以下步骤:
接收所述云平台发送的门锁控制信息,所述门锁控制信息构造为控制智能门锁的使用权限;
基于所述门锁控制信息,确定所述智能门锁启动时,生成门锁密码;
采用所述门锁密码进行锁定;
发送所述门锁密码给所述第一终端。
在一种可选的示例性实施例中,上述第一处理器01还具体用于当门锁控制信息中包含门锁时效信息时,在生成门锁密码之后,根据门锁时效信息,设置门锁密码对应的解锁时效。
进一步地,上述第一处理器01,还具体用于当门锁控制信息中包含门锁加密密钥时,在生成门锁密码之后,采用门锁加密密钥加密门锁密码,生成加密门锁密码并发送给第一终端。
进一步地,上述第一处理器01,还具体用于通过短消息发送门锁密码或加密门锁密码给第一终端。
进一步地,在本公开的示例性实施例中,上述第一处理器01,还具体构造为确定解锁密码是否在解锁时效范围内;若不在解锁时效范围内,则反馈时效提醒给第一终端,同时,智能门锁保持锁定。
进一步地,在本公开的示例性实施例中,上述第一处理器01,还具体构造为接收第一终端的解锁请求,确定解锁请求中携带的解锁密码与门锁密码是否匹配。
进一步地,在本公开的示例性实施例中,上述第一处理器01,还具体构造为根据解锁请求中携带的解锁密码与门锁密码的匹配结果反馈解锁状态给第一终端。
进一步地,在本公开的示例性实施例中,上述第一处理器01,还具体构造为在接收云平台发送的门锁控制信息时增加心跳保活机制及时更新门锁控制信息。
在本公开的示例性实施例中,上述第一处理器01可以为特定用途集成电路(Application Specific Integrated Circuit,ASIC)、数字信号处理器(Digital Signal Processor,DSP)、数字信号处理装置(Digital Signal Processing Device,DSPD)、可编程逻辑装置(ProgRAMmable Logic Device,PLD)、现场可编程门阵列(Field ProgRAMmable Gate Array,FPGA)、CPU、控制器、微控制器、微处理器中的至少一种。可以理解地,对于不同的设备,用于实现上述处理器功能的电子器 件还可以为其它类型的设备,本公开示例性实施例对此不作具体限定。该智能门锁0还可以包括第一存储器02,该第一存储器02可以与第一处理器01连接,其中,第一存储器02构造为存储智能门锁控制程序代码,该程序代码包括计算机操作指令,第一存储器02可能包含高速RAM存储器,也可能还包括非易失性存储器,例如,至少两个磁盘存储器。
在实际应用中,上述第一存储器02可以是易失性第一存储器(volatile memory),例如随机存取第一存储器(Random-Access Memory,RAM);或者非易失性第一存储器(non-volatile memory),例如只读第一存储器(Read-Only Memory,ROM),快闪第一存储器(flash memow),硬盘(Hard Disk Drive,HDD)或固态硬盘(Solid-State Drive,SSD);或者上述种类的第一存储器的组合,并向第一处理器01提供指令和数据。
另外,在本示例性实施例中的各功能模块可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。
集成的单元如果以软件功能模块的形式实现并非作为独立的产品进行销售或使用时,可以存储在一个计算机可读取存储介质中,基于这样的理解,本示例性实施例的技术方案本质上或者说对相关技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或processor(处理器)执行本示例性实施例方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
本公开示例性实施例提供了一种智能门锁,该智能门锁接收云平台发送的门锁控制信息,门锁控制信息构造为控制智能门锁的使用权限;基于门锁控制信息,确定智能门锁启动时,生成门锁密码;采用门锁密码进行锁定;发送门锁密码给所述第一终端。也就是说,本公开示例性实施例提出的一种智能门锁的控制方法,根据云平台发送的控制信息,在智能门锁中生成密码,并通过智能门锁将密码发给第一终端,避免了通过云平台来转发门锁密码至智能门锁和 第一终端的复杂过程,减少了密码传输中转,实现了端到端的传输,且通过在智能门锁中生成门锁密码,有效地提高了智能门锁远程控制的安全性。
进一步地,智能门锁发送带有时效性的加密门锁密码给终端,能实现智能门锁动态单向设置非明文密码,从而在最大限度上降低密码泄露风险。对目前主流智能门锁采用指纹、虹膜以及固定密码等开锁方式进行了安全方面的补充,极大丰富了智能门锁的应用场景。
本公开示例性实施例提供第一计算机可读存储介质,其上存储有智能门锁控制程序,应用于智能门锁中,该程序被处理器执行时实现示例性实施例一中的方法。
示例性实施例六
基于示例性实施例二的同一发明构思下,图13为根据本公开示例性实施例的第一终端的组成结构示意图,如图13所示,本公开示例性实施例提出的第一终端可以包括第二处理器11、存储有第二处理器11可执行指令的第二存储器12、第二通信接口13和第二总线14,第二总线14构造为连接第二处理器11、第二存储器12以及第二通信接口13。在本公开示例性实施例中,第二处理器11构造为执行存储器中存储的智能门锁控制程序,以实现以下步骤:
与所述云平台协商加密方法,生成密钥;其中,所述密钥包括门锁加密密钥和门锁解密密钥;
发送所述门锁加密密钥给所述云平台;
接收所述智能门锁发送的加密门锁密码;其中,所述加密门锁密码通过所述智能门锁采用所述门锁加密密钥对门锁密码加密而生成;
采用所述门锁解密密钥解密所述加密门锁密码,生成解锁密码。
进一步地,在本公开的示例性实施例中,上述第二处理器11,还具体构造为以短消息形式接收智能门锁发送的加密门锁密码。
进一步地,在本公开示例性实施例中,上述第二处理器11,还具体构造为向智能门锁发送解锁请求,解锁请求中携带有解锁密码;接收智能门锁反馈的解锁结果;其中解锁结果包括时效提醒或解锁状态。
进一步地,在本公开的示例性实施例中,第一终端中还可以包括NFC模块15,用于通过近场通信向智能门锁发送解锁请求。
在本公开的示例性实施例中,上述第二处理器11可以为特定用途集成电路、数字信号处理器、数字信号处理装置、可编程逻辑装置、现场可编程门阵列、CPU、控制器、微控制器、微处理器中的至少一种。可以理解地,对于不同的设备,用于实现上述处理器功能的电子器件还可以为其它设备,本公开示例性实施例对此不作具体限定。该终端1还可以包括第二存储器12,该第二存储器12可以与第二处理器11连接,其中,第二存储器12构造为存储智能门锁控制程序代码,该程序代码包括计算机操作指令,第二存储器12可能包含高速RAM存储器,也可能还包括非易失性存储器,例如,至少两个磁盘存储器。
在实际应用中,上述第二存储器12可以是易失性第二存储器,例如随机存取第二存储器;或者非易失性第二存储器,例如只读第二存储器,快闪第二存储器,硬盘或固态硬盘;或者上述种类的第二存储器的组合,并向第二处理器11提供指令和数据。
另外,在本示例性实施例中的各功能模块可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。
集成的单元如果以软件功能模块的形式实现并非作为独立的产品进行销售或使用时,可以存储在一个计算机可读取存储介质中,基于这样的理解,本示例性实施例的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或处理器执行本示例性实施例方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器、随机存取存储器、磁碟或者光盘等各种可以存储程序代码的介质。
本公开示例性实施例提供一种终端,该终端与云平台协商加密方法,生成密钥;其中,所述密钥包括门锁加密密钥和门锁解密密钥;发送门锁加密密钥给云平台;接收智能门锁发送的加密门锁密码;其中,加密门锁密码通过所述智能门锁采用门锁加密密钥对门锁密码加密而生成;采用门锁解密密钥解密所述加密门锁密码,生成解锁密码。也就是说,本公开示例性实施例提出的一种智能门锁的控制方法,利用第一终端的加密处理和密钥管理功能;将智能门锁 生成的密码设置为非明文密码,从而在最大限度上降低密码泄露风险,对目前主流智能门锁采用指纹、虹膜以及固定密码等开锁方式进行了安全方面的补充,极大丰富了智能门锁的应用场景。
本公开示例性实施例提供第二计算机可读存储介质,其上存储有智能门锁控制程序,应用于终端中,该程序被处理器执行时实现示例性实施例二中的方法。
示例性实施例七
基于示例性实施例三的同一发明构思下,本公开示例性实施例提供一种云平台,图14为根据本公开示例性实施例的云平台的组成结构示意图,如图14所示,本公开示例性实施例提出的云平台可以包括第三处理器21、存储有第三处理器21可执行指令的第三存储器22和第三总线23,第三总线23构造为连接第三处理器21、第三存储器22。在本公开的示例性实施例中,第三处理器21构造为执行存储器中存储的智能门锁控制程序,以实现以下步骤:
接收所述第二终端对所述智能门锁的控制指示;
与所述第一终端协商加密方法,接收所述第一终端发送的门锁加密密钥;
根据所述控制指示和所述门锁加密密钥,生成门锁控制信息;
发送所述门锁控制信息给所述智能门锁。
进一步地,在本公开的示例性实施例中,上述第三处理器21,还具体构造为根据第二终端的控制指示,生成门锁时效信息,并将门锁时效信息和门锁加密密钥作为门锁控制信息。
进一步地,在本公开示例性实施例中,上述第三处理器22,还具体构造为采用心跳保活机制发送门锁控制信息给智能门锁。
在本公开的示例性实施例中,上述第三处理器21可以为特定用途集成电路、数字信号处理器、数字信号处理装置、可编程逻辑装置、现场可编程门阵列、CPU、控制器、微控制器、微处理器中的至少一种。可以理解地,对于不同的设备,用于实现上述处理器功能的电子器件还可以为其它设备,本公开示例性实施例对此不作具体限定。该云平台2还可以包括第三存储器22,该第三存储器22可以与第三处理器21连接,其中,第三存储器22构造为存储智能门锁控制程序代码,该程序代码包括计算机操作指令,第三存储器22可能包含高速 RAM存储器,也可能还包括非易失性存储器,例如,至少两个磁盘存储器。
在实际应用中,上述第三存储器22可以是易失性第三存储器,例如随机存取第三存储器;或者非易失性第三存储器,例如只读第三存储器,快闪第三存储器,硬盘或固态硬盘;或者上述种类的第三存储器的组合,并向第三处理器21提供指令和数据。
另外,在本示例性实施例中的各功能模块可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。
集成的单元如果以软件功能模块的形式实现并非作为独立的产品进行销售或使用时,可以存储在一个计算机可读取存储介质中,基于这样的理解,本示例性实施例的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或处理器执行本示例性实施例方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器、随机存取存储器、磁碟或者光盘等各种可以存储程序代码的介质。
本公开示例性实施例提供了一种云平台,该云平台接收第二终端对智能门锁的控制指示;与第一终端协商加密方法,得到门锁加密密钥;根据控制指示和门锁加密密钥,生成门锁控制信息;发送门锁控制信息给智能门锁。也就是说,本公开示例性实施例提出的一种智能门锁的控制方法,云平台具备Token生成以及密码协商功能,将生成的门锁控制信息发送到智能门锁,避开了现有技术中在云平台生成密码,在最大限度上降低密码泄露风险,对目前主流智能门锁采用指纹、虹膜以及固定密码等开锁方式进行了安全方面的补充,极大丰富了智能门锁的应用场景。本公开示例性实施例提供第三计算机可读存储介质,其上存储有智能门锁控制程序,应用于云平台中,该程序被处理器执行时实现示例性实施例三中的方法。
本领域内的技术人员应明白,本公开的示例性实施例可为方法、系统、或计算机程序产品。因此,本公开可采用硬件实施例、软件实施例、或结合软件和硬件方面的实施例的形式。而且,本公开可采用在一个或多个其中包含有计 算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器和光学存储器等)上实施的计算机程序产品的形式。
本公开是参照根据本公开示例性实施例的方法、设备(系统)、和计算机程序产品的实现流程示意图和/或方框图来描述的。应理解可由计算机程序指令实现流程示意图和/或方框图中的每一流程和/或方框、以及实现流程示意图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在实现流程示意图中的一个流程或多个流程和/或方框图中的一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在实现流程示意图中的一个流程或多个流程和/或方框图中的一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在实现流程示意图中的一个流程或多个流程和/或方框图中的一个方框或多个方框中指定的功能的步骤。
以上所述,仅为本公开的示例性实施例,并非用于限定本公开的保护范围。

Claims (18)

  1. 一种智能门锁的控制方法,其应用于智能门锁,所述智能门锁分别与云平台,以及第一终端进行通信,所述方法包括:
    接收所述云平台发送的门锁控制信息,所述门锁控制信息构造为控制所述智能门锁的使用权限;
    基于所述门锁控制信息,确定所述智能门锁启动时,生成门锁密码;
    采用所述门锁密码进行锁定;以及
    发送所述门锁密码给所述第一终端。
  2. 根据权利要求1所述的方法,其中,所述门锁控制信息包括门锁时效信息,在所述生成门锁密码之后,所述方法还包括:
    根据所述门锁时效信息,设置所述门锁密码对应的解锁时效。
  3. 根据权利要求1或2所述的方法,其中,所述门锁控制信息包括门锁加密密钥,在所述生成门锁密码之后,且在所述发送所述门锁密码给所述第一终端之前,所述方法还包括:
    采用所述门锁加密密钥对所述门锁密码进行加密,得到加密门锁密码;
    相应的,所述发送所述门锁密码给所述第一终端,包括:
    发送所述加密门锁密码给所述第一终端。
  4. 根据权利要求1所述的方法,其中,所述发送所述门锁密码给所述第一终端,包括:
    通过短消息发送所述门锁密码给所述第一终端。
  5. 根据权利要求2所述的方法,其中,在所述发送所述门锁密码给所述第一终端之后,所述方法还包括:
    接收所述第一终端发送的解锁请求,所述解锁请求中携带有解锁密码;
    当所述解锁密码在所述解锁时效内时,利用所述解锁密码进行解锁;
    当所述解锁密码未在所述解锁时效内时,保持锁定。
  6. 根据权利要求5所述的方法,还包括:反馈所述智能门锁的解锁状态给所述第一终端,或者发送时效提醒给所述第一终端。
  7. 根据权利要求1所述的方法,其中,所述智能门锁和所述云平台基于窄带物联网网络进行通信。
  8. 根据权利要求1所述的方法,其中,所述接收所述云平台发送的门锁控制信息,包括:
    采用心跳保活机制接收所述云平台发送的门锁控制信息。
  9. 一种智能门锁的控制方法,其应用于第一终端,所述第一终端分别与云平台,以及智能门锁进行通信,所述方法包括:
    与所述云平台协商加密方法,生成密钥;其中,所述密钥包括门锁加密密钥和门锁解密密钥;
    发送所述门锁加密密钥给所述云平台;
    接收所述智能门锁发送的加密门锁密码,其中,所述加密门锁密码通过所述智能门锁采用所述门锁加密密钥对门锁密码加密而生成;以及
    采用所述门锁解密密钥解密所述加密门锁密码,生成解锁密码。
  10. 根据权利要求9所述的方法,其中,所述接收所述智能门锁发送的加密门锁密码,包括:
    通过短消息接收所述智能门锁发送的所述加密门锁密码。
  11. 根据权利要求9所述的方法,其中,在所述生成解锁密码之后,所述方法还包括:
    向所述智能门锁发送解锁请求,所述解锁请求中携带有所述解锁密码;以及
    接收所述智能门锁反馈的解锁结果,其中,所述解锁结果包括时效提醒或解锁状态。
  12. 一种智能门锁的控制方法,其应用于云平台,所述云平台分别与第一终端、第二终端以及智能门锁进行通信,所述方法包括:
    接收所述第二终端对所述智能门锁的控制指示;
    与所述第一终端协商加密方法,接收所述第一终端发送的门锁加密密钥;
    根据所述控制指示和所述门锁加密密钥,生成门锁控制信息;以及
    发送所述门锁控制信息给所述智能门锁。
  13. 根据权利要求12所述的方法,其中,所述根据所述控制指示和所述门锁加密密钥,生成门锁控制信息,包括:
    根据所述控制指示,生成门锁时效信息;以及
    将所述门锁时效信息和所述门锁加密密钥作为所述门锁控制信息。
  14. 一种智能门锁,包括第一处理器、第一存储器、第一通信接口和第一总线,所述第一总线构造为连接所述第一处理器、所述第一存储器以及所述第一通信接口,所述第一处理器构造为执行所述第一存储器中存储的智能门锁控制程序,以实现如权利要求1-8中任一项所述的方法。
  15. 一种终端,包括第二处理器、第二存储器、第二通信接口和第二总线,所述第二总线构造为连接所述第二处理器、第二总线第二存储器以及第二总线第二通信接口,所述第二处理器构造为执行所述第二存储器中存储的智能门锁控制程序,以实现如权利要求9-11中任一项所述的方法。
  16. 根据权利要求15所述的终端,还包括近场通信模块,所述近场通信模块构造为通过近场通信向所述智能门锁发送解锁请求。
  17. 一种云平台,包括第三处理器、第三存储器和第三总线,所述第三总线构造为连接所述第三处理器、第三存储器,所述第三处理器构造为执行所述第三存储器中存储的智能门锁控制程序,以实现如权利要求12-13中任一项所述的方法。
  18. 一种计算机可读存储介质,其上存储有智能门锁控制程序,应用于智能门锁中,所述智能门锁控制程序被第一处理器执行时实现如权利要求1-8中任一项所述的方法;或者,应用于终端中,所述智能门锁控制程序被第二处理器执行时实现如权利要求9-11中任一项所述的方法;或者,应用于云平台中,所述智能门锁控制程序被第三处理器执行时实现如权利要求12-13中任一项所述的方法。
PCT/CN2019/100037 2018-08-09 2019-08-09 智能门锁的控制方法、设备及存储介质 WO2020030132A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810904550.4A CN110866999A (zh) 2018-08-09 2018-08-09 一种智能门锁的控制方法、设备及存储介质
CN201810904550.4 2018-08-09

Publications (1)

Publication Number Publication Date
WO2020030132A1 true WO2020030132A1 (zh) 2020-02-13

Family

ID=69413246

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/100037 WO2020030132A1 (zh) 2018-08-09 2019-08-09 智能门锁的控制方法、设备及存储介质

Country Status (2)

Country Link
CN (1) CN110866999A (zh)
WO (1) WO2020030132A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111510486A (zh) * 2020-04-10 2020-08-07 国网浙江宁海县供电有限公司 一种能够防误接线的智能电表箱和安全解锁方法
CN112767576B (zh) * 2020-12-16 2023-05-02 珠海优特电力科技股份有限公司 锁具授权管理方法和锁具授权管理系统
CN112818329B (zh) * 2021-04-19 2021-07-13 上海银基信息安全技术股份有限公司 认证方法及装置、用户端、设备端及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103345790A (zh) * 2013-06-26 2013-10-09 深圳市同创新佳科技有限公司 基于nfc智能电子设备的电子门锁管理方法及系统
CN104637131A (zh) * 2013-11-15 2015-05-20 腾讯科技(深圳)有限公司 一种门禁系统授权方法、装置及门禁系统
US20150227284A1 (en) * 2014-02-12 2015-08-13 Viking Access Systems, Llc Movable barrier operator with remote monitoring capabilities
CN105261096A (zh) * 2015-10-26 2016-01-20 东莞市点开网络科技有限公司 一种网络智能锁系统

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104852913A (zh) * 2015-04-29 2015-08-19 德施曼机电(中国)有限公司 动态口令电子密码锁
CN107038777B (zh) * 2017-03-29 2020-08-18 云丁网络技术(北京)有限公司 一种基于智能门锁系统的安全通信方法及其智能门锁系统
CN207460241U (zh) * 2017-10-10 2018-06-05 杭州萤石网络有限公司 一种无线智能门锁及具有其的智能家居系统
CN107893583A (zh) * 2017-10-16 2018-04-10 杭州软库科技有限公司 一种智能门锁系统及控制方法
CN107845169A (zh) * 2017-10-27 2018-03-27 张荣斌 一种基于动态密码的开锁系统及开锁方法
CN108198016A (zh) * 2017-12-21 2018-06-22 广东汇泰龙科技有限公司 一种基于云锁的出租房管理系统
CN108257274A (zh) * 2018-02-01 2018-07-06 杭州登虹科技有限公司 一种智能门锁及其通信方法
CN108346203A (zh) * 2018-02-12 2018-07-31 浙江芯科物联科技有限公司 一种智能门锁、解锁方法和锁止方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103345790A (zh) * 2013-06-26 2013-10-09 深圳市同创新佳科技有限公司 基于nfc智能电子设备的电子门锁管理方法及系统
CN104637131A (zh) * 2013-11-15 2015-05-20 腾讯科技(深圳)有限公司 一种门禁系统授权方法、装置及门禁系统
US20150227284A1 (en) * 2014-02-12 2015-08-13 Viking Access Systems, Llc Movable barrier operator with remote monitoring capabilities
CN105261096A (zh) * 2015-10-26 2016-01-20 东莞市点开网络科技有限公司 一种网络智能锁系统

Also Published As

Publication number Publication date
CN110866999A (zh) 2020-03-06

Similar Documents

Publication Publication Date Title
US11888594B2 (en) System access using a mobile device
CN110177354B (zh) 一种车辆的无线控制方法及系统
US9749134B2 (en) Wireless configuration using passive near field communication
US8806609B2 (en) Security for remote access VPN
AU2011305477B2 (en) Shared secret establishment and distribution
WO2018019069A1 (zh) 一种资源操作方法及装置
US20120198228A1 (en) System and method for digital user authentication
KR100881938B1 (ko) 다중 스마트 카드 세션을 관리하는 시스템 및 방법
WO2020030132A1 (zh) 智能门锁的控制方法、设备及存储介质
US9143323B2 (en) Securing a link between two devices
CN109391468A (zh) 一种认证方法及系统
WO2019007252A1 (zh) 一种控制方法及装置
TW201417546A (zh) 即時通信方法和系統
CN110909338B (zh) 一种基于安全芯片的安全认证方法与系统及安全芯片
CN109816831A (zh) 一种基于国密算法的智能锁的认证方法和系统
US20220329582A1 (en) Communication method and related product
CN112425116B (zh) 智能门锁无线通信方法、智能门锁、网关及通信设备
CA2539658C (en) Securing a link between devices
US20230052917A1 (en) Pairing method applied to short-range communication system and wireless device
WO2021083349A1 (zh) 一种基于安全芯片的安全认证方法与系统、安全芯片及可读存储介质
WO2016112860A1 (zh) 无线设备的通讯方法、无线设备和服务器
CN117279119B (zh) 用于设备间无线通信的方法和通信装置
TWI828558B (zh) 訊息傳輸系統以及應用其中之使用者裝置與資訊安全硬體模組
US20230108770A1 (en) Authentication Method
KR20230016493A (ko) 차량 제어 장치 그 제어 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19847083

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19847083

Country of ref document: EP

Kind code of ref document: A1