WO2023109240A1 - 智能门锁的绑定方法和装置、存储介质及电子装置 - Google Patents

智能门锁的绑定方法和装置、存储介质及电子装置 Download PDF

Info

Publication number
WO2023109240A1
WO2023109240A1 PCT/CN2022/121037 CN2022121037W WO2023109240A1 WO 2023109240 A1 WO2023109240 A1 WO 2023109240A1 CN 2022121037 W CN2022121037 W CN 2022121037W WO 2023109240 A1 WO2023109240 A1 WO 2023109240A1
Authority
WO
WIPO (PCT)
Prior art keywords
client
door lock
smart door
server
binding
Prior art date
Application number
PCT/CN2022/121037
Other languages
English (en)
French (fr)
Inventor
杜薇
Original Assignee
青岛海尔科技有限公司
海尔智家股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 青岛海尔科技有限公司, 海尔智家股份有限公司 filed Critical 青岛海尔科技有限公司
Publication of WO2023109240A1 publication Critical patent/WO2023109240A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices

Definitions

  • Embodiments of the present disclosure relate to the technical field of smart door locks, and in particular, relate to a method and device for binding a smart door lock, a storage medium, and an electronic device.
  • the method provided in the related art to read and write the smart door lock only through the Bluetooth connection has the problem of low data transmission security when the smart door lock is bound.
  • Embodiments of the present disclosure provide a binding method and device for a smart door lock, a storage medium, and an electronic device, so as to at least solve the problem of low data transmission security during the binding process of a smart door lock.
  • a method for binding a smart door lock including: the client of the device management application sends a binding request to the server, wherein the binding request carries the application identifier of the device management application and The wireless communication address of the smart door lock to be bound; the device binding status information fed back by the server indicates that the smart door lock is in an unbound state, and the client sends verification information to the smart door lock, where the verification information is used to verify The input information received by the smart door lock is verified; the client sends the verification result fed back by the smart door lock to the server; the client receives the authentication information dynamically generated by the server according to the verification result.
  • the client Request the authentication key group for binding authentication on the smart door lock; the client sends the confirmation message corresponding to the authentication information fed back by the smart door lock to the server; the client receives the binding instruction sent by the server, and responds The binding command triggers the account binding process of the smart door lock.
  • a method for binding a smart door lock including: the server receives a binding request sent by the client of the device management application, wherein the binding request carries the information of the device management application The application identification and the wireless communication address of the smart door lock to be bound; in response to the binding request, the server sends device binding status information to the client to instruct the client to confirm that the device binding status information indicates that the smart door lock is unbound
  • send verification information to the smart door lock where the verification information is used to verify the input information received by the smart door lock
  • the server receives the verification result sent by the smart door lock from the client; based on the verification result, the server dynamically Generate authentication information and send the authentication information to the client, where the authentication information carries the authentication key group for binding and authenticating the smart door lock according to the binding request
  • the server receives the smart lock sent by the client A confirmation message corresponding to the authentication information fed back by the door lock
  • the server sends a binding instruction to the client
  • a binding method for a smart door lock including: the smart door lock receives verification information sent by a client, where the verification information is used to verify the received input information; The smart door lock feeds back the verification result, and sends the verification result to the server through the client to instruct the server to send the authentication information dynamically generated according to the verification result to the client; the smart door lock feeds back a confirmation message corresponding to the authentication information to Instruct the client to send the authentication information to the server; the smart door lock starts the account binding process.
  • a binding device for a smart door lock which is applied to a client of a device application management application, including: a first sending unit configured to send a binding request to a server, wherein, The binding request carries the application identification of the device management application and the wireless communication address of the smart door lock to be bound; the second sending unit is configured to indicate that the smart door lock is not bound by the device binding status information fed back by the server.
  • the third sending unit is configured to send the verification result fed back by the smart door lock to the server;
  • the first The receiving unit is configured to receive authentication information dynamically generated by the server according to the verification result, wherein the authentication information carries an authentication key group for binding and authenticating the smart door lock according to the binding request;
  • the fourth sending unit It is set to send the confirmation message corresponding to the authentication information fed back by the smart door lock to the server;
  • the second receiving unit is used to receive the binding instruction sent by the server, and trigger the account binding of the smart door lock in response to the binding instruction process.
  • a binding device for smart door locks which is applied to the server of the device management application, including: a third receiving unit configured to receive the binding sent by the client of the device management application request, wherein the binding request carries the application identifier of the device management application and the wireless communication address of the smart door lock to be bound; the first processing unit is configured to respond to the binding request and send device binding status information to the client , to instruct the client to send verification information to the smart door lock when it is determined that the device binding status information indicates that the smart door lock is not bound, wherein the verification information is used to verify the input information received by the smart door lock;
  • the fourth receiving unit is configured to receive the verification result of the smart door lock feedback sent by the client;
  • the second processing unit is configured to dynamically generate authentication information based on the verification result, and send the authentication information to the client, wherein the authentication The information carries an authentication key group for binding and authenticating the smart door lock according to the binding request;
  • the fifth receiving unit is used for the server to
  • a binding device for smart door locks which is applied to smart door locks, and includes: a sixth receiving unit configured to receive verification information sent by the client, wherein the verification information uses For verifying the received input information; the first feedback unit is configured to feed back the verification result, and send the verification result to the server through the client, so as to instruct the server to send the authentication information dynamically generated according to the verification result to the client; The second feedback unit is configured to feed back a confirmation message corresponding to the authentication information to instruct the client to send the authentication information to the server; the activation unit is configured to initiate an account binding process.
  • the client when the client sends a binding request and the server feeds back that the smart door lock is not bound, the client sends to the smart door lock verification information for verifying the input information received by the smart door lock, And the verification result fed back by the smart terminal is sent to the server, and the server dynamically generates authentication information according to the verification result, and sends the authentication information to the smart door lock.
  • the client then sends the confirmation message corresponding to the authentication information fed back by the smart door lock to the server, and the server can issue a binding command to the client to trigger the account binding process of the smart door lock.
  • the server does not immediately issue the binding command of the smart door lock, but dynamically generates a binding command for the smart door lock according to the binding request according to the verification result.
  • the authentication key group and then through the confirmation message corresponding to the authentication information fed back by the smart door lock, the server sends a binding command to the client, thereby realizing the account binding of the smart door lock.
  • FIG. 1 is a schematic diagram of a hardware environment of an optional binding method for a smart door lock according to an embodiment of the present disclosure
  • Fig. 2 is a flow chart of an optional binding method of a smart door lock according to an embodiment of the present disclosure
  • Fig. 3 is a flow chart of another optional binding method of a smart door lock according to an embodiment of the present disclosure
  • Fig. 4 is a flow chart of another optional binding method of a smart door lock according to an embodiment of the present disclosure
  • FIG. 5 is an overall flow chart of an optional binding method for a smart door lock according to an embodiment of the present disclosure
  • FIG. 6 is a structural block diagram (1) of a binding device for a smart door lock according to an embodiment of the present disclosure
  • Fig. 7 is a structural block diagram (2) of a binding device for a smart door lock according to an embodiment of the present disclosure
  • Fig. 8 is a structural block diagram (3) of a binding device for a smart door lock according to an embodiment of the present disclosure.
  • FIG. 1 is a block diagram of a hardware structure of a mobile phone client in a method for binding a smart door lock according to an embodiment of the present disclosure.
  • the mobile phone client can include one or more (only one is shown in Figure 1) processor 102 (processor 102 can include but not limited to microprocessor (Microprocessor Unit, MPU for short) or programmable Logic device (Programmable logic device, referred to as PLD)) and a memory 104 for storing data, in an exemplary embodiment, the above-mentioned mobile phone client may also include a transmission device 106 and an input and output device 108 for communication functions.
  • a transmission device 106 and an input and output device 108 for communication functions.
  • the structure shown in FIG. 1 is only for illustration, and it does not limit the structure of the mobile phone client.
  • the mobile phone client may also include more or less components than those shown in FIG. 1 , or have a different configuration with functions equivalent to those shown in FIG. 1 or more functions than those shown in FIG. 1 .
  • the memory 104 can be used to store computer programs, for example, software programs and modules of application software, such as computer programs corresponding to the roasting control method in the embodiment of the present disclosure, and the processor 102 executes various functions by running the computer programs stored in the memory 104.
  • a functional application and data processing that is, to realize the above-mentioned method.
  • the memory 104 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory.
  • the memory 104 may further include a memory that is remotely located relative to the processor 102, and these remote memories may be connected to the mobile phone client through a network. Examples of the aforementioned networks include, but are not limited to, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof.
  • the transmission device 106 is used to receive or transmit data via a network.
  • the specific example of the above network may include a wireless network provided by the communication provider of the mobile terminal.
  • the transmission device 106 includes a Network Interface Controller (NIC for short), which can be connected to other network devices through a base station so as to communicate with the Internet.
  • the transmission device 106 may be a radio frequency (Radio Frequency, referred to as RF) module, which is used to communicate with the Internet in a wireless manner.
  • RF Radio Frequency
  • FIG. 2 is a flowchart of a method for binding a smart door lock according to an embodiment of the disclosure. The process includes the following steps:
  • Step S202 the client of the device management application sends a binding request to the server, wherein the binding request carries the application identification of the device management application and the wireless communication address of the smart door lock to be bound;
  • Step S204 the device binding status information fed back by the server indicates that the smart door lock is in an unbound state, and the client sends verification information to the smart door lock, wherein the verification information is used to verify the input information received by the smart door lock. verify;
  • Step S206 the client sends the verification result fed back by the smart door lock to the server;
  • Step S208 the client receives the authentication information dynamically generated by the server according to the verification result, wherein the authentication information carries an authentication key group for binding and authenticating the smart door lock according to the binding request;
  • Step S210 the client sends the confirmation message corresponding to the authentication information fed back by the smart door lock to the server;
  • Step S212 the client receives the binding instruction sent by the server, and triggers the account binding process of the smart door lock in response to the binding instruction.
  • the client before the client initiates a binding application to the server, it may, but is not limited to, ensure that the Bluetooth broadcast of the smart door lock is turned on, and then display the searched information on the display interface of the client of the device application.
  • Bluetooth list the user can select a Bluetooth device in the Bluetooth list as the smart door lock to be bound according to needs.
  • the smart door lock in each Bluetooth device has a wireless communication address (Bluetooth MAC), and different device management applications have an application identification that matches itself, such as an APP ID identification.
  • the client after the client establishes a Bluetooth connection with the smart door lock by searching for the wireless communication address of the smart door lock, the client initiates a binding request for the smart door lock to the server, wherein, in the binding request Bluetooth MAC carrying the APP ID of the client and the smart door lock.
  • the server will identify the current state of the smart door lock and the client according to the Bluetooth MAC and APP ID of the smart door lock in the binding request, wherein the current status of the smart door lock and the client includes at least "bound" or " Unbound” two states.
  • the client randomly generates a verification code, such as a 6-digit verification code. And send the verification code and the APP ID of the client to the smart door lock together to verify the input information received by the smart door lock.
  • the smart door lock After the smart door lock receives the verification code sent by the client, it will actively light up the numeric keypad on the smart door lock, and the user enters the verification code on the numeric keypad according to the prompt of the client. After the input is successful, the smart door lock will verify the verification code entered by the user. If the user enters the wrong code or does not enter the verification code within the specified time (such as 30 seconds), the verification will fail, and the smart door lock will verify the verification failure. Actively report the message to the client, and at the same time, the smart door lock exits the binding mode.
  • the smart door lock If the smart door lock successfully verifies the verification code input by the user, it sends a message of successful verification to the server.
  • the server will dynamically generate authentication information according to the APP ID of the client carried in the binding request and the Bluetooth MAC of the smart door lock, where the authentication information can include but is not limited to the binding authentication for the smart door lock.
  • the form and content of the authentication information are not limited, for example, it may be a service key, a Bluetooth key, and an authentication code.
  • the smart door lock After the smart door lock receives the authentication information sent by the server, it will proactively report a confirmation message corresponding to the authentication information to the client, and send the confirmation message to the server through the client.
  • the server After receiving the confirmation message of "authentication information has been received" fed back by the smart door lock, the server will issue a binding command to the client, and the client will correspondingly bind the command to trigger the account binding process of the smart door lock.
  • step S208 the client receives the authentication information dynamically generated by the server according to the verification result, which is related to each binding request sent by the client, and each time the client sends a new binding request, the server will Generate new authentication information. That is to say, the key for binding and authenticating the smart door lock will change continuously with the binding request initiated by the client.
  • the server will dynamically generate an authentication key group for binding and authenticating the smart door lock according to the verification result obtained by the smart door lock for the verification information received each time, and the server According to the confirmation message that the smart door lock receives the key, the binding command will be issued.
  • the key data in the smart door lock binding process is encrypted and verified, which reduces the risk of key data being attacked and improves the security of data transmission during the smart door lock binding process.
  • the client receives the authentication information dynamically generated by the server according to the verification result, including:
  • the client When the server successfully verifies the application ID and communication address carried in the binding request, the client receives the Bluetooth key sent by the server and sends the Bluetooth key to the smart door lock;
  • the client After the client sends the Bluetooth key confirmation message fed back by the smart door lock to the server, the client receives the service key sent by the server and sends the service key to the smart door lock;
  • the client After the client sends the business key confirmation message fed back by the smart door lock to the server, the client receives the authentication code sent by the server, and sends the authentication code to the smart door lock;
  • the authentication information includes a bluetooth key, a service key and an authentication code.
  • the server after receiving the verification code verification success message reported by the smart door lock, the server will verify the APP ID and Bluetooth MAC carried in the binding request, and reply the verification result to the smart door lock. door lock.
  • the smart door lock feeds back a confirmation message of "the verification result has been received" to the server.
  • the server After receiving the confirmation message, the server will send the Bluetooth key to the client through the HTTP security protocol, and the client will send the Bluetooth key to the smart door lock after receiving the Bluetooth key. And save the bluetooth key in the client at the same time.
  • the server when the server sends the Bluetooth key to the smart door lock, the server does not directly send the Bluetooth protocol to the client, but carries the Bluetooth key in the reply message of the HTTP security protocol interface. , after receiving the reply message, the client sends the Bluetooth key in the reply message to the smart door lock.
  • the smart door lock after the smart door lock receives the Bluetooth key issued by the server, it will feed back a Bluetooth key confirmation message to the client, and the client sends the Bluetooth key A confirmation message is sent to the server.
  • the server sends the service key to the client through the HTTP interface. After receiving the service key, the client sends the service key to the smart door lock. It is worth noting that, unlike the Bluetooth key issued by the server for the first time, since the smart door lock has received the Bluetooth key issued by the server, the business key issued for the second time is an encrypted key. .
  • the smart door lock after the smart door lock receives the encrypted service key, it will feed back a confirmation message of "the service key has been received" to the server, wherein the smart door lock will first confirm the The message is sent to the client, and the client transmits the confirmation message to the server by invoking the Hypertext Transfer Security Protocol in the server.
  • the server After the server receives the confirmation message, it will issue the authentication code through the interface of the HTTP security protocol, send the authentication code to the client, and save the authentication code in the client's memory at the same time.
  • the authentication code sent by the server for the third time is an encrypted key
  • the authentication code is a key encrypted twice with the Bluetooth key and the service key. That is, first encrypt the service key with the bluetooth key, and then encrypt the encrypted service key with the authentication code for the second time.
  • the server will successively issue the Bluetooth key, service key and authentication code to the client and the smart door lock, and use the Bluetooth key, service key and authentication code to
  • the key data in the binding process is encrypted twice.
  • the complexity of data processing in the binding process is enhanced, and the attacker's attack on the binding data is avoided, thereby improving the security of data transmission.
  • the above client sends the service key to the smart door lock, including:
  • the client uses the Bluetooth key to encrypt the service key to obtain a first encryption result
  • the client sends the first encryption result to the smart door lock, so that the smart door lock uses the Bluetooth key to decrypt the first encryption result to obtain the service key.
  • the server before sending the service key to the smart door lock, may, but not limited to, have sent the Bluetooth key to the client and stored the Bluetooth key in the memory of the client.
  • the client also sends the Bluetooth key to the smart door lock, and saves the Bluetooth key in the smart door lock.
  • the server After the server sends the service key to the client, the client uses the pre-saved Bluetooth key to encrypt the service key to obtain a first encryption result, and sends the first encryption result to the smart door lock.
  • the smart door lock after the smart door lock receives the first encryption result sent by the client, it may, but is not limited to, use a pre-saved Bluetooth key to decrypt the first encryption result to obtain the service key. That is to say, the service key issued by the server is not directly sent to the smart door lock, but the encrypted service key is sent to the smart door lock after the client performs encryption processing. Assuming that the Bluetooth key is equivalent to a key, the key is used to decrypt the encrypted service key.
  • the service key is encrypted and decrypted by using the Bluetooth key, so that the transmission of the service key has a high security, thus indirectly improving the security of data transmission during the smart binding process.
  • sending the authentication code to the smart door lock by the client includes at least one of the following:
  • the client uses the Bluetooth key to encrypt the authentication code to obtain the second encrypted result; the client sends the second encrypted result to the smart door lock, so that the smart door lock uses the Bluetooth key to decrypt the second encrypted result to obtain the authentication result. right code;
  • the client uses the service key to encrypt the authentication code to obtain the third encrypted result; the client sends the third encrypted result to the smart door lock, so that the smart door lock uses the service key to decrypt the third encrypted result to obtain the authentication code. right code.
  • the authentication code C* received by the smart door lock from the client is encrypted, and the authentication code C needs to be decrypted by the smart door lock to identify the authentication code C.
  • the process of decrypting the encrypted authentication code C* by the smart door lock includes at least the following two situations: one is to directly use the Bluetooth key A stored in the smart door lock to encrypt.
  • the server before issuing the authentication code, the server successively issues the Bluetooth key and the service key, and encrypts the service key after the client receives the service key. That is to say, before the server sends the authentication code to the client, the client has stored the Bluetooth key and the encrypted service key in its memory. Then, the process of the server issuing the authentication code to the smart door lock includes at least the following two situations:
  • Case 1 The server sends the authentication code to the client, and the client uses the pre-saved Bluetooth key to encrypt the authentication code, and then sends the encrypted authentication code to the smart door lock.
  • the key A encrypts the authentication code C to obtain the encrypted authentication code C*. Since the authentication code received by the smart door lock is an encrypted verification code, the smart door lock cannot directly read the encrypted authentication code. Instead, it is necessary to use the Bluetooth key A stored in the smart door lock in advance to decrypt the encrypted authentication code C*, and then obtain the authentication code;
  • Case 2 The server sends the authentication code to the client, and the client encrypts the authentication code with a pre-saved service key to obtain a third encrypted result, wherein the third encrypted result contains the encrypted authentication code. right code.
  • the client uses the Bluetooth key A to encrypt the service key B to obtain the encrypted service key B*, and then use the encrypted service key B* to encrypt the authentication code C to obtain the encrypted authentication code C*.
  • the smart door lock will use the pre-saved service key B to decrypt the encrypted authentication code C* to obtain the authentication code.
  • the client after receiving the authentication code sent by the server, the client only encrypts the authentication code once with the Bluetooth key.
  • the service key stored in the client is encrypted with the Bluetooth key
  • the client after receiving the authentication code sent by the server, the client will use the encrypted
  • the service key encrypts the authentication code again, that is, in the second case, after receiving the authentication code, the client actually encrypts the authentication code twice (obtaining the third encryption result) .
  • the smart door lock After sending the third encryption result to the smart door lock, the smart door lock will first use the encrypted business key to decrypt the third encryption result to obtain an intermediate result;
  • the authentication code in the original state issued by the server can be obtained only after the second decryption.
  • one of the above two situations can be set as the way for the client to send the authentication code to the smart door lock as required.
  • the client encrypts the authentication code sent by the server, so that the interaction between the smart door lock and the client has higher security.
  • the above client sends the verification result fed back by the smart door lock to the server, including:
  • the client invokes the hypertext transmission link to send the verification result to the server, so that the server sends the authentication information in the interface corresponding to the hypertext transmission link.
  • the hypertext transmission link may include but not limited to an access request in the form of https, and through the https interface, the client can not only send the verification result of the smart door lock feedback to the server, but also send the confirmation of the smart door lock feedback to the server.
  • the message is sent to the server.
  • the server sends the Bluetooth key, service key and authentication code to the client
  • data transmission is also performed through the https interface. That is, the interaction between the client and the server is performed through the https interface.
  • the data is encrypted once or more times, so that the data interaction between the client and the server has a higher safety.
  • the above client triggers the account binding process of the smart door lock in response to the binding instruction, including:
  • the client sends binding information to the server, wherein the binding information carries a user account matching the client;
  • the client receives the binding result returned by the server, wherein the binding result is used to indicate that the binding between the user account and the smart door lock has been completed.
  • the smart door lock after the server issues the Bluetooth key, service key and authentication code to encrypt the data in the binding process, the smart door lock will reply to the server with a confirmation that the encryption is complete message (that is, the last time the smart door lock received the confirmation message sent by the service after authentication).
  • the client After receiving the confirmation message, the client sends the confirmation message to the server, and the server sends the binding information to the client according to the confirmation message.
  • the binding information includes at least a user account matching the client.
  • the client sends the binding information to the smart door lock, and then sends the confirmation message replied by the smart door lock to the server, and the server sends an instruction for the next step of binding to the client to start the binding process of the user account.
  • the server After the binding of the user account and the smart door lock is completed, the server will send a binding completion result to the client to indicate that the binding process of the smart door lock is completed.
  • the client of the above-mentioned device management application before the client of the above-mentioned device management application sends the binding request to the server, it also includes:
  • the client When the smart door lock is in the Bluetooth broadcasting state, the client displays a list of Bluetooth identifiers that are currently allowed to connect;
  • the client will use the application identification of the device management application and the wireless communication address of the smart door lock matching the Bluetooth identification of the door lock to generate a binding request, wherein the wireless communication address includes a Bluetooth communication physical address.
  • the list of Bluetooth identifiers allowed to connect may include but not limited to the Bluetooth identifier of the door lock of the smart door lock, and may also include the Bluetooth identifier of the speaker of the smart speaker, the Bluetooth identifier of the smart air conditioner, and the Bluetooth identifier of the smart refrigerator.
  • Bluetooth identification of the selected smart door lock can be determined.
  • the client After determining the Bluetooth ID of the door lock, the client can use its own application ID, such as APP ID, and the wireless communication address (such as Bluetooth MAC) of the smart door lock that matches the Bluetooth ID of the selected door lock to generate a binding request , where the application ID of each client is a unique ID matching the client.
  • the client sends a binding request to the server, it will report the unique identifier matching the client and the Bluetooth MAC of the smart door lock to the server.
  • the execution subject in the above-mentioned embodiments provided by the present disclosure is the client of the device management application.
  • the embodiments of the present disclosure also provide a binding method for a smart door lock. Applied to the target server, specifically, as shown in Figure 3, the process includes the following steps:
  • Step S302 the server receives the binding request sent by the client of the device management application, wherein the binding request carries the application identification of the device management application and the wireless communication address of the smart door lock to be bound;
  • Step S304 in response to the binding request, the server sends device binding status information to the client to instruct the client to send verification information to the smart door lock when it is determined that the device binding status information indicates that the smart door lock is not bound, Among them, the verification information is used to verify the input information received in the smart door lock;
  • Step S306 the server receives the verification result of the smart door lock feedback sent by the client;
  • Step S308 based on the verification result, the server dynamically generates authentication information and sends the authentication information to the client, wherein the authentication information carries an authentication key for binding and authenticating the smart door lock according to the binding request Group;
  • Step S310 the server receives the confirmation message corresponding to the authentication information sent by the smart door lock sent by the client;
  • step S312 the server sends a binding instruction value to the client to instruct the client to trigger an account binding process of the smart door lock in response to the binding instruction.
  • the server After the server receives the binding request sent by the client, the server will identify the current status of the client and the smart door lock according to the client's APP ID and the MAC that can lock the Bluetooth. When the recognition result shows that the smart door lock is in an unbound state, the server will dynamically generate authentication information based on the APP ID of the client carried in the binding request and the Bluetooth MAC of the smart door lock, which is used to authenticate the smart door lock. lock for binding authentication.
  • the data in the binding process of the smart door lock is bound and authenticated (such as encryption and verification), which reduces the risk of key data being attacked and improves It ensures the security of data transmission during the binding process of smart door locks.
  • the authentication information can be dynamically generated based on the verification result and sent to the client in the following manner:
  • the server sends the Bluetooth key to the client to instruct the client to send the Bluetooth key to the smart door lock;
  • the server After receiving the Bluetooth key confirmation message fed back by the smart door lock, the server sends the service key to the client to instruct the client to send the service key to the smart door lock;
  • the server After receiving the service key confirmation message fed back by the smart door lock, the server sends the authentication code to the client, and sends the authentication code to the smart door lock.
  • the server after the server receives the verification success message reported by the smart door lock, the server will sequentially send the Bluetooth key, the service key and the authentication code to the client.
  • the specific process is: after the server receives the message of successful verification, it sends the Bluetooth key to the client to instruct the client to send the Bluetooth key to the smart door lock; After receiving the confirmation message of "Bluetooth Key”, the server sends the service key to the client to instruct the client to send the encrypted service key to the smart door lock; After the confirmation message of "business key”, the server sends the authentication code to the client to instruct the client to send the encrypted authentication code to the smart door lock.
  • the client's memory has stored the Bluetooth key. After receiving the service key, the client will use the Bluetooth key to encrypt the service key, and then The encrypted service key is sent to the smart door lock.
  • the client before the server sends the authentication code to the client, the client has stored the Bluetooth key and the encrypted service key in its memory. After the client receives the authentication code, it will use the pre-saved Bluetooth key to encryption key and encrypted service key to encrypt the authentication code, so that the authentication code is transmitted to the smart door lock in encrypted form.
  • the server will sequentially send the Bluetooth key, the encrypted service key and the encrypted authentication code to the smart door lock, so that the security of data transmission between the server and the smart door lock is relatively high. It prevents the attacker from attacking the data in the binding process of the smart door lock, and reduces the loss of the user's interests.
  • the verification result of the smart door lock feedback sent by the receiving client includes:
  • the server receives the verification result sent by the client calling the hypertext transmission link, and based on the verification result, sends authentication information in an interface corresponding to the hypertext transmission connection.
  • the server can not only receive the verification result sent by the client, but also receive the confirmation message fed back by the smart door lock.
  • the server also needs to send the bluetooth key, service key and authentication code to the client in sequence through the hypertext transmission link.
  • the data is encrypted at least once, which reduces the risk of data being attacked and improves the security of data transmission. safety.
  • the above-mentioned sending binding instruction to the client to instruct the client to trigger the account binding process of the smart door lock in response to the binding instruction including:
  • the server receives the binding information sent by the client, wherein the binding information carries the user account matched by the client;
  • the server returns a binding result to the client, wherein the binding result is used to indicate that the binding between the user account and the smart door lock has been completed.
  • the server after the server sequentially sends the Bluetooth key, service key and authentication code to the smart door lock, it will receive a confirmation message from the smart door lock, and the server sends the client an Send the binding information to instruct the client to send the binding information to the smart door lock.
  • the server After receiving the confirmation message of "binding information received" replied by the smart door lock, the server will send an instruction for the next step of binding to the client to start the process of binding the user account. After the binding of the user account and the smart door lock is completed, the server will send a binding completion result to the client to indicate that the binding process of the smart door lock is completed.
  • the data in the binding process of the smart door lock can be encrypted, which solves the problem in related technologies that the binding process can be executed based on the verification information by establishing a Bluetooth connection between the client and the smart door lock.
  • the execution subject of the above steps is the smart door lock binding server.
  • the present disclosure also provides a binding method for smart door locks, which is applied to smart door locks. Specifically, as shown in Figure 4, the process includes the following steps:
  • Step S402 the smart door lock receives verification information sent by the client, wherein the verification information is used to verify the received input information;
  • Step S404 the smart door lock feeds back the verification result, and sends the verification result to the server through the client to instruct the server to send the authentication information dynamically generated according to the verification result to the client;
  • Step S406 the smart door lock feeds back a confirmation message corresponding to the authentication information to instruct the client to send the authentication information to the server;
  • step S408 the smart door lock starts an account binding process.
  • the smart door lock when it is confirmed that the smart door lock is in an unbound state, the smart door lock will receive a verification code randomly generated by the client (for example, a 6-digit verification code) and an APP generated by the client itself. ID. According to the prompt of the client, the user enters a 6-digit verification code on the digital keypad of the smart door lock. After the input is successful, the smart door lock will verify the verification code entered by the user.
  • a verification code randomly generated by the client for example, a 6-digit verification code
  • an APP generated by the client itself. ID.
  • ID the user enters a 6-digit verification code on the digital keypad of the smart door lock. After the input is successful, the smart door lock will verify the verification code entered by the user.
  • the smart door lock If the smart door lock successfully verifies the verification code input by the user, it sends a successful verification message (verification result) to the client to instruct the client to send the verification success message (verification result) to the service. Then the smart door lock will receive the authentication information dynamically generated by the server according to the verification result, and reply the confirmation message of "authentication information has been received" to the client to instruct the client to send the authentication information to the server, and then start the smart door Lock binding process.
  • the above-mentioned user enters the verification code on the numeric keypad according to the prompt of the client, and also includes: if the user enters the wrong code or does not enter the verification code within the specified time (such as 30 seconds), the verification fails, and the smart door lock will Actively report the verification failure message to the client, and at the same time, the smart door lock exits the binding mode.
  • the specified time such as 30 seconds
  • the smart door lock receives the verification code randomly generated by the client, and verifies the verification code. If the verification is successful, the smart door lock will receive the authentication information dynamically generated by the server according to the verification result, and reply a confirmation message to the server, and then start the binding process of the smart door lock.
  • dynamic acquisition of verification information and confirmation messages is used in the data transmission process between the smart door lock and the client and server, and the data in the binding process of the smart door lock is encrypted, making the data irregular. .
  • the attack on the binding process of the smart door lock by using the simulated data is avoided, the reliability of the binding process of the smart door lock is improved, and the security of data transmission is improved.
  • the above-mentioned verification result is fed back, and the verification result is sent to the server through the client to instruct the server to send the authentication information dynamically generated according to the verification result to the client, including:
  • the smart door lock receives the Bluetooth key sent by the client;
  • the smart door lock sends a confirmation message of the Bluetooth key to the client to instruct the client to send the confirmation message of the Bluetooth key to the server;
  • the smart door lock After the server receives the confirmation message of the Bluetooth key sent by the client, the smart door lock receives the service key sent by the client;
  • the smart door lock sends a confirmation message of the service key to the client to instruct the client to send the confirmation message of the service key to the server;
  • the smart door lock After the server receives the confirmation message of the business key sent by the client, the smart door lock receives the authentication code sent by the client;
  • the authentication information includes a bluetooth key, a service key and an authentication code.
  • the smart door lock sequentially receives the Bluetooth key, service key and authentication code sent by the server.
  • the Bluetooth key A received for the first time is not encrypted;
  • the service key B* received for the second time is after the client uses the Bluetooth key to encrypt the service key B key information;
  • the authentication code C* received for the third time is the key information obtained by encrypting the authentication code C by the client using the Bluetooth key and/or the encrypted service key.
  • the key data in the binding process are encrypted twice by using the Bluetooth key, the service key and the authentication code.
  • the security of the data interaction process between the smart door lock and the client, and between the client and the server is high, thereby improving the reliability of data transmission.
  • the above receiving service key sent by the client includes:
  • the smart door lock receives the first encryption result sent by the client, wherein the first encryption result is obtained by the client using the Bluetooth key to encrypt the service key;
  • the smart door lock uses the Bluetooth key to decrypt the first encryption result to obtain the service key.
  • the smart door lock After the smart door lock receives the first encryption result sent by the client, it does not directly identify the service key B contained in the first encryption result B*, but needs to use the Only by decrypting the first encryption result B* of the Bluetooth key of the lock, can the service key B issued by the server be obtained.
  • the above-mentioned authentication code sent by the receiving client includes at least one of the following:
  • the smart door lock receives the second encryption result sent by the client, wherein the second encryption result is obtained by the client using the Bluetooth key to encrypt the authentication code;
  • the smart door lock uses the Bluetooth key to decrypt the second encryption result to obtain the authentication code
  • the smart door lock receives the third encryption result sent by the client, wherein the third encryption result is obtained by the client using the service key to encrypt the authentication code;
  • the smart door lock uses the service key to decrypt the third encryption result to obtain the authentication code.
  • the authentication code C* received by the smart door lock from the client is encrypted, and the authentication code C needs to be decrypted by the smart door lock to identify the authentication code C.
  • the process of decrypting the encrypted authentication code C* by the smart door lock includes at least the following two situations: one is to directly use the Bluetooth key A stored in the smart door lock to decrypt the encrypted authentication code C* , you can get the authentication code C; the other is to use the business key B stored in the smart door lock to decrypt the authentication code C* once, and then use the Bluetooth key A stored in the smart door lock Only after the second decryption process can the authentication code C issued by the server be obtained.
  • the smart door lock will select the corresponding decryption processing method according to the encryption processing of the authentication code by the client, and both methods require the smart door lock to encrypt the encrypted authentication code.
  • Decryption processing is performed, so that the transmission process of the authentication code has high privacy, thereby improving the security of data transmission.
  • the above-mentioned activation account binding process includes:
  • the smart door lock receives the binding information sent by the client, wherein the binding information carries the user account matching the client;
  • the smart door lock starts the account binding process.
  • the smart door lock After the smart door lock receives the binding information sent by the client and sends a confirmation message to the server through the client, it can use the user account that matches the client and the smart door lock carried in the binding information. to bind.
  • the present disclosure also provides an overall flowchart of a smart door binding method, specifically, as shown in FIG. 5 :
  • the APP After the APP establishes a Bluetooth connection with the door lock, the APP initiates a binding application to the Server, requests a verification code (6 digits) to be generated randomly, and sends the verification code and its own APP ID information to the smart door lock. Prompt the user to enter the verification code on the smart door lock.
  • the smart door lock After the smart door lock receives the verification code issued by the APP, it will actively light up the numeric keypad, and the user enters the verification code on the smart door lock according to the prompts of the APP. After inputting, the device will verify whether the verification code entered by the user is Correct, if the user enters an error or does not enter within 30 seconds, the validation fails. The device will actively report the verification failure message to the APP, and the device will exit the binding mode at the same time.
  • the server After the server receives the message that the verification code is successfully verified from the device, it will verify the information, including verifying the information carried when the APP initiates the binding request, and reply the verification result to the Smart door lock.
  • the server side replies to the smart door lock and APP with the following information: business key, Bluetooth key, and authentication code.
  • the smart door lock replies with an ACK message after receiving the authentication result from the server.
  • the APP sends the message to the server by calling HTTPS.
  • the server gives the Bluetooth key in the response of the HTTPS interface.
  • the APP sends the Bluetooth key to the smart door. lock, and at the same time save the key in the APP memory for subsequent communication;
  • the smart door lock After the smart door lock receives the Bluetooth key, it will reply with an ACK message.
  • the APP sends the message to the server by calling HTTPS, and the server gives the service key information in the response of the HTTPS interface. (Since the smart door lock already has a Bluetooth key, the message here is an encrypted message), and the APP will send the business key to the smart door lock after receiving the response;
  • the smart door lock After the smart door lock receives the service key, it will reply with an ACK message.
  • the APP calls the HTTPS interface on the server side to transmit the message to the server side. Bluetooth key and business key, so the message here is the message encrypted by the key), the APP sends the message to the smart door lock after receiving the response, and saves the authentication code in the memory at the same time, which is convenient for future Communication, specifically steps S530-S552.
  • steps S554-S570 after the APP receives the confirmation message of receiving the authentication code from the smart door lock, the APP sends the confirmation message to the Server, and the Server sends the APP a message (telling the APP that the binding has been satisfied). Certain conditions), that is, the server sends an instruction that can be bound, and the APP will initiate the account binding process (carrying MAC address information, etc. to initiate an HTTPS request to the server).
  • the client After the client initiates a binding request, it first applies for a Bluetooth key and a service key at the server side, and then transmits the binding data after encryption, and each time a binding request is initiated, the Bluetooth key and service key The key will be changed, so that the dynamically obtained Bluetooth key and service key have no rules to follow, providing security for data transmission.
  • the method according to the above embodiments can be implemented by means of software plus a necessary general-purpose hardware platform, and of course also by hardware, but in many cases the former is better implementation.
  • the technical solution of the present disclosure can be embodied in the form of a software product in essence or the part that contributes to the related technology.
  • the computer software product is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk, etc.) ) includes several instructions to make a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) execute the method of each embodiment of the present disclosure.
  • a binding device for an intelligent door lock is also provided, which is used to implement the above embodiments and optional implementation manners, and those that have been explained will not be repeated here.
  • the term "module” may be a combination of software and/or hardware that realizes a predetermined function.
  • the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.
  • Fig. 6 is a structural block diagram of a binding device for a smart door lock according to an embodiment of the present disclosure, the device includes:
  • the first sending unit 602 is configured to send a binding request to the server, wherein the binding request carries the application identification of the device management application and the wireless communication address of the smart door lock to be bound;
  • the second sending unit 604 is configured to send verification information to the smart door lock when the device binding status information fed back by the server indicates that the smart door lock is not bound, wherein the verification information is used to verify the Enter information for verification;
  • the third sending unit 606 is configured to send the verification result fed back by the smart door lock to the server;
  • the first receiving unit 608 is configured to receive authentication information dynamically generated by the server according to the verification result, wherein the authentication information carries an authentication key group for binding and authenticating the smart door lock according to the binding request;
  • the fourth sending unit 610 is configured to send the confirmation message corresponding to the authentication information fed back by the smart door lock to the server;
  • the second receiving unit 612 is configured to receive a binding instruction sent by the server, and trigger an account binding process of the smart door lock in response to the binding instruction.
  • the above-mentioned first receiving unit 608 is also configured to receive the Bluetooth key sent by the server and send the Bluetooth key to the smart Door lock; after the client sends the Bluetooth key confirmation message fed back by the smart door lock to the server, the client receives the service key sent by the server and sends the service key to the smart door lock; the client sends the smart door lock After the feedback service key confirmation message is sent to the server, the client receives the authentication code sent by the server and sends the authentication code to the smart door lock; the authentication information includes the Bluetooth key, the service key and the authentication key. code.
  • the above-mentioned first receiving unit 608 is also configured to use the Bluetooth key to encrypt the service key to obtain the first encryption result; the client sends the first encryption result to the smart door lock, so that the smart door lock uses Bluetooth The key decrypts the first encryption result to obtain the service key.
  • the above-mentioned first receiving unit 608 is also configured to encrypt the authentication code with a Bluetooth key to obtain a second encryption result; the client sends the second encryption result to the smart door lock, so that the smart door lock uses Bluetooth The key decrypts the second encryption result to obtain the authentication code; the client uses the service key to encrypt the authentication code to obtain the third encryption result; the client sends the third encryption result to the smart door lock, so that the smart door The lock uses the service key to decrypt the third encryption result to obtain the authentication code.
  • the third sending unit 606 is further configured to invoke a hypertext transmission link to send the verification result to the server, so that the server sends the authentication information in an interface corresponding to the hypertext transmission link.
  • the above-mentioned second receiving unit 612 is also configured to send binding information to the server, wherein the binding information carries a user account matching the client; the client receives the binding result returned by the server, wherein the binding The result is used to indicate that the user account has been bound to the smart door lock.
  • the binding device of the smart door lock is also configured to display a list of Bluetooth identifications that are currently allowed to link when the smart door lock is in the Bluetooth broadcasting state before the first sending unit 602 executes sending;
  • the selection operation performed on the terminal determines the Bluetooth ID of the selected smart door lock; the client will use the application ID of the device management application and the wireless communication address of the smart door lock that matches the Bluetooth ID of the door lock to generate a binding request.
  • the wireless communication address includes a Bluetooth communication physical address.
  • the present disclosure also provides another smart door lock binding device, which is applied to a device management application server.
  • the device includes:
  • the third receiving unit 702 is configured to receive the binding request sent by the client of the device management application, wherein the binding request carries the application identification of the device management application and the wireless communication address of the smart door lock to be bound;
  • the first processing unit 704 is configured to send device binding status information to the client in response to the binding request, so as to instruct the client to send the device binding status information to the smart door lock if the device binding status information indicates that the smart door lock is not bound.
  • Verification information wherein the verification information is used to verify the input information received at the smart door lock;
  • the fourth receiving unit 706 is configured to receive the verification result of the smart door lock feedback sent by the client;
  • the second processing unit 708 is configured to dynamically generate authentication information based on the verification result, and send the authentication information to the client, wherein the authentication information carries the binding authentication of the smart door lock according to the binding request Authentication key set;
  • the fifth receiving unit 710 is configured to receive a confirmation message corresponding to the authentication information fed back by the smart door lock sent by the client;
  • the fifth sending unit 712 is configured to send a binding instruction value to the client to instruct the client to trigger the account binding process of the smart door lock in response to the binding instruction.
  • the above-mentioned second processing unit 708 is also configured to send the Bluetooth key to the client when the verification of the application identification and communication address carried in the binding request is successful, so as to instruct the client to send the Bluetooth key to to the smart door lock; after receiving the Bluetooth key confirmation message fed back by the smart door lock, send the service key to the client to instruct the client to send the service key to the smart door lock; after receiving the service key feedback from the smart door lock After the key confirmation message, send the authentication code to the client, and send the authentication code to the smart door lock.
  • the second processing unit 708 is further configured to receive the verification result sent by the client calling the hypertext transfer connection, and based on the verification result, send the authentication information in the interface corresponding to the hypertext transfer connection.
  • the above-mentioned fifth sending unit 712 is also configured to receive binding information sent by the client, wherein the binding information carries the user account matched by the client; return the binding result to the client, wherein the binding result It is used to indicate that the user account has been bound to the smart door lock.
  • the present disclosure also provides another binding device for a smart door lock, which is applied to a smart door lock.
  • the device includes:
  • the sixth receiving unit 802 is configured to receive verification information sent by the client, where the verification information is used to verify the received input information;
  • the first feedback unit 804 is configured to feed back the verification result, and send the verification result to the server through the client, so as to instruct the server to send the authentication information dynamically generated according to the verification result to the client;
  • the second feedback unit 806 is configured to feed back a confirmation message corresponding to the authentication information, so as to instruct the client to send the authentication information to the server;
  • the starting unit 808 is configured to start the account binding process.
  • the above-mentioned first feedback unit 804 is also configured to receive the Bluetooth key sent by the client; send a confirmation message of the Bluetooth key to the client to instruct the client to send the confirmation message of the Bluetooth key to the server; After receiving the confirmation message of the Bluetooth key sent by the client, receive the service key sent by the client; send the confirmation message of the service key to the client to instruct the client to send the confirmation message of the service key to the server; After receiving the confirmation message of the service key sent by the client, the server receives the authentication code sent by the client; wherein, the authentication information includes the Bluetooth key, the service key and the authentication code.
  • the above-mentioned first feedback unit 804 is also configured to receive the first encryption result sent by the client, wherein the first encryption result is obtained by the client using the Bluetooth key to encrypt the service key; using the Bluetooth key, The first encryption result is decrypted to obtain the service key.
  • the above-mentioned first feedback unit 804 is also configured to receive a second encryption result sent by the client, wherein the second encryption result is obtained by the client using the Bluetooth key to encrypt the authentication code; using the Bluetooth key, Decrypting the second encryption result to obtain an authentication code; receiving a third encryption result sent by the client, wherein the third encryption result is obtained by the client using a service key to encrypt the authentication code; using the service key, The third encryption result is decrypted to obtain an authentication code.
  • the above-mentioned starting unit 808 is also configured to set the binding information sent to the client, wherein the binding information carries the user account matched by the client; based on the user account, start the account binding process.
  • Embodiments of the present disclosure also provide a computer-readable storage medium, in which a computer program is stored, wherein the computer program is set to execute the steps in any one of the above method embodiments when running.
  • the above-mentioned storage medium may be configured to store a computer program for performing the following steps:
  • the client of the device management application sends a binding request to the server, wherein the binding request carries the application identifier of the device management application and the wireless communication address of the smart door lock to be bound;
  • the device binding status information fed back by the server indicates that the smart door lock is in an unbound state
  • the client sends verification information to the smart door lock, wherein the verification information is used to verify the input information received by the smart door lock ;
  • the client sends the verification result fed back by the smart door lock to the server;
  • the client receives the authentication information dynamically generated by the server according to the verification result, wherein the authentication information carries an authentication key group for binding and authenticating the smart door lock according to the binding request;
  • the client sends the confirmation message corresponding to the authentication information fed back by the smart door lock to the server;
  • the client receives the binding instruction sent by the server, and triggers the account binding process of the smart door lock in response to the binding instruction.
  • the above-mentioned computer-readable storage medium may include but not limited to: U disk, read-only memory (Read-Only Memory, referred to as ROM), random access memory (Random Access Memory, referred to as RAM) , mobile hard disk, magnetic disk or optical disk and other media that can store computer programs.
  • ROM read-only memory
  • RAM random access memory
  • mobile hard disk magnetic disk or optical disk and other media that can store computer programs.
  • Embodiments of the present disclosure also provide an electronic device, including a memory and a processor, where a computer program is stored in the memory, and the processor is configured to run the computer program to execute the steps in any one of the above method embodiments.
  • the above-mentioned processor may be configured to execute the following steps through a computer program:
  • the client of the device management application sends a binding request to the server, wherein the binding request carries the application identifier of the device management application and the wireless communication address of the smart door lock to be bound;
  • the device binding status information fed back by the server indicates that the smart door lock is in an unbound state
  • the client sends verification information to the smart door lock, wherein the verification information is used to verify the input information received by the smart door lock ;
  • the client sends the verification result fed back by the smart door lock to the server;
  • the client receives the authentication information dynamically generated by the server according to the verification result, wherein the authentication information carries an authentication key group for binding and authenticating the smart door lock according to the binding request;
  • the client sends the confirmation message corresponding to the authentication information fed back by the smart door lock to the server;
  • the client receives the binding instruction sent by the server, and triggers an account binding process of the smart door lock in response to the binding instruction.
  • the electronic device may further include a transmission device and an input and output device, wherein the transmission device is connected to the processor, and the input and output device is connected to the processor.
  • each module or each step of the above-mentioned embodiments of the present disclosure can be implemented by a general-purpose computing device, and they can be concentrated on a single computing device, or distributed among multiple computing devices They may be implemented in program code executable by a computing device, stored in a storage device, executed by a computing device, and in some cases executed in an order different from that described herein.
  • the steps shown or described are realized by making them into respective integrated circuit modules, or making multiple modules or steps among them into a single integrated circuit module. As such, embodiments of the present disclosure are not limited to any specific combination of hardware and software.
  • the client sends to the smart door lock verification information for verifying the input information received by the smart door lock, and sends the The verification result is sent to the server, and the server dynamically generates authentication information according to the verification result, and sends the authentication information to the smart door lock.
  • the client then sends the confirmation message corresponding to the authentication information fed back by the smart door lock to the server, and the server can issue a binding command to the client to trigger the account binding process of the smart door lock.
  • the server does not immediately issue the binding command of the smart door lock, but dynamically generates a binding command for the smart door lock according to the binding request according to the verification result.
  • the authentication key group and then through the confirmation message corresponding to the authentication information fed back by the smart door lock, the server sends a binding command to the client, thereby realizing the account binding of the smart door lock.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本公开公开了一种智能门锁的绑定方法和装置、存储介质及电子装置,其中,上述方法包括:设备管理应用的客户端向服务器发送绑定请求;在服务器反馈的设备绑定状态信息指示智能门锁处于未被绑定的状态,客户端向智能门锁发送验证信息;客户端将智能门锁反馈的验证结果发送给服务器;客户端接收服务器根据验证结果动态生成的鉴权信息,其中,鉴权信息中携带有根据绑定请求对智能门锁进行绑定鉴权的鉴权密钥组;客户端将智能门锁反馈的与鉴权信息对应的确认消息发送给服务器;客户端接收服务器发送的绑定指令,并响应于绑定指令,触发智能门锁的账号绑定过程。

Description

智能门锁的绑定方法和装置、存储介质及电子装置
本公开要求于2021年12月16日提交中国专利局、申请号为202111547683.9、发明名称“智能门锁的绑定方法和装置、存储介质及电子装置”的中国专利申请的优先权,其全部内容通过引用结合在本公开中。
技术领域
本公开实施例涉及智能门锁技术领域,具体而言,涉及一种智能门锁的绑定方法和装置、存储介质及电子装置。
背景技术
随着物联网科技的发展,智能设备已经逐渐普及到每一个家庭中,普通智能门锁主要通过客户端与蓝牙门锁设备建立蓝牙连接,即可对智能门锁进行读写操作,这就使得通过蓝牙连接后可以采用模拟数据对智能门锁进行操控,导致了智能门锁绑定过程中的关键数据容易被攻击。
也就是说,相关技术中提供的仅通过蓝牙连接来对智能门锁进行读写操作的方法,存在智能门锁绑定时数据传输安全性较低的问题。
针对上述问题,目前尚未提出有效的解决方案。
发明内容
本公开实施例提供了一种智能门锁的绑定方法和装置、存储介质及电子装置,以至少解决智能门锁绑定过程中的数据传输安全性较低的问题。
根据本公开实施例的一方面,提供一种智能门锁的绑定方法,包括:设备管理应用的客户端向服务器发送绑定请求,其中,绑定请求中携带有设备管理应用的应用标识及待绑定的智能门锁的无线通信地址;在服务器反馈的设备绑定状态信息指示智能门锁处于未被绑定的状态,客户端向智 能门锁发送验证信息,其中,验证信息用于对在智能门锁接收的输入信息进行验证;客户端将智能门锁反馈的验证结果发送给服务器;客户端接收服务器根据验证结果动态生成的鉴权信息,其中,鉴权信息中携带有根据绑定请求对智能门锁进行绑定鉴权的鉴权密钥组;客户端将智能门锁反馈的与鉴权信息对应的确认消息发送给服务器;客户端接收服务器发送的绑定指令,并响应于绑定指令,触发智能门锁的账号绑定过程。
根据本公开实施例的另一方面,还提供一种智能门锁的绑定方法,包括:服务器接收设备管理应用的客户端发送的绑定请求,其中,绑定请求中携带有设备管理应用的应用标识及待绑定的智能门锁的无线通信地址;响应绑定请求,服务器向客户端发送设备绑定状态信息,以指示客户端在确定设备绑定状态信息指示智能门锁处于未绑定的情况下,向智能门锁发送验证信息,其中,验证信息用于对在智能门锁接收的输入信息进行验证;服务器接收客户端发送的智能门锁反馈的验证结果;基于验证结果,服务器动态生成鉴权信息,并将鉴权信息发送给客户端,其中,鉴权信息中携带有根据绑定请求对智能门锁进行绑定鉴权的鉴权密钥组;服务器接收客户端发送的智能门锁反馈的与鉴权信息对应的确认消息;服务器发送绑定指令至客户端,以指示客户端响应于绑定指令,触发智能门锁的账号绑定过程。
根据本公开实施例的又一方面,还提供一种智能门锁的绑定方法,包括:智能门锁接收客户端发送的验证信息,其中,验证信息用于对接收到的输入信息进行验证;智能门锁反馈验证结果,并通过客户端将验证结果发送至服务器,以指示服务器将根据验证结果动态生成的鉴权信息发送至客户端;智能门锁反馈与鉴权信息对应的确认消息,以指示客户端将鉴权信息发送至服务器;智能门锁启动账号绑定过程。
根据本公开实施例的又一方面,还提供一种智能门锁的绑定装置,应用于设备应用管理应用的客户端,包括:第一发送单元,设置为向服务器发送绑定请求,其中,绑定请求中携带有设备管理应用的应用标识及待绑 定的智能门锁的无线通信地址;第二发送单元,设置为在服务器反馈的设备绑定状态信息指示智能门锁处于未被绑定的状态,向智能门锁发送验证信息,其中,验证信息用于对在智能门锁接收的输入信息进行验证;第三发送单元,设置为将智能门锁反馈的验证结果发送给服务器;第一接收单元,设置为收服务器根据验证结果动态生成的鉴权信息,其中,鉴权信息中携带有根据绑定请求对智能门锁进行绑定鉴权的鉴权密钥组;第四发送单元,设置为将智能门锁反馈的与鉴权信息对应的确认消息发送给服务器;第二接收单元,用于接收服务器发送的绑定指令,并响应于绑定指令,触发智能门锁的账号绑定过程。
根据本公开实施例的又一方面,还提供一种智能门锁的绑定装置,应用于设备管理应用的服务器,包括:第三接收单元,设置为接收设备管理应用的客户端发送的绑定请求,其中,绑定请求中携带有设备管理应用的应用标识及待绑定的智能门锁的无线通信地址;第一处理单元,设置为响应绑定请求,向客户端发送设备绑定状态信息,以指示客户端在确定设备绑定状态信息指示智能门锁处于未绑定的情况下,向智能门锁发送验证信息,其中,验证信息用于对在智能门锁接收的输入信息进行验证;第四接收单元,设置为接收客户端发送的智能门锁反馈的验证结果;第二处理单元,设置为基于验证结果动态生成鉴权信息,并将鉴权信息发送给客户端,其中,鉴权信息中携带有根据绑定请求对智能门锁进行绑定鉴权的鉴权密钥组;第五接收单元,用于服务器接收客户端发送的智能门锁反馈的与鉴权信息对应的确认消息;第五发送单元,用于服务器发送绑定指令值客户端,以指示客户端响应于绑定指令,触发智能门锁的账号绑定过程。
根据本公开实施例的又一方面,还提供一种智能门锁的绑定装置,应用于智能门锁,包括:第六接收单元,设置为接收客户端发送的验证信息,其中,验证信息用于对接收到的输入信息进行验证;第一反馈单元,设置为反馈验证结果,并通过客户端将验证结果发送至服务器,以指示服务器将根据验证结果动态生成的鉴权信息发送至客户端;第二反馈单元,设置为反馈与鉴权信息对应的确认消息,以指示客户端将鉴权信息发送至服务 器;启动单元,设置为启动账号绑定过程。
通过本公开实施例,在客户端发送绑定请求,且服务器反馈智能门锁处于未被绑定的情况下,客户端向智能门锁发送用于验证智能门锁接收的输入信息的验证信息,并将智能端反馈的验证结果发送给服务器,服务器根据验证结果动态生成鉴权信息,并将鉴权信息下发给智能门锁。客户端再将智能门锁反馈的与鉴权信息对应的确认消息发送给服务器,服务器即可向客户端下发绑定指令,触发智能门锁的账号绑定过程。也就是说,在智能门锁反馈验证结果后,服务器并不会立即下发智能门锁的绑定指令,而是根据验证结果动态生成携带有根据绑定请求对智能门锁进行绑定鉴权的鉴权密钥组,然后通过智能门锁反馈的与鉴权信息对应的确认消息,服务器向客户端下发绑定指令,从而实现智能门锁的账号绑定。通过采用动态获取密钥的方式,对智能门锁绑定过程中的关键数据进行加密和校验,降低了关键数据被攻击的风险,提高了智能门锁绑定过程中的数据传输的安全性。
附图说明
此处所说明的附图用来提供对本公开实施例的进一步理解,构成本公开的一部分,本公开的示例性实施例及其说明用于解释本公开,并不构成对本公开的不当限定。在附图中:
图1是根据本公开实施例的一种可选的智能门锁的绑定方法的硬件环境的示意图;
图2是根据本公开实施例的一种可选的智能门锁的绑定方法的流程图;
图3是根据本公开实施例的另一种可选的智能门锁的绑定方法的流程图;
图4是根据本公开实施例的又一种可选的智能门锁的绑定方法的流程图;
图5根据本公开实施例的一种可选的智能门锁的绑定方法的整体流程图;
图6是根据本公开实施例的智能门锁的绑定装置的结构框图(一);
图7是根据本公开实施例的智能门锁的绑定装置的结构框图(二);
图8是根据本公开实施例的智能门锁的绑定装置的结构框图(三)。
具体实施方式
为了使本技术领域的人员更好地理解本公开方案,下面将结合本公开实施例中的附图,对本公开实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本公开一部分的实施例,而不是全部的实施例。基于本公开中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都应当属于本公开保护的范围。
需要说明的是,本公开的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的本公开的实施例能够以除了在这里图示或描述的那些以外的顺序实施。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。
本公开实施例中所提供的方法实施例可以在计算机终端或者类似的运算装置中执行。以运行在手机终端上为例,图1是本公开实施例的智能门锁的绑定方法的手机客户端的硬件结构框图。如图1所示,手机客户端可以包括一个或多个(图1中仅示出一个)处理器102(处理器102可以包括但不限于微处理器(Microprocessor Unit,简称是MPU)或可编程逻辑器件(Programmable logic device,简称是PLD))和用于存储数据的存储器104,在一个示例性实施例中,上述手机客户端还可以包括用于通信 功能的传输设备106以及输入输出设备108。本领域普通技术人员可以理解,图1所示的结构仅为示意,其并不对上述手机客户端的结构造成限定。例如,手机客户端还可包括比图1中所示更多或者更少的组件,或者具有与图1所示等同功能或比图1所示功能更多的不同的配置。
存储器104可用于存储计算机程序,例如,应用软件的软件程序以及模块,如本公开实施例中的烘焙控制方法对应的计算机程序,处理器102通过运行存储在存储器104内的计算机程序,从而执行各种功能应用以及数据处理,即实现上述的方法。存储器104可包括高速随机存储器,还可包括非易失性存储器,如一个或者多个磁性存储装置、闪存、或者其他非易失性固态存储器。在一些实例中,存储器104可进一步包括相对于处理器102远程设置的存储器,这些远程存储器可以通过网络连接至手机客户端。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
传输装置106用于经由一个网络接收或者发送数据。上述的网络具体实例可包括手机终端的通信供应商提供的无线网络。在一个实施例中,传输装置106包括一个网络适配器(Network Interface Controller,简称为NIC),其可通过基站与其他网络设备相连从而可与互联网进行通讯。在一个实例中,传输装置106可以为射频(Radio Frequency,简称为RF)模块,其用于通过无线方式与互联网进行通讯。
在本实施例中提供了一种智能门锁绑定方法,图2是根据本公开实施例的智能门锁的绑定方法的流程图,该流程包括如下步骤:
步骤S202,设备管理应用的客户端向服务器发送绑定请求,其中,绑定请求中携带有设备管理应用的应用标识及待绑定的智能门锁的无线通信地址;
步骤S204,在服务器反馈的设备绑定状态信息指示智能门锁处于未被绑定的状态,客户端向智能门锁发送验证信息,其中,验证信息用于对在智能门锁接收的输入信息进行验证;
步骤S206,客户端将智能门锁反馈的验证结果发送给服务器;
步骤S208,客户端接收服务器根据验证结果动态生成的鉴权信息,其中,鉴权信息中携带有根据绑定请求对智能门锁进行绑定鉴权的鉴权密钥组;
步骤S210,客户端将智能门锁反馈的与鉴权信息对应的确认消息发送给服务器;
步骤S212,客户端接收服务器发送的绑定指令,并响应于绑定指令,触发智能门锁的账号绑定过程。
可选地,在本实施例中,在客户端会向服务器发起绑定申请之前,可以但不限于需要确保开启智能门锁的蓝牙广播,然后在设备应用的客户端的显示界面中展示搜索到的蓝牙列表,可以用户根据需要选择蓝牙列表中的一个蓝牙设备作为待绑定的智能门锁。其中,每个蓝牙设备中智能门锁均有一个无线通信地址(蓝牙MAC),不同的设备管理应用均具有与自身匹配的一个应用标识,例如APP ID标识。
可选地,在本实施例中,在客户端通过搜索智能门锁的无线通信地址与智能门锁建立蓝牙连接后,客户端向服务器发起智能门锁的绑定请求,其中,绑定请求中携带有客户端的APP ID标识和智能门锁的蓝牙MAC。服务器会根据绑定请求中的智能门锁的蓝牙MAC和APP ID标识,对智能门锁和客户端的当前状态进行识别,其中,智能门锁和客户端的当前状态至少包括“已绑定”或“未绑定”两种状态。当识别的结果为智能门锁处于未被绑定的状态时,客户端随机生成一个验证码,例如6位数字的验证码。并将验证码和客户端的APP ID标识一起下发给智能门锁,用于对智能门锁接收的输入信息进行验证。
需要说明的是,在智能门锁收到客户端下发的验证码后,会主动点亮智能门锁上的数字键盘,用户根据客户端的提示在数字键盘上输入验证码。输入成功后,智能门锁会对用户输入的验证码进行校验,如果用户输入错 误或者在指定时间(如30秒)内未输入验证码,则校验失败,智能门锁会将校验失败的消息主动上报给客户端,同时智能门锁退出绑定模式。
如果智能门锁对用户输入的验证码校验成功,则将校验成功的消息发送给服务器。服务器会根据绑定请求中携带的客户端的APP ID标识和智能门锁的蓝牙MAC动态生成鉴权信息,其中,鉴权信息可以包括但不限于用于对智能门锁进行绑定鉴权。在实际应用过程中,鉴权信息的形式和内容不做限定,例如可以是业务密钥、蓝牙密钥和鉴权码等。
可选地,在智能门锁接收到服务器下发的鉴权信息后,会主动上报与鉴权信息对应的确认消息给客户端,并通过客户端将该确认消息发送给服务器。在收到智能门锁反馈的“已收到鉴权信息”的确认消息后,服务器会下发绑定指令给客户端,客户端相应绑定指令,触发智能门锁的账号绑定过程。
可以理解的是,在步骤S208中,客户端接收服务器根据验证结果动态生成的鉴权信息,与客户端每次发出的绑定请求相关,客户端每发出一次新的绑定请求,服务器就会生成新的鉴权信息。也即对智能门锁进行绑定鉴权的密钥会随着客户端发起的绑定请求不断变化。
通过本公开提供的上述实施例,服务器会根据智能门锁对每次收到的验证信息得到的验证结果,动态生成用于对智能门锁进行绑定鉴权的鉴权密钥组,并且服务器根据智能门锁收到密钥的确认消息,才会下发绑定指令。换言之,通过采用上述技术方案,对智能门锁绑定过程中的关键数据进行加密和校验,降低了关键数据被攻击的风险,提高了智能门锁绑定过程中的数据传输的安全性。
在一个可选的实施例中,上述步骤S208中客户端接收服务器根据验证结果动态生成的鉴权信息,包括:
在服务器对绑定请求中携带的应用标识和通信地址校验成功的情况下,客户端接收服务器发送的蓝牙密钥,并将蓝牙密钥发送给智能门锁;
在客户端将智能门锁反馈的蓝牙密钥确认消息发送给服务器后,客户端接收服务器发送的业务密钥,并将业务密钥发送给智能门锁;
在客户端将智能门锁反馈的业务密钥确认消息发送给服务器后,客户端接收服务器发送的鉴权码,并将鉴权码发送给智能门锁;
其中,鉴权信息中包括蓝牙密钥、业务密钥及鉴权码。
在上述本实施例中,在接收到智能门锁上报的验证码校验成功的消息后,服务器会对绑定请求中携带的APP ID和蓝牙MAC进行校验,并将校验结果回复给智能门锁。智能门锁向服务器反馈“已收到校验结果”的确认消息。收到确认消息后,服务器会通过超文本传输安全协议将蓝牙密钥发送给客户端,客户端收到蓝牙密钥后再将蓝牙密钥发送给智能门锁。并同时在客户端内保存该蓝牙密钥。
需要说明的是,在服务器向智能门锁下发蓝牙密钥的过程中,服务器并没有直接将蓝牙协议发送给客户端,而是通过超文本传输安全协议接口的回复消息中携带该蓝牙密钥,客户端在收到回复消息后,再将该回复消息中的蓝牙密钥发送给智能门锁。
可选地,在本实施例中,在智能门锁收到服务器下发的蓝牙密钥后,会反馈一个蓝牙密钥确认消息给客户端,客户端通过调用超文本传输安全协议将蓝牙密钥确认消息给到服务器。服务器在超文本传输安全协议接口向客户端发送业务密钥。客户端收到业务密钥后,将业务密钥发送给智能门锁。值得注意的是,与服务器第一下发的蓝牙密钥不同的是,由于智能门锁已经接收到了服务器下发的蓝牙密钥,所以第二次下发的业务密钥是经过加密的密钥。
可选地,在本实施例中,在智能门锁收到加密后的业务密钥后,会向服务器反馈“已收到业务密钥”的确认消息,其中,智能门锁会先将该确认消息发送给客户端,客户端再通过调用服务器中的超文本传输安全协议将确认消息传输给服务器。在服务器接收到该确认消息后,会通过超文本 传输安全协议的接口下发鉴权码,并将鉴权码发送给客户端,同时在客户端的内存中保存鉴权码。
需要说明的是,由于在服务器将鉴权码下发给智能门锁之前,智能门锁中已经保存了蓝牙密钥和经过加密后的业务密钥,因此,服务器第三次下发的鉴权码是经过加密的密钥,并且该鉴权码是经过蓝牙密钥和业务密钥两次加密后的一种密钥。也即先利用蓝牙密钥对业务密钥进行第一次加密,再利用鉴权码对加密后的业务密钥进行第二次加密。
通过采用上述技术方案,在客户端发起绑定请求后,服务器会先后下发蓝牙密钥、业务密钥和鉴权码至客户端和智能门锁,利用蓝牙密钥、业务密钥和鉴权码对绑定过程中的关键数据进行两次加密处理。加强了对绑定过程中的数据处理的复杂度,避免了攻击者对绑定数据的攻击,进而提高数据传输的安全性。
作为一种可选的实施方案,上述客户端将业务密钥发送给智能门锁,包括:
客户端利用蓝牙密钥对所述业务密钥进行加密,得到第一加密结果;
客户端将第一加密结果发送给智能门锁,以使所述智能门锁利用蓝牙密钥对第一加密结果进行解密得到业务密钥。
在本实施例中,由于在将业务密钥发送智能门锁之前,服务器可以但不限于已经发送了蓝牙密钥给客户端,并在客户端的内存中保存了蓝牙密钥。客户端也将蓝牙密钥发送给了智能门锁,并在智能门锁中保存了蓝牙密钥。在服务器将业务密钥发送给客户端后,客户端就利用预先保存的蓝牙密钥对业务密钥进行加密,得到第一加密结果,并将第一加密结果发送给智能门锁。
可选地,在本实施例中,在智能门锁收到客户端发送的第一加密结果后,可以但不限于利用预先保存的蓝牙密钥对第一加密结果进行解密,得到业务密钥。也就是说,服务器下发的业务密钥并没有直接发送给智能门 锁,而是在客户端进行了加密处理后,再将加密后的业务密钥发送给了智能门锁。假设蓝牙密钥相当于钥匙,那么该钥匙就是用于破解加密后的业务密钥。
通过采用上述技术方案,在服务器、客户端和智能门锁之间进行传输业务密钥的过程中,通过利用蓝牙密钥对业务密钥进行加密和解密处理,使得业务密钥的传输具备较高的安全性,从而间接地提高了智能绑定过程中数据传输的安全性。
作为一种可选的实施方案,上述客户端将鉴权码发送给智能门锁包括以下至少之一:
客户端利用蓝牙密钥对鉴权码进行加密,得到第二加密结果;客户端将第二加密结果发送给智能门锁,以使智能门锁利用蓝牙密钥对第二加密结果进行解密得到鉴权码;
客户端利用业务密钥对鉴权码进行加密,得到第三加密结果;客户端将第三加密结果发送给智能门锁,以使智能门锁利用业务密钥对第三加密结果进行解密得到鉴权码。
本实施例中智能门锁接收到客户端发送的鉴权码C*是经过加密处理的,需要智能门锁对鉴权码C*进行解密处理才能识别出鉴权码C。而智能门锁对加密后的鉴权码C*进行解密处理的过程至少包括以下两种情况:一种是直接利用保存在智能门锁内的蓝牙密钥A对加密。
通过本公开提供的上述实施例可知,服务器在下发鉴权码之前,先后下发了蓝牙密钥和业务密钥,并且在客户端接收到业务密钥后会对业务密钥进行加密。也就是说,在服务器将鉴权码发送给客户端之前,客户端的内存中已保存有蓝牙密钥和加密后的业务密钥。那么,服务器下发鉴权码给智能门锁的过程至少包括以下两种情况:
第一种情况:服务器将鉴权码发送给客户端,客户端利用预先保存的蓝牙密钥对鉴权码进行加密,然后将加密后的鉴权码发送给智能门锁,例 如,利用蓝牙密钥A对鉴权码C进行加密,得到加密后的鉴权码C*。由于智能门锁收到的鉴权码是经过加密处理的一种验证码,所以智能门锁无法直接读取加密后鉴权码。而是需要利用提前保存在智能门锁中的蓝牙密钥A对加密后的鉴权码C*进行解密处理,进而得到鉴权码;
第二种情况:服务器将鉴权码发送给客户端,客户端利用预先保存的业务密钥对鉴权码进行加密,得到第三加密结果,其中,第三加密结果中包含了加密后的鉴权码。例如,利用蓝牙密钥A对业务密钥B进行加密,得到加密后的业务密钥B*,然后利用加密后的业务密钥B*对鉴权码C进行加密,得到加密后的鉴权码C*。在客户端将加密后的鉴权码C*发送给智能门锁后,智能门锁会利用预先保存的业务密钥B对加密后的鉴权码C*进行解密处理,从而得到鉴权码。
需要说明的是,在第一种情况中,客户端收到服务器发送的鉴权码后,仅利用蓝牙密钥对鉴权码进行了一次加密。而在第二种情况中,由于客户端中保存的业务密钥是已经利用蓝牙密钥进行加密处理后的密钥,所以在收到服务器发送的鉴权码后,客户端会利用加密后的业务密钥对鉴权码再次进行加密处理,也即,在第二种情况中,客户端在接收到鉴权码后,实际上对鉴权码进行了两次加密(得到第三加密结果)。再将第三加密结果发送给智能门锁之后,智能门锁会先利用加密后的业务密钥对第三加密结果进行一次解密,得到一个中间结果;再利用蓝牙密钥对之间结果进行第二次解密,才能得到服务器下发的原始状态的鉴权码。
通过采用上述技术方案,可根据需要将上述两种情况中的一种设置为客户端发送鉴权码至智能门锁的方式。而两种方式中客户端均对服务器发送的鉴权码进行了加密处理,使得智能门锁和客户端之间的交互具有较高的安全性。
可选地,上述客户端将智能门锁反馈的验证结果发送给服务器,包括:
客户端调用超文本传输链接将所述验证结果发送给所述服务器,以使服务器在与超文本传输链接对应的接口中发送所述鉴权信息。
需要说明的是,超文本传输链接可以包括但不限于https形式的访问请求,并且通过https的接口客户端不仅可以将智能门锁反馈的验证结果发送给服务器,还可以将智能门锁反馈的确认消息发送给服务器。另外,服务器在发送蓝牙密钥、业务密钥和鉴权码至客户端的过程中,也均是通过https的接口进行数据传输的。也即,客户端与服务器之间的交互是通过https的接口进行的。
通过采用上述技术方案,在通过超文本能传输链接进行客户端与服务器之间的数据传输的过程中,对数据进行一次或多次加密,使得客户端与服务器之间的数据交互具有较高的安全性。
作为一种可选的实施方案,上述客户端响应于绑定指令,触发智能门锁的账号绑定过程,包括:
客户端向服务器发送绑定信息,其中,绑定信息中携带有与客户端匹配的用户账号;
客户端接收服务器返回的绑定结果,其中,绑定结果用于指示用户账号与智能门锁已完成绑定。
在本公开提供的上述实施例中,在通过服务器下发蓝牙密钥、业务密钥和鉴权码,对绑定过程中的数据进行加密后,智能门锁会向服务器回复一个加密完成的确认消息(即智能门锁最后一次接收到服务下发的鉴权后反馈的确认消息)。客户端接收到该确认消息后,将确认消息发送给服务器,服务器会根据确认消息向客户端下发绑定信息。其中,绑定信息中至少包括与客户端相匹配的用户账号。
客户端将绑定信息发送给智能门锁,然后将智能门锁回复的确认消息发送给服务器,服务器发送进行下一步绑定的指令给客户端,开始进行用户账号的绑定过程。在用户账号与智能门锁绑定完成后,服务器会向客户端发送绑定完成结果,以指示智能门锁的绑定流程全部完成。
在一个可选的实施例中,在上述设备管理应用的客户端向服务器发送 绑定请求之前,还包括:
在智能门锁处于蓝牙广播状态的情况下,客户端展示当前允许连接的蓝牙标识列表;
响应于在客户端中执行的选择操作,确定选中智能门锁匹配的门锁蓝牙标识;
客户端将利用设备管理应用的应用标识,以及与门锁蓝牙标识匹配的智能门锁的无线通信地址生成绑定请求,其中,无线通信地址包括蓝牙通信物理地址。
在本公开提供的上述各实施例中,对智能门锁进行绑定处理之前,均需要确保智能门锁已开启蓝牙广播,在客户端的应用界面中就会显示当前可以连接的蓝牙设备的蓝牙标识。其中,允许连接的蓝牙标识列表中可以包括但不限于智能门锁的门锁蓝牙标识,也可以包括智能音箱的音箱蓝牙标识、智能空调的蓝牙标识、智能冰箱的蓝牙标识等。
可以理解的是,客户端可以搜索到的蓝牙设备可以是一个或多个,那么在客户端的应用界面中就会以蓝牙标识列表的形式将所有允许连接的智能门锁的蓝牙标识展示出来。当用户在客户端的应用界面中进行选择操作后,即可确定选中的智能门锁的门锁蓝牙标识。
在确定门锁蓝牙标识后,客户端就可以利用自身的应用标识,例如APP ID,以及与已选中的门锁蓝牙标识相匹配的智能门锁的无线通信地址(如蓝牙MAC)生成绑定请求,其中,每个客户端的应用标识是与该客户端相匹配的唯一标识。在客户端向服务器发出绑定请求时,会将与客户端相匹配的唯一标识和智能门锁的蓝牙MAC一起上报给服务器。
需要说明的是,本公开提供的上述各实施例中的执行主体为设备管理应用的客户端,为了更好地理解本公开,本公开实施例还提供了一种智能门锁的绑定方法,应用于目标服务器,具体地,如图3所示,该流程包括如下步骤:
步骤S302,服务器接收设备管理应用的客户端发送的绑定请求,其中,绑定请求中携带有设备管理应用的应用标识及待绑定的智能门锁的无线通信地址;
步骤S304,响应绑定请求,服务器向客户端发送设备绑定状态信息,以指示客户端在确定设备绑定状态信息指示智能门锁处于未绑定的情况下,向智能门锁发送验证信息,其中,验证信息用于对在智能门锁接收的输入信息进行验证;
步骤S306,服务器接收客户端发送的智能门锁反馈的验证结果;
步骤S308,基于验证结果,服务器动态生成鉴权信息,并将鉴权信息发送给客户端,其中,鉴权信息中携带有根据绑定请求对智能门锁进行绑定鉴权的鉴权密钥组;
步骤S310,服务器接收客户端发送的智能门锁反馈的与鉴权信息对应的确认消息;
步骤S312,服务器发送绑定指令值客户端,以指示客户端响应于绑定指令,触发智能门锁的账号绑定过程。
通过上述步骤,在服务器接收到客户端发送的绑定请求之后,服务器会根据客户端的APP ID和能门锁蓝牙的MAC,对客户端和智能门锁的当前状态进行识别。当识别结果为智能门锁处于未被绑定的状态的情况下,服务器会根据绑定请求中携带的客户端的APP ID和智能门锁的蓝牙MAC动态生成鉴权信息,以用于对智能门锁进行绑定鉴权。
通过采用上述技术方案,通过服务器动态下发鉴权信息的方式,对智能门锁绑定过程中的数据进行绑定鉴权(如加密和校验),降低了关键数据被攻击的风险,提高了智能门锁绑定过程中的数据传输的安全性。
在一个可选的实施例中,可以通过以下方式实现基于验证结果,动态生成鉴权信息,并将鉴权信息发送给客户端:
在对绑定请求中携带的应用标识和通信地址校验成功的情况下,服务器发送蓝牙密钥给客户端,以指示客户端将蓝牙密钥发送给智能门锁;
在接收智能门锁反馈的蓝牙密钥确认消息之后,服务器发送业务密钥至客户端,以指示客户端将业务密钥发送给智能门锁;
在接收智能门锁反馈的业务密钥确认消息后,服务器发送鉴权码至客户端,并将鉴权码发送至智能门锁。
在本实施例中,在服务器接收到智能门锁上报的校验成功的消息后,服务器会依次发送蓝牙密钥、业务密钥和鉴权码给客户端。具体的过程为:服务器收到校验成功的消息后,将蓝牙密钥发送给客户端,以指示客户端将蓝牙密钥发送给智能门锁;在服务器收到智能门锁回复的“已收到蓝牙密钥”的确认消息后,服务器再发送业务密钥给客户端,以指示客户端将加密后的业务密钥发送给智能门锁;在服务器接收到智能门锁回复的“已收到业务密钥”的确认消息后,服务器发送鉴权码至客户端,以指示客户端将加密后的鉴权码发送给智能门锁。
需要说明的是,在服务器发送业务密钥给客户端之前,客户端的内存已保存了蓝牙密钥,在客户端接收到业务密钥后,会利用蓝牙密钥对业务密钥进行加密,再将加密后的业务密钥发送给智能门锁。
可选地,在服务器发送鉴权码给客户端之前,客户端的内存中已保存了蓝牙密钥和加密后的业务密钥,在客户端接收到鉴权码之后,会利用预先保存的蓝牙密钥和加密后业务密钥对鉴权码进行加密处理,使得鉴权码以加密形式传输给智能门锁。
通过采用上述技术方案,服务器会依次将蓝牙密钥、加密后的业务密钥和加密后的鉴权码发送给智能门锁,使得服务器与智能门锁之间的数据传输的安全性较高,避免了攻击者对智能门锁绑定过程中的数据进行攻击,降低了用户的利益损失。
作为一种可选的实施方案,上述接收客户端发送的智能门锁反馈的验 证结果,包括:
服务器接收客户端调用超文本传输链接发送的验证结果,并基于验证结果,在与超文本传输连接对应的接口中发送鉴权信息。
需要说明的是,通过上述超文本传输链接,服务器除了可以接收客户端发送的验证结果,还可以接收到智能门锁反馈的确认消息。另外,服务器也是需要通过超文本传输链接依次将蓝牙密钥、业务密钥和鉴权码发送给客户端。
通过采用上述技术方案,在通过超文本能传输链接进行客户端与服务器之间的数据传输的过程中,对数据进行了至少一次的加密处理,降低了数据被攻击的风险,提高了数据传输的安全性。
作为一种可选的实施方案,上述发送绑定指令至客户端,以指示客户端响应于绑定指令,触发智能门锁的账号绑定过程,包括:
服务器接收客户端发送的绑定信息,其中,绑定信息中携带有客户端匹配的用户账号;
服务器返回绑定结果至客户端,其中,绑定结果用于指示用户账号与智能门锁已完成绑定。
在本公开提供的上述实施例中,服务器依次将蓝牙密钥、业务密钥和鉴权码发送给智能门锁后,会收到智能门锁回复的确认消息,服务器根据该确认消息向客户端下发绑定信息,以指示客户端将绑定信息发送给智能门锁。
在接收到智能门锁回复的“已收到绑定信息”的确认消息后,服务器会发送进行下一步绑定的指令给客户端,开始进行用户账号的绑定过程。在用户账号与智能门锁绑定完成后,服务器会向客户端发送绑定完成结果,以指示智能门锁的绑定流程全部完成。
通过采用上述技术方案,可以对智能门锁绑定过程中的数据进行加密, 解决了相关技术中通过客户端与智能门锁之间建立蓝牙连接,依据验证信息就可以执行绑定流程所导致的数据安全性较低的技术问题。
需要说明的是,上述步骤的执行主体为智能门锁绑定服务器,为了更好地理解本公开的技术方案,本公开还提供了一种智能门锁的绑定方法,应用于智能门锁,具体地,如图4所示,该流程包括如下步骤:
步骤S402,智能门锁接收客户端发送的验证信息,其中,验证信息用于对接收到的输入信息进行验证;
步骤S404,智能门锁反馈验证结果,并通过客户端将验证结果发送至服务器,以指示服务器将根据验证结果动态生成的鉴权信息发送至客户端;
步骤S406,智能门锁反馈与鉴权信息对应的确认消息,以指示客户端将鉴权信息发送至服务器;
步骤S408,智能门锁启动账号绑定过程。
在本实施例中,在确认智能门锁处于未被绑定的状态时,智能门锁会接收到客户端随机生成的一个验证码(例如6位数字的验证码)和客户端自身生成的APP ID。用户根据客户端的提示,在智能门锁的数字键盘上输入6位数字的验证码,输入成功后,智能门锁会对用户输入的验证码进行校验。
如果智能门锁对用户输入的验证码校验成功,则将校验成功的消息(验证结果)发送给客户端,以指示客户端将校验成功的消息(验证结果)发送给服务。然后智能门锁会收到服务器根据验证结果动态生成鉴权信息,并回复“已收到鉴权信息”的确认消息给客户端,以指示客户端将鉴权信息发送给服务器,进而启动智能门锁的绑定流程。
需要说明的是,上述用户根据客户端的提示在数字键盘上输入验证码,还包括:如果用户输入错误或者在指定时间(如30秒)内未输入验证码,则校验失败,智能门锁会将校验失败的消息主动上报给客户端,同时智能 门锁退出绑定模式。
通过采用上述技术方案,智能门锁接收客户端随机生成的验证码,并对该验证码进行校验。在校验成功的情况下,智能门锁会收到服务器根据验证结果动态生成鉴权信息,并回复确认消息给服务器,进而启动智能门锁的绑定流程。通过该技术方案,在智能门锁与客户端、服务器之间的数据传输过程中采用动态获取验证信息及确认消息,对智能门锁绑定过程中的数据进行加密处理,使得数据无规律可循。避免了利用模拟数据对智能门锁的绑定过程进行攻击,提高了智能门锁绑定过程的可靠性,提高了数据传输的安全性。
可选的,上述反馈验证结果,并通过客户端将验证结果发送至服务器,以指示服务器将根据验证结果动态生成的鉴权信息发送至客户端,包括:
智能门锁接收客户端发送的蓝牙密钥;
智能门锁发送蓝牙密钥的确认消息至客户端,以指示客户端将蓝牙密钥的确认消息发送给服务器;
在服务器接收到客户端发送的蓝牙密钥的确认消息后,智能门锁接收客户端发送的业务密钥;
智能门锁发送业务密钥的确认消息至客户端,以指示客户端将业务密钥的确认消息发送给服务器;
在服务器接收到客户端发送的业务密钥的确认消息后,智能门锁接收客户端发送的鉴权码;
其中,鉴权信息中包括蓝牙密钥、业务密钥及鉴权码。
在本实施例中,智能门锁依次接收到了服务器发送的蓝牙密钥、业务密钥和鉴权码。需要说明的是,第一次接收到的蓝牙密钥A是没有经过加密处理的;第二次接收到的业务密钥B*则是客户端利用蓝牙密钥对业务密钥B进行加密处理后的密钥信息;第三次接收到的鉴权码C*是客户端 利用蓝牙密钥和/或加密后的业务密钥对鉴权码C进行加密处理后的密钥信息。
通过采用上述技术方案,在智能门锁绑定过程中,通过利用蓝牙密钥、业务密钥和鉴权码对绑定过程中的关键数据进行两次加密处理。使得智能门锁与客户端、客户端与服务器之间的数据交互过程的安全性较高,进而提高了数据传输的可靠性。
作为一种可选的实施方案,上述接收客户端发送的业务密钥,包括:
智能门锁接收客户端发送的第一加密结果,其中,第一加密结果是客户端利用蓝牙密钥对业务密钥进行加密得到的;
智能门锁利用蓝牙密钥,对第一加密结果进行解密,得到业务密钥。
需要说明的是,在智能门锁收到客户端发送的第一加密结果后,并不直接识别出该第一加密结果B*中包含的业务密钥B,而是需要利用预先保存在智能门锁的蓝牙密钥第一加密结果B*进行解密处理,才能得到服务器下发的业务密钥B。
可选地,上述接收客户端发送的鉴权码包括以下至少之一:
智能门锁接收客户端发送的第二加密结果,其中,第二加密结果是客户端利用蓝牙密钥对鉴权码进行加密得到的;
智能门锁利用蓝牙密钥,对第二加密结果进行解密,得到鉴权码;
智能门锁接收客户端发送的第三加密结果,其中,第三加密结果是客户端利用业务密钥对鉴权码进行加密得到的;
智能门锁利用业务密钥,对第三加密结果进行解密,得到鉴权码。
需要说明的是,本实施例中智能门锁接收到客户端发送的鉴权码C*是经过加密处理的,需要智能门锁对鉴权码C*进行解密处理才能识别出鉴权码C。而智能门锁对加密后的鉴权码C*进行解密处理的过程至少包括以下两种情况:一种是直接利用保存在智能门锁内的蓝牙密钥A对加密 后的鉴权码C*,就可以得到鉴权码C;另一种是先利用保存在智能门锁内的业务密钥B对鉴权码C*进行一次解密处理,再利用保存在智能门锁内的蓝牙密钥A进行第二次解密处理,才能得到服务器下发的鉴权码C。
通过采用上述技术方案,在实际应用过程中,智能门锁会根据客户端端对鉴权码的加密处理选择对应的解密处理方式,而两种方式中均需要智能门锁对加密后鉴权码进行解密处理,使得鉴权码的传输过程中,具有较高的隐私性,进而提高了数据传输的安全性。
作为一种可选的实施方案,上述启动账号绑定过程,包括:
智能门锁接收客户端发送的绑定信息,其中,绑定信息中携带有与客户端匹配的用户账号;
基于用户账号,智能门锁启动账号绑定过程。
需要说明的是,智能门锁接收到客户端发送的绑定信息,并通过客户端将确认消息发送给服务器之后,即可利用绑定信息中携带的与客户端匹配的用户账号与智能门锁进行绑定。
为了更好地理解上述各实施方案,本公开还提供了一种智能门的绑定方法的整体流程图,具体地,如图5所示:
APP与门锁建立蓝牙连接后,APP端向Server端发起绑定申请,请求成功随机生成一个验证码(6位数字),并将该验证码以及自身的APP ID信息发送到智能门锁,同时提示用户在智能门锁输入验证码。
需要说明的是,智能门锁收到APP下发的验证码后会主动点亮数字键盘,用户根据APP的提示在智能门锁输入该验证码,输入后设备会校验用户输入的验证码是否正确,如果用户输入错误或者30秒内未输入则校验失败。设备会将校验失败的消息主动上报给APP,设备同时退出绑定模式。
通过步骤S522-S528,Server端收到设备上报验证码校验成功的消息后,会对信息进行校验,包括对APP发起绑定请求时携带的信息进行校验,并将校验结果回复给智能门锁。Server端回复给智能门锁及APP如下 信息:业务密钥、蓝牙密钥、鉴权码。
智能门锁收到Server端的认证结果后回复ACK消息,APP通过调用HTTPS将消息给到Server,Server在HTTPS接口的response当中给出蓝牙密钥,APP收到response后将蓝牙密钥发送到智能门锁,并同时在APP内存中保存该密钥,用于后续通信;
智能门锁收到蓝牙密钥后,会回复ACK消息。APP通过调用HTTPS将消息给到Server,Server在HTTPS接口的response当中给出业务密钥信息。(由于智能门锁已经有了蓝牙密钥,所以此处的消息是经过加密后的消息),APP收到response后将业务密钥发送到智能门锁;
智能门锁收到业务密钥后,会回复ACK消息,APP调用Server端HTTPS接口将消息传输到Server端,Server在HTTPS接口的response当中给出appId以及鉴权码消息(由于智能门锁已经有蓝牙密钥以及业务密钥,所以此处的消息是经过密钥加密后的消息),APP收到response后将该消息发送到智能门锁,并同时保存鉴权码到内存当中,便于之后的通信,具体地,如步骤S530-S552。
在步骤S554-S570中,APP在收到智能门锁发给它的收到鉴权码的确认消息后,APP把这个确认消息再给到Server,Server再给APP一个消息(告诉APP已经满足绑定条件),即Server下发的可以进行绑定的指令,APP会发起账号绑定流程(携带MAC地址信息等向Server发起HTTPS请求)。
通过采用上述技术方案,在客户端发起绑定请求后先到Server端申请蓝牙密钥及业务密钥,加密后再进行绑定数据的传输,并且每发起依次绑定请求,蓝牙密钥及业务密钥都会发生变更,使得动态获取的蓝牙密钥和业务密钥无规律可循,提供了数据传输的安全性。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到根据上述实施例的方法可借助软件加必需的通用硬件平台的方式来实现,当 然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本公开的技术方案本质上或者说对相关技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,或者网络设备等)执行本公开各个实施例的方法。
在本实施例中还提供了一种智能门锁的绑定装置,该装置用于实现上述实施例及可选实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的设备较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。
图6是根据本公开实施例的智能门锁的绑定装置的结构框图,该装置包括:
第一发送单元602,设置为向服务器发送绑定请求,其中,绑定请求中携带有设备管理应用的应用标识及待绑定的智能门锁的无线通信地址;
第二发送单元604,设置为在服务器反馈的设备绑定状态信息指示智能门锁处于未被绑定的状态,向智能门锁发送验证信息,其中,验证信息用于对在智能门锁接收的输入信息进行验证;
第三发送单元606,设置为将智能门锁反馈的验证结果发送给服务器;
第一接收单元608,设置为接收服务器根据验证结果动态生成的鉴权信息,其中,鉴权信息中携带有根据绑定请求对智能门锁进行绑定鉴权的鉴权密钥组;
第四发送单元610,设置为将智能门锁反馈的与鉴权信息对应的确认消息发送给服务器;
第二接收单元612,设置为接收服务器发送的绑定指令,并响应于绑定指令,触发智能门锁的账号绑定过程。
可选地,上述第一接收单元608还设置为在服务器对绑定请求中携带的应用标识和通信地址校验成功的情况下,接收服务器发送的蓝牙密钥,并将蓝牙密钥发送给智能门锁;在客户端将智能门锁反馈的蓝牙密钥确认消息发送给服务器后,客户端接收服务器发送的业务密钥,并将业务密钥发送给智能门锁;在客户端将智能门锁反馈的业务密钥确认消息发送给服务器后,客户端接收服务器发送的鉴权码,并将鉴权码发送给智能门锁;其中,鉴权信息中包括蓝牙密钥、业务密钥及鉴权码。
可选地,上述第一接收单元608还设置为利用蓝牙密钥对业务密钥进行加密,得到第一加密结果;客户端将第一加密结果发送给智能门锁,以使智能门锁利用蓝牙密钥对第一加密结果进行解密得到业务密钥。
可选地,上述第一接收单元608还设置为利用蓝牙密钥对鉴权码进行加密,得到第二加密结果;客户端将第二加密结果发送给智能门锁,以使智能门锁利用蓝牙密钥对第二加密结果进行解密得到鉴权码;客户端利用业务密钥对鉴权码进行加密,得到第三加密结果;客户端将第三加密结果发送给智能门锁,以使智能门锁利用业务密钥对第三加密结果进行解密得到鉴权码。
可选地,上述第三发送单元606还设置为调用超文本传输链接将验证结果发送给服务器,以使服务器在与超文本传输链接对应的接口中发送鉴权信息。
可选地,上述第二接收单元612还设置为向服务器发送绑定信息,其中,绑定信息中携带有与客户端匹配的用户账号;客户端接收服务器返回的绑定结果,其中,绑定结果用于指示用户账号与智能门锁已完成绑定。
可选地,智能门锁的绑定装置还设置为在上述第一发送单元602执行发送之前,在智能门锁处于蓝牙广播状态的情况下,展示当前允许链接的蓝牙标识列表;响应于在客户端中执行的选择操作,确定选中智能门锁匹配的门锁蓝牙标识;客户端将利用设备管理应用的应用标识,以及与门锁蓝牙标识匹配的智能门锁的无线通信地址生成绑定请求,其中,无线通信 地址包括蓝牙通信物理地址。
作为一种可选的实施方案,本公开还提供了另外一种智能门锁的绑定装置,应用于设备管理应用的服务器,具体地,如图7所示,该装置包括:
第三接收单元702,设置为接收设备管理应用的客户端发送的绑定请求,其中,绑定请求中携带有设备管理应用的应用标识及待绑定的智能门锁的无线通信地址;
第一处理单元704,设置为响应绑定请求向客户端发送设备绑定状态信息,以指示客户端在确定设备绑定状态信息指示智能门锁处于未绑定的情况下,向智能门锁发送验证信息,其中,验证信息用于对在智能门锁接收的输入信息进行验证;
第四接收单元706,设置为接收客户端发送的智能门锁反馈的验证结果;
第二处理单元708,设置为基于验证结果,动态生成鉴权信息,并将鉴权信息发送给客户端,其中,鉴权信息中携带有根据绑定请求对智能门锁进行绑定鉴权的鉴权密钥组;
第五接收单元710,设置为接收客户端发送的智能门锁反馈的与鉴权信息对应的确认消息;
第五发送单元712,设置为发送绑定指令值客户端,以指示客户端响应于绑定指令,触发智能门锁的账号绑定过程。
可选地,上述第二处理单元708还设置为在对绑定请求中携带的应用标识和通信地址校验成功的情况下,发送蓝牙密钥给客户端,以指示客户端将蓝牙密钥发送给智能门锁;在接收智能门锁反馈的蓝牙密钥确认消息之后,发送业务密钥至客户端,以指示客户端将业务密钥发送给智能门锁;在接收智能门锁反馈的业务密钥确认消息后,发送鉴权码至客户端,并将鉴权码发送至智能门锁。
可选地,上述第二处理单元708还设置为接收客户端调用超文本传输连接发送的验证结果,并基于验证结果,在与超文本传输连接对应的接口中发送鉴权信息。
可选地,上述第五发送单元712还设置为接收客户端发送的绑定信息,其中,绑定信息中携带有客户端匹配的用户账号;返回绑定结果至客户端,其中,绑定结果用于指示用户账号与智能门锁已完成绑定。
作为一种可选的实施方案,本公开还提供了又一种智能门锁的绑定装置,应用于智能门锁。具体地,如图8所示,该装置包括:
第六接收单元802,设置为接收客户端发送的验证信息,其中,验证信息用于对接收到的输入信息进行验证;
第一反馈单元804,设置为反馈验证结果,并通过客户端将验证结果发送至服务器,以指示服务器将根据验证结果动态生成的鉴权信息发送至客户端;
第二反馈单元806,设置为反馈与鉴权信息对应的确认消息,以指示客户端将鉴权信息发送至服务器;
启动单元808,设置为启动账号绑定过程。
可选地,上述第一反馈单元804还设置为接收客户端发送的蓝牙密钥;发送蓝牙密钥的确认消息至客户端,以指示客户端将蓝牙密钥的确认消息发送给服务器;在服务器接收到客户端发送的蓝牙密钥的确认消息后,接收客户端发送的业务密钥;发送业务密钥的确认消息至客户端,以指示客户端将业务密钥的确认消息发送给服务器;在服务器接收到客户端发送的业务密钥的确认消息后,接收客户端发送的鉴权码;其中,鉴权信息中包括蓝牙密钥、业务密钥及鉴权码。
可选地,上述第一反馈单元804还设置为接收客户端发送的第一加密结果,其中,第一加密结果是客户端利用蓝牙密钥对业务密钥进行加密得到的;利用蓝牙密钥,对第一加密结果进行解密,得到业务密钥。
可选地,上述第一反馈单元804还设置为接收客户端发送的第二加密结果,其中,第二加密结果是客户端利用蓝牙密钥对鉴权码进行加密得到的;利用蓝牙密钥,对第二加密结果进行解密,得到鉴权码;接收客户端发送的第三加密结果,其中,第三加密结果是客户端利用业务密钥对鉴权码进行加密得到的;利用业务密钥,对第三加密结果进行解密,得到鉴权码。
可选地,上述启动单元808还用于设置为客户端发送的绑定信息,其中,绑定信息中携带有客户端匹配的用户账号;基于用户账号,启动账号绑定过程。
本公开实施例还提供了一种计算机可读存储介质,该计算机可读存储介质中存储有计算机程序,其中,该计算机程序被设置为运行时执行上述任一项方法实施例中的步骤。
可选地,在本实施例中,上述存储介质可以被设置为存储用于执行以下步骤的计算机程序:
S1,设备管理应用的客户端向服务器发送绑定请求,其中,绑定请求中携带有设备管理应用的应用标识及待绑定的智能门锁的无线通信地址;
S2,在服务器反馈的设备绑定状态信息指示智能门锁处于未被绑定的状态,客户端向智能门锁发送验证信息,其中,验证信息用于对在智能门锁接收的输入信息进行验证;
S3,客户端将智能门锁反馈的验证结果发送给服务器;
S4,客户端接收服务器根据验证结果动态生成的鉴权信息,其中,鉴权信息中携带有根据绑定请求对智能门锁进行绑定鉴权的鉴权密钥组;
S5,客户端将智能门锁反馈的与鉴权信息对应的确认消息发送给服务器;
S6,客户端接收服务器发送的绑定指令,并响应于绑定指令,触发智 能门锁的账号绑定过程。
在一个示例性实施例中,上述计算机可读存储介质可以包括但不限于:U盘、只读存储器(Read-Only Memory,简称为ROM)、随机存取存储器(Random Access Memory,简称为RAM)、移动硬盘、磁碟或者光盘等各种可以存储计算机程序的介质。
本实施例中的具体示例可以参考上述实施例及示例性实施方式中所描述的示例,本实施例在此不再赘述。
本公开的实施例还提供了一种电子装置,包括存储器和处理器,该存储器中存储有计算机程序,该处理器被设置为运行计算机程序以执行上述任一项方法实施例中的步骤。
可选地,在本实施例中,上述处理器可以被设置为通过计算机程序执行以下步骤:
S1,设备管理应用的客户端向服务器发送绑定请求,其中,绑定请求中携带有设备管理应用的应用标识及待绑定的智能门锁的无线通信地址;
S2,在服务器反馈的设备绑定状态信息指示智能门锁处于未被绑定的状态,客户端向智能门锁发送验证信息,其中,验证信息用于对在智能门锁接收的输入信息进行验证;
S3,客户端将智能门锁反馈的验证结果发送给服务器;
S4,客户端接收服务器根据验证结果动态生成的鉴权信息,其中,鉴权信息中携带有根据绑定请求对智能门锁进行绑定鉴权的鉴权密钥组;
S5,客户端将智能门锁反馈的与鉴权信息对应的确认消息发送给服务器;
S6,客户端接收服务器发送的绑定指令,并响应于绑定指令,触发智能门锁的账号绑定过程。
在一个示例性实施例中,上述电子装置还可以包括传输设备以及输入 输出设备,其中,该传输设备和上述处理器连接,该输入输出设备和上述处理器连接。
本实施例中的具体示例可以参考上述实施例及示例性实施方式中所描述的示例,本实施例在此不再赘述。
显然,本领域的技术人员应该明白,上述的本公开实施例的各模块或各步骤可以用通用的计算装置来实现,它们可以集中在单个的计算装置上,或者分布在多个计算装置所组成的网络上,它们可以用计算装置可执行的程序代码来实现,从而,可以将它们存储在存储装置中由计算装置来执行,并且在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤,或者将它们分别制作成各个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。这样,本公开实施例不限制于任何特定的硬件和软件结合。
以上所述仅为本公开的可选实施例而已,并不用于限制本公开,对于本领域的技术人员来说,本公开可以有各种更改和变化。凡在本公开的原则之内,所作的任何修改、等同替换、改进等,均应包含在本公开的保护范围之内。
工业实用性
在客户端发送绑定请求,且服务器反馈智能门锁处于未被绑定的情况下,客户端向智能门锁发送用于验证智能门锁接收的输入信息的验证信息,并将智能端反馈的验证结果发送给服务器,服务器根据验证结果动态生成鉴权信息,并将鉴权信息下发给智能门锁。客户端再将智能门锁反馈的与鉴权信息对应的确认消息发送给服务器,服务器即可向客户端下发绑定指令,触发智能门锁的账号绑定过程。也就是说,在智能门锁反馈验证结果后,服务器并不会立即下发智能门锁的绑定指令,而是根据验证结果动态生成携带有根据绑定请求对智能门锁进行绑定鉴权的鉴权密钥组,然后通过智能门锁反馈的与鉴权信息对应的确认消息,服务器向客户端下发绑定 指令,从而实现智能门锁的账号绑定。通过采用动态获取密钥的方式,对智能门锁绑定过程中的关键数据进行加密和校验,降低了关键数据被攻击的风险,提高了智能门锁绑定过程中的数据传输的安全性。

Claims (21)

  1. 一种智能门锁的绑定方法,包括:
    设备管理应用的客户端向服务器发送绑定请求,其中,所述绑定请求中携带有所述设备管理应用的应用标识及待绑定的智能门锁的无线通信地址;
    在所述服务器反馈的设备绑定状态信息指示所述智能门锁处于未被绑定的状态,所述客户端向所述智能门锁发送验证信息,其中,所述验证信息用于对在所述智能门锁接收的输入信息进行验证;
    所述客户端将所述智能门锁反馈的验证结果发送给所述服务器;
    所述客户端接收所述服务器根据所述验证结果动态生成的鉴权信息,其中,所述鉴权信息中携带有根据所述绑定请求对所述智能门锁进行绑定鉴权的鉴权密钥组;
    所述客户端将所述智能门锁反馈的与所述鉴权信息对应的确认消息发送给所述服务器;
    所述客户端接收所述服务器发送的绑定指令,并响应于所述绑定指令,触发所述智能门锁的账号绑定过程。
  2. 根据权利要求1所述的方法,其中,所述客户端接收所述服务器根据所述验证结果动态生成的鉴权信息包括:
    在所述服务器对所述绑定请求中携带的所述应用标识和所述通信地址校验成功的情况下,所述客户端接收所述服务器发送的蓝牙密钥,并将所述蓝牙密钥发送给所述智能门锁;
    在所述客户端将所述智能门锁反馈的蓝牙密钥确认消息发送给所述服务器后,所述客户端接收所述服务器发送的业务密钥,并将所述业务密钥发送给所述智能门锁;
    在所述客户端将所述智能门锁反馈的业务密钥确认消息发送给所述服务器后,所述客户端接收所述服务器发送的鉴权码,并将所述鉴权码发送给所述智能门锁;
    其中,所述鉴权信息中包括所述蓝牙密钥、所述业务密钥及所述鉴权码。
  3. 根据权利要求2所述的方法,其中,所述客户端将所述业务密钥发送给所述智能门锁包括:
    所述客户端利用所述蓝牙密钥对所述业务密钥进行加密,得到第一加密结果;
    所述客户端将所述第一加密结果发送给所述智能门锁,以使所述智能门锁利用所述蓝牙密钥对所述第一加密结果进行解密得到所述业务密钥。
  4. 根据权利要求2所述的方法,其中,所述客户端将所述鉴权码发送给所述智能门锁包括以下至少之一:
    所述客户端利用所述蓝牙密钥对所述鉴权码进行加密,得到第二加密结果;所述客户端将所述第二加密结果发送给所述智能门锁,以使所述智能门锁利用所述蓝牙密钥对所述第二加密结果进行解密得到所述鉴权码;
    所述客户端利用所述业务密钥对所述鉴权码进行加密,得到第三加密结果;所述客户端将所述第三加密结果发送给所述智能门锁,以使所述智能门锁利用所述业务密钥对所述第三加密结果进行解密得到所述鉴权码。
  5. 根据权利要求1所述的方法,其中,所述客户端将所述智能门锁反馈的验证结果发送给所述服务器包括:
    所述客户端调用超文本传输链接将所述验证结果发送给所述服务 器,以使所述服务器在与所述超文本传输链接对应的接口中发送所述鉴权信息。
  6. 根据权利要求1所述的方法,其中,所述客户端响应于所述绑定指令,触发所述智能门锁的账号绑定过程包括:
    所述客户端向所述发送绑定信息,其中,所述绑定信息中携带有与所述客户端匹配的用户账号;
    所述客户端接收所述服务器返回的绑定结果,其中,所述绑定结果用于指示所述用户账号与所述智能门锁已完成绑定。
  7. 根据权利要求1所述的方法,其中,在所述设备管理应用的客户端向服务器发送绑定请求之前,还包括:
    在所述智能门锁处于蓝牙广播状态的情况下,所述客户端展示当前允许链接的蓝牙标识列表;
    响应于在所述客户端中执行的选择操作,确定选中所述智能门锁匹配的门锁蓝牙标识;
    所述客户端将利用所述设备管理应用的应用标识,以及与所述门锁蓝牙标识匹配的所述智能门锁的无线通信地址生成所述绑定请求,其中,所述无线通信地址包括蓝牙通信物理地址。
  8. 一种智能门锁的绑定方法,包括:
    服务器接收设备管理应用的客户端发送的绑定请求,其中,所述绑定请求中携带有所述设备管理应用的应用标识及待绑定的智能门锁的无线通信地址;
    响应所述绑定请求,所述服务器向所述客户端发送设备绑定状态信息,以指示所述客户端在确定所述设备绑定状态信息指示所述智能门锁处于未绑定的情况下,向所述智能门锁发送验证信息,其中,所述验证信息用于对在所述智能门锁接收的输入信息进行验证;
    所述服务器接收所述客户端发送的所述智能门锁反馈的验证结果;
    基于所述验证结果,所述服务器动态生成鉴权信息,并将所述鉴权信息发送给所述客户端,其中,所述鉴权信息中携带有根据所述绑定请求对所述智能门锁进行绑定鉴权的鉴权密钥组;
    所述服务器接收所述客户端发送的所述智能门锁反馈的与所述鉴权信息对应的确认消息;
    所述服务器发送绑定指令至所述客户端,以指示所述客户端响应于所述绑定指令,触发所述智能门锁的账号绑定过程。
  9. 根据权利要求8所述的方法,其中,所述基于所述验证结果,动态生成鉴权信息,并将所述鉴权信息发送给所述客户端,包括:
    在对所述绑定请求中携带的所述应用标识和所述通信地址校验成功的情况下,所述服务器发送蓝牙密钥给所述客户端,以指示所述客户端将所述蓝牙密钥发送给所述智能门锁;
    在接收所述智能门锁反馈的蓝牙密钥确认消息之后,所述服务器发送业务密钥至所述客户端,以指示所述客户端将所述业务密钥发送给所述智能门锁;
    在接收所述智能门锁反馈的业务密钥确认消息后,所述服务器发送鉴权码至所述客户端,并将所述鉴权码发送至所述智能门锁。
  10. 根据权利要求8所述的方法,其中,所述接收所述客户端发送的所述智能门锁反馈的验证结果包括:
    所述服务器接收所述客户端调用超文本传输连接发送的验证结果,并基于所述验证结果,在与所述超文本传输连接对应的接口中发送所述鉴权信息。
  11. 根据权利要求8所述的方法,其中,所述发送绑定指令至所述客户端,以指示所述客户端响应于所述绑定指令,触发所述智能门锁的账号绑 定过程,包括:
    所述服务器接收所述客户端发送的绑定信息,其中,所述绑定信息中携带有所述客户端匹配的用户账号;
    所述服务器返回绑定结果至所述客户端,其中,所述绑定结果用于指示所述用户账号与所述智能门锁已完成绑定。
  12. 一种智能门锁的绑定方法,包括:
    智能门锁接收客户端发送的验证信息,其中,所述验证信息用于对接收到的输入信息进行验证;
    所述智能门锁反馈验证结果,并通过所述客户端将所述验证结果发送至服务器,以指示所述服务器将根据所述验证结果动态生成的鉴权信息发送至所述客户端;
    所述智能门锁反馈与所述鉴权信息对应的确认消息,以指示所述客户端将所述鉴权信息发送至所述服务器;
    所述智能门锁启动账号绑定过程。
  13. 根据权利要求12所述的方法,其中,所述反馈验证结果,并通过所述客户端将所述验证结果发送至服务器,以指示所述服务器将根据所述验证结果动态生成的鉴权信息发送至所述客户端,包括:
    所述智能门锁接收所述客户端发送的蓝牙密钥;
    所述智能门锁发送所述蓝牙密钥的确认消息至所述客户端,以指示所述客户端将所述蓝牙密钥的确认消息发送给所述服务器;
    在所述服务器接收到所述客户端发送的所述蓝牙密钥的确认消息后,所述智能门锁接收所述客户端发送的业务密钥;
    所述智能门锁发送所述业务密钥的确认消息至所述客户端,以指示所述客户端将所述业务密钥的确认消息发送给所述服务器;
    在所述服务器接收到所述客户端发送的所述业务密钥的确认消息后,所述智能门锁接收所述客户端发送的鉴权码;
    其中,所述鉴权信息中包括所述蓝牙密钥、所述业务密钥及所述鉴权码。
  14. 根据权利要求13所述的方法,其中,所述接收所述客户端发送的业务密钥,包括:
    所述智能门锁接收所述客户端发送的第一加密结果,其中,所述第一加密结果是所述客户端利用所述蓝牙密钥对所述业务密钥进行加密得到的;
    所述智能门锁利用所述蓝牙密钥,对所述第一加密结果进行解密,得到所述业务密钥。
  15. 根据权利要求13所述的方法,其中,所述接收所述客户端发送的鉴权码包括以下至少之一:
    所述智能门锁接收所述客户端发送的第二加密结果,其中,所述第二加密结果是所述客户端利用所述蓝牙密钥对所述鉴权码进行加密得到的;
    所述智能门锁利用所述蓝牙密钥,对所述第二加密结果进行解密,得到所述鉴权码;
    所述智能门锁接收客户端发送的第三加密结果,其中,所述第三加密结果是所述客户端利用所述业务密钥对所述鉴权码进行加密得到的;
    所述智能门锁利用所述业务密钥,对所述第三加密结果进行解密,得到所述鉴权码。
  16. 根据权利要求12所述的方法,其中,所述启动账号绑定过程,包括:
    所述智能门锁接收所述客户端发送的绑定信息,其中,所述绑定 信息中携带有所述客户端匹配的用户账号;
    基于所述用户账号,所述智能门锁启动所述账号绑定过程。
  17. 一种智能门锁的绑定装置,应用于设备管理应用的客户端,包括:
    第一发送单元,设置为向服务器发送绑定请求,其中,所述绑定请求中携带有所述设备管理应用的应用标识及待绑定的智能门锁的无线通信地址;
    第二发送单元,设置为在所述服务器反馈的设备绑定状态信息指示所述智能门锁处于未被绑定的状态,向所述智能门锁发送验证信息,其中,所述验证信息用于对在所述智能门锁接收的输入信息进行验证;
    第三发送单元,设置为将所述智能门锁反馈的验证结果发送给所述服务器;
    第一接收单元,设置为接收所述服务器根据所述验证结果动态生成的鉴权信息,其中,所述鉴权信息中携带有根据所述绑定请求对所述智能门锁进行绑定鉴权的鉴权密钥组;
    第四发送单元,设置为将所述智能门锁反馈的与所述鉴权信息对应的确认消息发送给所述服务器;
    第二接收单元,设置为接收所述服务器发送的绑定指令,并响应于所述绑定指令,触发所述智能门锁的账号绑定过程。
  18. 一种智能门锁的绑定装置,应用于设备管理应用的服务器,包括:
    第三接收单元,设置为接收设备管理应用的客户端发送的绑定请求,其中,所述绑定请求中携带有所述设备管理应用的应用标识及待绑定的智能门锁的无线通信地址;
    第一处理单元,设置为响应所述绑定请求,向所述客户端发送设备绑定状态信息,以指示所述客户端在确定所述设备绑定状态信息指示所述智能门锁处于未绑定的情况下,向所述智能门锁发送验证信息, 其中,所述验证信息用于对在所述智能门锁接收的输入信息进行验证;
    第四接收单元,设置为接收所述客户端发送的所述智能门锁反馈的验证结果;
    第二处理单元,设置为基于所述验证结果,动态生成鉴权信息,并将所述鉴权信息发送给所述客户端,其中,所述鉴权信息中携带有根据所述绑定请求对所述智能门锁进行绑定鉴权的鉴权密钥组;
    第五接收单元,设置为服务器接收所述客户端发送的所述智能门锁反馈的与所述鉴权信息对应的确认消息;
    第五发送单元,设置为服务器发送绑定指令值所述客户端,以指示所述客户端响应于所述绑定指令,触发所述智能门锁的账号绑定过程。
  19. 一种智能门锁的绑定装置,应用于智能门锁,包括:
    第六接收单元,设置为接收客户端发送的验证信息,其中,所述验证信息用于对接收到的输入信息进行验证;
    第一反馈单元,设置为反馈验证结果,并通过所述客户端将所述验证结果发送至服务器,以指示所述服务器将根据所述验证结果动态生成的鉴权信息发送至所述客户端;
    第二反馈单元,设置为反馈与所述鉴权信息对应的确认消息,以指示所述客户端将所述鉴权信息发送至所述服务器;
    启动单元,设置为启动账号绑定过程。
  20. 一种计算机可读的存储介质,其特征在于,所述计算机可读的存储介质包括存储的程序,其中,所述程序运行时执行所述权利要求1至16任一项中所述的方法。
  21. 一种电子装置,包括存储器和处理器,其特征在于,所述存储器中存储有计算机程序,所述处理器被设置为通过所述计算机程序执行所述 权利要求1至16任一项中所述的方法。
PCT/CN2022/121037 2021-12-16 2022-09-23 智能门锁的绑定方法和装置、存储介质及电子装置 WO2023109240A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111547683.9 2021-12-16
CN202111547683.9A CN114189863B (zh) 2021-12-16 2021-12-16 智能门锁的绑定方法和装置、存储介质及电子装置

Publications (1)

Publication Number Publication Date
WO2023109240A1 true WO2023109240A1 (zh) 2023-06-22

Family

ID=80544236

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/121037 WO2023109240A1 (zh) 2021-12-16 2022-09-23 智能门锁的绑定方法和装置、存储介质及电子装置

Country Status (2)

Country Link
CN (1) CN114189863B (zh)
WO (1) WO2023109240A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116994364A (zh) * 2023-08-29 2023-11-03 深圳市亲邻科技有限公司 一种门禁无卡数据载入交互方法

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114189863B (zh) * 2021-12-16 2024-03-22 青岛海尔科技有限公司 智能门锁的绑定方法和装置、存储介质及电子装置
CN115376229B (zh) * 2022-08-26 2023-11-07 广东好太太智能家居有限公司 智能锁绑定方法、装置、存储介质和计算机设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150339662A1 (en) * 2014-05-23 2015-11-26 LoopPay Inc. Systems and methods for linking devices to user accounts
CN112053477A (zh) * 2020-09-15 2020-12-08 公牛集团股份有限公司 智能门锁的控制系统、方法、装置及可读存储介质
WO2021023164A1 (zh) * 2019-08-02 2021-02-11 云丁网络技术(北京)有限公司 一种智能锁具控制方法和系统
CN114189863A (zh) * 2021-12-16 2022-03-15 青岛海尔科技有限公司 智能门锁的绑定方法和装置、存储介质及电子装置

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110930552A (zh) * 2019-11-27 2020-03-27 广东科徕尼智能科技有限公司 一种基于二维码开锁的方法、设备、存储介质
CN111105528B (zh) * 2020-02-20 2021-09-10 南京艾弗雷德网络技术有限公司 一种基于蓝牙广播的智能门锁系统
CN112330855B (zh) * 2020-10-15 2022-06-28 成都市以太节点科技有限公司 一种电子锁安全管理方法、设备及系统
CN113538739B (zh) * 2021-06-09 2023-06-20 杭州华橙软件技术有限公司 智能锁的配对方法、电子装置和存储介质

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150339662A1 (en) * 2014-05-23 2015-11-26 LoopPay Inc. Systems and methods for linking devices to user accounts
WO2021023164A1 (zh) * 2019-08-02 2021-02-11 云丁网络技术(北京)有限公司 一种智能锁具控制方法和系统
CN112053477A (zh) * 2020-09-15 2020-12-08 公牛集团股份有限公司 智能门锁的控制系统、方法、装置及可读存储介质
CN114189863A (zh) * 2021-12-16 2022-03-15 青岛海尔科技有限公司 智能门锁的绑定方法和装置、存储介质及电子装置

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116994364A (zh) * 2023-08-29 2023-11-03 深圳市亲邻科技有限公司 一种门禁无卡数据载入交互方法

Also Published As

Publication number Publication date
CN114189863A (zh) 2022-03-15
CN114189863B (zh) 2024-03-22

Similar Documents

Publication Publication Date Title
WO2023109240A1 (zh) 智能门锁的绑定方法和装置、存储介质及电子装置
CN113055867B (zh) 终端辅助配网的方法和装置、电子设备
CN108768970B (zh) 一种智能设备的绑定方法、身份认证平台及存储介质
JP5189066B2 (ja) 端末装置におけるユーザ認証方法、認証システム、端末装置及び認証装置
US11757874B2 (en) Mutual authentication system
CN104145465B (zh) 机器类型通信中基于群组的自举的方法和装置
US20040168081A1 (en) Apparatus and method simplifying an encrypted network
CN108923927A (zh) 用于对摄像机供给动态qr码和ble连接的系统和方法
CN108471610B (zh) 蓝牙连接控制系统
US20180337783A1 (en) Operating method for push authentication system and device
CN106656923A (zh) 一种设备关联方法、秘钥更新方法及装置
CN103503408A (zh) 用于提供访问凭证的系统和方法
CN105471974A (zh) 实现远程控制的智能设备、终端设备及方法
CN101242404A (zh) 一种基于异质网络的验证方法和系统
CN108390873B (zh) 智能设备的鉴权绑定方法、装置以及系统
US11177963B2 (en) Method for authenticating a user based on an image relation rule and corresponding first user device, server and system
EP3787250B1 (en) Authentication between a telematic control unit and a core server system
WO2023279897A1 (zh) 安全绑定方法及系统、存储介质、电子装置
CN117560665A (zh) 蓝牙连接的认证方法、装置、存储介质和蓝牙连接系统
CN109194905B (zh) 视频会议连接加密、建立方法、终端、服务器以及系统
CN114338132B (zh) 免密登录方法、客户端应用、运营商服务器及电子设备
US20020053022A1 (en) Security arrangement for exchange of encrypted information
JP3851781B2 (ja) 無線通信装置及び無線通信システム、並びに、接続認証方法
KR20150114923A (ko) Ap접속정보 설정방법 및 이를 위한 단말기
WO2023236925A1 (zh) 一种认证方法和通信装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22905993

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE