[go: up one dir, main page]

CN107196928A - Cloud lock encryption method, cloud lock administration system and the cloud lock of a kind of high security - Google Patents

Cloud lock encryption method, cloud lock administration system and the cloud lock of a kind of high security Download PDF

Info

Publication number
CN107196928A
CN107196928A CN201710330169.7A CN201710330169A CN107196928A CN 107196928 A CN107196928 A CN 107196928A CN 201710330169 A CN201710330169 A CN 201710330169A CN 107196928 A CN107196928 A CN 107196928A
Authority
CN
China
Prior art keywords
cloud
lock
information
cloud lock
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710330169.7A
Other languages
Chinese (zh)
Inventor
陈鸿填
周翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Hutlon Technology Co Ltd
Original Assignee
Guangdong Hutlon Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Hutlon Technology Co Ltd filed Critical Guangdong Hutlon Technology Co Ltd
Priority to CN201710330169.7A priority Critical patent/CN107196928A/en
Publication of CN107196928A publication Critical patent/CN107196928A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00182Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
    • G07C2009/00238Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks the transmittted data signal containing a code which is changed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00579Power supply for the keyless data carrier

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A kind of cloud lock encryption method safely and fast, pass through the flow of symmetric cryptography and Custom Encryption, the public keys of cloud lock and server end is not showed in communication link, and the information transmitted between the two is subjected to a variety of encryptions again on the basis of key encryption, password is set more to complicate, plus the system and cloud lock using this encryption method in itself so that information is difficult to be cracked.

Description

Cloud lock encryption method, cloud lock administration system and the cloud lock of a kind of high security
Technical field
The present invention relates to intelligent door lock field, the cloud lock encryption method of more particularly to a kind of high security, cloud lock management system System and cloud lock.
Background technology
The function of cloud lock is stronger and stronger, and user can send various instructions by mobile phone A PP to cloud lock, for example, open the door Deng.It is corresponding, because cloud lock is as electronic equipment, there is the risk of the information securities such as leakage door-opening password, therefore, how to improve The security of cloud lock, strengthens the confidence that user locks to intelligent cloud, so as to improve the market influence and occupation rate of market of cloud lock, is Industry problem very in the urgent need to address.
The content of the invention
It is an object of the invention to propose a kind of cloud lock encryption method, the system using the method and cloud lock, enhancing cloud lock With the high efficiency and security of server communication link, the use intelligent cloud that user can trust is locked.
For up to this purpose, the present invention uses following technical scheme:
A kind of cloud lock encryption method safely and fast, including:
Step one, cloud lock preparation request information;
Step 2, cloud lock CIPHERING REQUEST information, obtains information A;
Step 3, using public-key encryption described information A, obtains information B;
Step 4, encrypts described information B, obtains information C;
Step 5, described information C is sent to server;
Step 6, server decryption described information C, obtains described information B;
Step 7, server decrypts described information B using public keys, obtains described information A;
Step 8, server decryption described information A, obtains solicited message;
Step 9, server authentication solicited message.
It is preferred that, the encryption method of the step 2 and step 4 is md5 and/or base64.
It is preferred that, the decryption method of the step 6 and step 8 is md5 and/or base64.
A kind of cloud lock administration system, including:
Cloud locks preparation request information;
Encryption method is locked using cloud to solicited message, judges whether solicited message can be by the checking of server, if so, taking Business device record solicited message, and feed back to cloud lock;If it is not, feedback error information is locked to cloud.
A kind of cloud lock, encryption method, including lock body are locked using cloud, and be built in inside the lock body micro computer, Charging module and RF radio-frequency modules;
The micro computer controls the work of the cloud lock;
The charging module, which is used to lock the cloud, to charge;
The RF radio-frequency modules are used to send and receive solicited message.
It is preferred that, the RF radio-frequency modules send or received solicited message, the wireless telecommunications using wireless communication mode Mode be MacBee, ZigBee, wifi, bluetooth and it is infrared in one or more.
Beneficial effect:Cloud locks flow of the encryption method by symmetric cryptography and Custom Encryption, cloud is not locked with servicing The public keys at device end shows in communication link, and the information transmitted between the two is carried out again on the basis of key encryption A variety of encryptions, make password more complicate so that information is difficult to be cracked.
Brief description of the drawings
Fig. 1 is the flow chart that medium cloud of the present invention locks encryption method one of which embodiment.
Embodiment
Further illustrate technical scheme below in conjunction with the accompanying drawings and by embodiment.
A kind of cloud lock encryption method safely and fast, including:
S1, cloud lock preparation request information;
S2, cloud lock CIPHERING REQUEST information, obtains information A;
S3, using public-key encryption described information A, obtains information B;
S4, encrypts described information B, obtains information C;
S5, described information C is sent to server;
S6, server decryption described information C, obtains described information B;
S7, server decrypts described information B using public keys, obtains described information A;
S8, server decryption described information A, obtains solicited message;
S9, server authentication solicited message.
The behavior command that cloud lock has been produced is sent to server, such as enabling, Password Input mistake, picking lock.Due to Requirement to high Information Security, the command information of transmission will be then forwarded to server by encryption and be decrypted, to strengthen cloud The high efficiency and security of lock and server communication link, the use intelligent cloud that user can trust are locked.
The method that the application is combined using symmetric cryptography with Custom Encryption mode, symmetric cryptography, it is asymmetric plus It is close with customized encryption format on the basis of also carried out the reinforcings of a variety of cipher modes such as md5, BASE64, allow password More complicate, so as to be more difficult to crack, reached high security.
The public keys being previously mentioned in S3 and S7, refer to a string of the encryption information reached an agreement between cloud lock and server.
It is preferred that, the encryption method of the step 2 and step 4 is md5 and/or base64.
It is preferred that, the decryption method of the step 6 and step 8 is md5 and/or base64.
Md5, i.e. Message Digest Algorithm MD5 (Chinese entitled eap-message digest method the 5th edition), to calculate A kind of widely used hash function in machine security fields, the integrity protection to provide message.
Base64 is to be most commonly used for transmitting one of coded system of 8Bit syllabified codes on network, available in HTTP Longer identification information is transmitted under environment.
A kind of cloud lock administration system, including:
Cloud locks preparation request information;
Encryption method is locked using cloud to solicited message, judges whether solicited message can be by the checking of server, if so, taking Business device record solicited message, and feed back to cloud lock;If it is not, feedback error information is locked to cloud.
Cloud lock administration system organically combines customized encryption method, effective enhancing cloud lock and server communication link The high efficiency and security on road.
A kind of cloud lock, encryption method, including lock body are locked using cloud, and be built in inside the lock body micro computer, Charging module and RF radio-frequency modules;
The micro computer controls the work of the cloud lock;
The charging module, which is used to lock the cloud, to charge;
The RF radio-frequency modules are used to send and receive solicited message.
It is preferred that, the RF radio-frequency modules send or received solicited message, the wireless telecommunications using wireless communication mode Mode be MacBee, ZigBee, wifi, bluetooth and it is infrared in one or more.
By producer's many experiments, it is preferred that current cloud lock uses MacBee wireless transmission method, can ensure that letter Cease the stability and security of transmission.
Above content is only presently preferred embodiments of the present invention, for one of ordinary skill in the art, according to the present invention's Thought, will change in specific embodiments and applications, and this specification content should not be construed as to the present invention Limitation.

Claims (6)

1. a kind of cloud lock encryption method safely and fast, it is characterised in that including:
Step one, cloud lock preparation request information;
Step 2, cloud lock CIPHERING REQUEST information, obtains information A;
Step 3, using public-key encryption described information A, obtains information B;
Step 4, encrypts described information B, obtains information C;
Step 5, described information C is sent to server;
Step 6, server decryption described information C, obtains described information B;
Step 7, server decrypts described information B using public keys, obtains described information A;
Step 8, server decryption described information A, obtains solicited message;
Step 9, server authentication solicited message.
2. cloud as claimed in claim 1 locks encryption method, it is characterised in that the encryption method of the step 2 and step 4 is Md5 and/or base64.
3. cloud as claimed in claim 1 locks encryption method, it is characterised in that the decryption method of the step 6 and step 8 is Md5 and/or base64.
4. a kind of cloud lock administration system, it is characterised in that including:
Cloud lock prepares encryption information;
Encryption method is locked using cloud as claimed in claim 1 to encryption information, judges whether solicited message can be by server Checking, if so, server record solicited message, and feed back to cloud lock;If it is not, feedback error information is locked to cloud.
5. a kind of cloud lock, encryption method is locked using cloud as claimed in claim 1, it is characterised in that:Including lock body, and it is built-in Micro computer, charging module and RF radio-frequency modules inside the lock body;
The micro computer controls the work of the cloud lock;
The charging module, which is used to lock the cloud, to charge;
The RF radio-frequency modules are used to send and receive solicited message.
6. cloud lock as claimed in claim 5, it is characterised in that:The RF radio-frequency modules are sent or connect using wireless communication mode By solicited message, the wireless communication mode be MacBee, ZigBee, wifi, bluetooth and it is infrared in one or more.
CN201710330169.7A 2017-05-11 2017-05-11 Cloud lock encryption method, cloud lock administration system and the cloud lock of a kind of high security Pending CN107196928A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710330169.7A CN107196928A (en) 2017-05-11 2017-05-11 Cloud lock encryption method, cloud lock administration system and the cloud lock of a kind of high security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710330169.7A CN107196928A (en) 2017-05-11 2017-05-11 Cloud lock encryption method, cloud lock administration system and the cloud lock of a kind of high security

Publications (1)

Publication Number Publication Date
CN107196928A true CN107196928A (en) 2017-09-22

Family

ID=59872584

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710330169.7A Pending CN107196928A (en) 2017-05-11 2017-05-11 Cloud lock encryption method, cloud lock administration system and the cloud lock of a kind of high security

Country Status (1)

Country Link
CN (1) CN107196928A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108200019A (en) * 2017-12-21 2018-06-22 广东汇泰龙科技有限公司 A kind of safe and efficient app Encryption Algorithm based on cloud lock
CN108683706A (en) * 2018-04-12 2018-10-19 广东汇泰龙科技有限公司 A kind of Encryption Algorithm and its verification method based on the lock communication of NB-IOT clouds

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101964793A (en) * 2010-10-08 2011-02-02 上海银联电子支付服务有限公司 Method and system for transmitting data between terminal and server and sign-in and payment method
CN104282059A (en) * 2014-08-08 2015-01-14 厦门华数电力科技有限公司 Bluetooth-based safety intelligent lock system with video monitoring function and unlocking and locking methods
CN105096431A (en) * 2015-09-10 2015-11-25 王颖 Intelligent door lock remote control and management system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101964793A (en) * 2010-10-08 2011-02-02 上海银联电子支付服务有限公司 Method and system for transmitting data between terminal and server and sign-in and payment method
CN104282059A (en) * 2014-08-08 2015-01-14 厦门华数电力科技有限公司 Bluetooth-based safety intelligent lock system with video monitoring function and unlocking and locking methods
CN105096431A (en) * 2015-09-10 2015-11-25 王颖 Intelligent door lock remote control and management system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李海峰等: "《现代密码学原理及应用》", 1 June 2013 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108200019A (en) * 2017-12-21 2018-06-22 广东汇泰龙科技有限公司 A kind of safe and efficient app Encryption Algorithm based on cloud lock
CN108683706A (en) * 2018-04-12 2018-10-19 广东汇泰龙科技有限公司 A kind of Encryption Algorithm and its verification method based on the lock communication of NB-IOT clouds
CN108683706B (en) * 2018-04-12 2021-02-09 广东汇泰龙科技股份有限公司 Encryption algorithm based on NB-IOT cloud lock communication and verification method thereof

Similar Documents

Publication Publication Date Title
CN101867530B (en) Things-internet gateway system based on virtual machine and data interactive method
US8898472B2 (en) Mechanism and method for managing credentials on IOS based operating system
CN103873487B (en) A kind of household based on the safe suspension member of intelligent home device trusts the implementation method of networking
CN105610706B (en) A kind of intelligent gateway platform of internet of things oriented control system
CN104092550B (en) Cipher code protection method, system and device
CN114900304B (en) Digital signature method and apparatus, electronic device, and computer-readable storage medium
CN101707767B (en) Data transmission method and devices
CN108270554B (en) Terminal pairing method and system
CN107800537B (en) Encryption database system and method based on quantum key distribution technology, storage method and query method
CN106162537B (en) A kind of method, wireless telecom equipment and the terminal of safety certification connection
CN105553932A (en) Method, device and system of remote control safety binding of intelligent home appliance
CN101822082A (en) Techniques for secure channelization between UICC and terminals
CN102664898A (en) Fingerprint identification-based encrypted transmission method, fingerprint identification-based encrypted transmission device and fingerprint identification-based encrypted transmission system
CN105516103A (en) Method, device and system for binding intelligent household electrical appliances
CN101621794A (en) Method for realizing safe authentication of wireless application service system
CN103051459B (en) The management method of the transaction key of safety card and device
CN105337740A (en) An authentication method, client, relay device and server
CN101296138B (en) Wireless terminal configuration generating method, system and device
CN101102194A (en) An OTP device and a method for identity authentication using the device
CN107612949A (en) A kind of intelligent wireless terminal access authentication method and system based on radio-frequency fingerprint
CN112839329B (en) Verification method, device, equipment and computer readable storage medium
CN107196928A (en) Cloud lock encryption method, cloud lock administration system and the cloud lock of a kind of high security
CN102761417B (en) The processing method of terminal data transmission and terminal
KR102053993B1 (en) Method for Authenticating by using Certificate
CN111263360A (en) Wireless encryption device and method using public key to protect variable mechanical authentication password

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170922