CN107196928A - Cloud lock encryption method, cloud lock administration system and the cloud lock of a kind of high security - Google Patents
Cloud lock encryption method, cloud lock administration system and the cloud lock of a kind of high security Download PDFInfo
- Publication number
- CN107196928A CN107196928A CN201710330169.7A CN201710330169A CN107196928A CN 107196928 A CN107196928 A CN 107196928A CN 201710330169 A CN201710330169 A CN 201710330169A CN 107196928 A CN107196928 A CN 107196928A
- Authority
- CN
- China
- Prior art keywords
- cloud
- lock
- information
- cloud lock
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 30
- 238000004891 communication Methods 0.000 claims abstract description 9
- 230000005540 biological transmission Effects 0.000 description 3
- 230000002708 enhancing effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000003014 reinforcing effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
- H04L67/125—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00182—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
- G07C2009/00238—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks the transmittted data signal containing a code which is changed
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00579—Power supply for the keyless data carrier
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Power Engineering (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A kind of cloud lock encryption method safely and fast, pass through the flow of symmetric cryptography and Custom Encryption, the public keys of cloud lock and server end is not showed in communication link, and the information transmitted between the two is subjected to a variety of encryptions again on the basis of key encryption, password is set more to complicate, plus the system and cloud lock using this encryption method in itself so that information is difficult to be cracked.
Description
Technical field
The present invention relates to intelligent door lock field, the cloud lock encryption method of more particularly to a kind of high security, cloud lock management system
System and cloud lock.
Background technology
The function of cloud lock is stronger and stronger, and user can send various instructions by mobile phone A PP to cloud lock, for example, open the door
Deng.It is corresponding, because cloud lock is as electronic equipment, there is the risk of the information securities such as leakage door-opening password, therefore, how to improve
The security of cloud lock, strengthens the confidence that user locks to intelligent cloud, so as to improve the market influence and occupation rate of market of cloud lock, is
Industry problem very in the urgent need to address.
The content of the invention
It is an object of the invention to propose a kind of cloud lock encryption method, the system using the method and cloud lock, enhancing cloud lock
With the high efficiency and security of server communication link, the use intelligent cloud that user can trust is locked.
For up to this purpose, the present invention uses following technical scheme:
A kind of cloud lock encryption method safely and fast, including:
Step one, cloud lock preparation request information;
Step 2, cloud lock CIPHERING REQUEST information, obtains information A;
Step 3, using public-key encryption described information A, obtains information B;
Step 4, encrypts described information B, obtains information C;
Step 5, described information C is sent to server;
Step 6, server decryption described information C, obtains described information B;
Step 7, server decrypts described information B using public keys, obtains described information A;
Step 8, server decryption described information A, obtains solicited message;
Step 9, server authentication solicited message.
It is preferred that, the encryption method of the step 2 and step 4 is md5 and/or base64.
It is preferred that, the decryption method of the step 6 and step 8 is md5 and/or base64.
A kind of cloud lock administration system, including:
Cloud locks preparation request information;
Encryption method is locked using cloud to solicited message, judges whether solicited message can be by the checking of server, if so, taking
Business device record solicited message, and feed back to cloud lock;If it is not, feedback error information is locked to cloud.
A kind of cloud lock, encryption method, including lock body are locked using cloud, and be built in inside the lock body micro computer,
Charging module and RF radio-frequency modules;
The micro computer controls the work of the cloud lock;
The charging module, which is used to lock the cloud, to charge;
The RF radio-frequency modules are used to send and receive solicited message.
It is preferred that, the RF radio-frequency modules send or received solicited message, the wireless telecommunications using wireless communication mode
Mode be MacBee, ZigBee, wifi, bluetooth and it is infrared in one or more.
Beneficial effect:Cloud locks flow of the encryption method by symmetric cryptography and Custom Encryption, cloud is not locked with servicing
The public keys at device end shows in communication link, and the information transmitted between the two is carried out again on the basis of key encryption
A variety of encryptions, make password more complicate so that information is difficult to be cracked.
Brief description of the drawings
Fig. 1 is the flow chart that medium cloud of the present invention locks encryption method one of which embodiment.
Embodiment
Further illustrate technical scheme below in conjunction with the accompanying drawings and by embodiment.
A kind of cloud lock encryption method safely and fast, including:
S1, cloud lock preparation request information;
S2, cloud lock CIPHERING REQUEST information, obtains information A;
S3, using public-key encryption described information A, obtains information B;
S4, encrypts described information B, obtains information C;
S5, described information C is sent to server;
S6, server decryption described information C, obtains described information B;
S7, server decrypts described information B using public keys, obtains described information A;
S8, server decryption described information A, obtains solicited message;
S9, server authentication solicited message.
The behavior command that cloud lock has been produced is sent to server, such as enabling, Password Input mistake, picking lock.Due to
Requirement to high Information Security, the command information of transmission will be then forwarded to server by encryption and be decrypted, to strengthen cloud
The high efficiency and security of lock and server communication link, the use intelligent cloud that user can trust are locked.
The method that the application is combined using symmetric cryptography with Custom Encryption mode, symmetric cryptography, it is asymmetric plus
It is close with customized encryption format on the basis of also carried out the reinforcings of a variety of cipher modes such as md5, BASE64, allow password
More complicate, so as to be more difficult to crack, reached high security.
The public keys being previously mentioned in S3 and S7, refer to a string of the encryption information reached an agreement between cloud lock and server.
It is preferred that, the encryption method of the step 2 and step 4 is md5 and/or base64.
It is preferred that, the decryption method of the step 6 and step 8 is md5 and/or base64.
Md5, i.e. Message Digest Algorithm MD5 (Chinese entitled eap-message digest method the 5th edition), to calculate
A kind of widely used hash function in machine security fields, the integrity protection to provide message.
Base64 is to be most commonly used for transmitting one of coded system of 8Bit syllabified codes on network, available in HTTP
Longer identification information is transmitted under environment.
A kind of cloud lock administration system, including:
Cloud locks preparation request information;
Encryption method is locked using cloud to solicited message, judges whether solicited message can be by the checking of server, if so, taking
Business device record solicited message, and feed back to cloud lock;If it is not, feedback error information is locked to cloud.
Cloud lock administration system organically combines customized encryption method, effective enhancing cloud lock and server communication link
The high efficiency and security on road.
A kind of cloud lock, encryption method, including lock body are locked using cloud, and be built in inside the lock body micro computer,
Charging module and RF radio-frequency modules;
The micro computer controls the work of the cloud lock;
The charging module, which is used to lock the cloud, to charge;
The RF radio-frequency modules are used to send and receive solicited message.
It is preferred that, the RF radio-frequency modules send or received solicited message, the wireless telecommunications using wireless communication mode
Mode be MacBee, ZigBee, wifi, bluetooth and it is infrared in one or more.
By producer's many experiments, it is preferred that current cloud lock uses MacBee wireless transmission method, can ensure that letter
Cease the stability and security of transmission.
Above content is only presently preferred embodiments of the present invention, for one of ordinary skill in the art, according to the present invention's
Thought, will change in specific embodiments and applications, and this specification content should not be construed as to the present invention
Limitation.
Claims (6)
1. a kind of cloud lock encryption method safely and fast, it is characterised in that including:
Step one, cloud lock preparation request information;
Step 2, cloud lock CIPHERING REQUEST information, obtains information A;
Step 3, using public-key encryption described information A, obtains information B;
Step 4, encrypts described information B, obtains information C;
Step 5, described information C is sent to server;
Step 6, server decryption described information C, obtains described information B;
Step 7, server decrypts described information B using public keys, obtains described information A;
Step 8, server decryption described information A, obtains solicited message;
Step 9, server authentication solicited message.
2. cloud as claimed in claim 1 locks encryption method, it is characterised in that the encryption method of the step 2 and step 4 is
Md5 and/or base64.
3. cloud as claimed in claim 1 locks encryption method, it is characterised in that the decryption method of the step 6 and step 8 is
Md5 and/or base64.
4. a kind of cloud lock administration system, it is characterised in that including:
Cloud lock prepares encryption information;
Encryption method is locked using cloud as claimed in claim 1 to encryption information, judges whether solicited message can be by server
Checking, if so, server record solicited message, and feed back to cloud lock;If it is not, feedback error information is locked to cloud.
5. a kind of cloud lock, encryption method is locked using cloud as claimed in claim 1, it is characterised in that:Including lock body, and it is built-in
Micro computer, charging module and RF radio-frequency modules inside the lock body;
The micro computer controls the work of the cloud lock;
The charging module, which is used to lock the cloud, to charge;
The RF radio-frequency modules are used to send and receive solicited message.
6. cloud lock as claimed in claim 5, it is characterised in that:The RF radio-frequency modules are sent or connect using wireless communication mode
By solicited message, the wireless communication mode be MacBee, ZigBee, wifi, bluetooth and it is infrared in one or more.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201710330169.7A CN107196928A (en) | 2017-05-11 | 2017-05-11 | Cloud lock encryption method, cloud lock administration system and the cloud lock of a kind of high security |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201710330169.7A CN107196928A (en) | 2017-05-11 | 2017-05-11 | Cloud lock encryption method, cloud lock administration system and the cloud lock of a kind of high security |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN107196928A true CN107196928A (en) | 2017-09-22 |
Family
ID=59872584
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201710330169.7A Pending CN107196928A (en) | 2017-05-11 | 2017-05-11 | Cloud lock encryption method, cloud lock administration system and the cloud lock of a kind of high security |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN107196928A (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108200019A (en) * | 2017-12-21 | 2018-06-22 | 广东汇泰龙科技有限公司 | A kind of safe and efficient app Encryption Algorithm based on cloud lock |
| CN108683706A (en) * | 2018-04-12 | 2018-10-19 | 广东汇泰龙科技有限公司 | A kind of Encryption Algorithm and its verification method based on the lock communication of NB-IOT clouds |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101964793A (en) * | 2010-10-08 | 2011-02-02 | 上海银联电子支付服务有限公司 | Method and system for transmitting data between terminal and server and sign-in and payment method |
| CN104282059A (en) * | 2014-08-08 | 2015-01-14 | 厦门华数电力科技有限公司 | Bluetooth-based safety intelligent lock system with video monitoring function and unlocking and locking methods |
| CN105096431A (en) * | 2015-09-10 | 2015-11-25 | 王颖 | Intelligent door lock remote control and management system |
-
2017
- 2017-05-11 CN CN201710330169.7A patent/CN107196928A/en active Pending
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101964793A (en) * | 2010-10-08 | 2011-02-02 | 上海银联电子支付服务有限公司 | Method and system for transmitting data between terminal and server and sign-in and payment method |
| CN104282059A (en) * | 2014-08-08 | 2015-01-14 | 厦门华数电力科技有限公司 | Bluetooth-based safety intelligent lock system with video monitoring function and unlocking and locking methods |
| CN105096431A (en) * | 2015-09-10 | 2015-11-25 | 王颖 | Intelligent door lock remote control and management system |
Non-Patent Citations (1)
| Title |
|---|
| 李海峰等: "《现代密码学原理及应用》", 1 June 2013 * |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108200019A (en) * | 2017-12-21 | 2018-06-22 | 广东汇泰龙科技有限公司 | A kind of safe and efficient app Encryption Algorithm based on cloud lock |
| CN108683706A (en) * | 2018-04-12 | 2018-10-19 | 广东汇泰龙科技有限公司 | A kind of Encryption Algorithm and its verification method based on the lock communication of NB-IOT clouds |
| CN108683706B (en) * | 2018-04-12 | 2021-02-09 | 广东汇泰龙科技股份有限公司 | Encryption algorithm based on NB-IOT cloud lock communication and verification method thereof |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN101867530B (en) | Things-internet gateway system based on virtual machine and data interactive method | |
| US8898472B2 (en) | Mechanism and method for managing credentials on IOS based operating system | |
| CN103873487B (en) | A kind of household based on the safe suspension member of intelligent home device trusts the implementation method of networking | |
| CN105610706B (en) | A kind of intelligent gateway platform of internet of things oriented control system | |
| CN104092550B (en) | Cipher code protection method, system and device | |
| CN114900304B (en) | Digital signature method and apparatus, electronic device, and computer-readable storage medium | |
| CN101707767B (en) | Data transmission method and devices | |
| CN108270554B (en) | Terminal pairing method and system | |
| CN107800537B (en) | Encryption database system and method based on quantum key distribution technology, storage method and query method | |
| CN106162537B (en) | A kind of method, wireless telecom equipment and the terminal of safety certification connection | |
| CN105553932A (en) | Method, device and system of remote control safety binding of intelligent home appliance | |
| CN101822082A (en) | Techniques for secure channelization between UICC and terminals | |
| CN102664898A (en) | Fingerprint identification-based encrypted transmission method, fingerprint identification-based encrypted transmission device and fingerprint identification-based encrypted transmission system | |
| CN105516103A (en) | Method, device and system for binding intelligent household electrical appliances | |
| CN101621794A (en) | Method for realizing safe authentication of wireless application service system | |
| CN103051459B (en) | The management method of the transaction key of safety card and device | |
| CN105337740A (en) | An authentication method, client, relay device and server | |
| CN101296138B (en) | Wireless terminal configuration generating method, system and device | |
| CN101102194A (en) | An OTP device and a method for identity authentication using the device | |
| CN107612949A (en) | A kind of intelligent wireless terminal access authentication method and system based on radio-frequency fingerprint | |
| CN112839329B (en) | Verification method, device, equipment and computer readable storage medium | |
| CN107196928A (en) | Cloud lock encryption method, cloud lock administration system and the cloud lock of a kind of high security | |
| CN102761417B (en) | The processing method of terminal data transmission and terminal | |
| KR102053993B1 (en) | Method for Authenticating by using Certificate | |
| CN111263360A (en) | Wireless encryption device and method using public key to protect variable mechanical authentication password |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170922 |