CN109949461B - Unlocking method and device - Google Patents
Unlocking method and device Download PDFInfo
- Publication number
- CN109949461B CN109949461B CN201910199130.5A CN201910199130A CN109949461B CN 109949461 B CN109949461 B CN 109949461B CN 201910199130 A CN201910199130 A CN 201910199130A CN 109949461 B CN109949461 B CN 109949461B
- Authority
- CN
- China
- Prior art keywords
- unlocking
- door lock
- data
- electronic door
- unlocking device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 83
- 238000004891 communication Methods 0.000 claims abstract description 214
- 238000012795 verification Methods 0.000 claims abstract description 164
- 230000009471 action Effects 0.000 claims abstract description 11
- 238000012545 processing Methods 0.000 claims description 41
- 230000004044 response Effects 0.000 claims description 31
- 238000013475 authorization Methods 0.000 claims description 29
- 230000003993 interaction Effects 0.000 claims description 25
- 230000008569 process Effects 0.000 claims description 18
- 108091006146 Channels Proteins 0.000 description 9
- 238000004590 computer program Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 7
- 238000004364 calculation method Methods 0.000 description 5
- 238000005336 cracking Methods 0.000 description 5
- 238000004422 calculation algorithm Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 4
- 230000009977 dual effect Effects 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 238000013524 data verification Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005265 energy consumption Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Landscapes
- Lock And Its Accessories (AREA)
Abstract
The invention provides an unlocking method and device, wherein the method comprises the following steps: when the electronic door lock detects an unlocking action, the electronic door lock firstly sends first verification data to the unlocking device through communication connection established between the electronic door lock and the unlocking device in a first near field communication mode, receives first feedback data generated by the unlocking device according to the first verification data, verifies that the unlocking device is bound unlocking device according to the first feedback data, then sends second verification data to the unlocking device through communication connection established between the electronic door lock and the unlocking device in a second near field communication mode, receives second feedback data generated by the unlocking device according to the second verification data, and unlocks after the second feedback data are verified to be passed. According to the technical scheme provided by the invention, the complexity of unlocking verification can be increased, and the safety of the electronic door lock is further improved.
Description
Technical Field
The invention relates to the technical field of electronic door locks, in particular to an unlocking method and device.
Background
The intelligent electronic door lock is a lock which is different from a traditional mechanical lock and is more intelligent in the aspects of user identification, safety and manageability. With the development of the intelligent electronic door lock, the intelligent electronic door lock is gradually popularized and applied in places such as hotels, apartments, rental houses and residential quarters, and the security problem of the intelligent electronic door lock is increasingly important.
Early intelligent electronic door locks mostly use magnetic cards, radio frequency cards or TM cards to unlock the locks, but the cards are easy to copy, thereby affecting the safety of the intelligent electronic door locks, and being easy to damage along with the increase of the use times. The remote control lock is the emerging intelligent electronic lock at present, mainly utilizes wireless technology and internet of things, realizes being connected of equipment of unblanking and lock through wireless signal such as network or bluetooth, makes the equipment of unblanking unblank through network or bluetooth etc. and it is difficult for being duplicated, does not also have the use and damages the problem.
However, in the technology of unlocking by using wireless signals, unlocking is performed by mostly adopting a single verification method, so that the technology is easy to crack by a third party and has low safety.
Disclosure of Invention
In view of this, the present invention provides an unlocking method and device, which are used to increase the complexity of unlocking verification, thereby improving the security of the electronic door lock.
In order to achieve the above object, in a first aspect, an embodiment of the present invention provides an unlocking method applied to an electronic door lock, including:
when the unlocking action is detected, sending first verification data to the unlocking equipment through communication connection established between the unlocking equipment and the first near field communication mode;
receiving first feedback data generated by the unlocking equipment according to the first verification data, and verifying whether the unlocking equipment is bound unlocking equipment or not according to the first feedback data;
if the unlocking device is verified to be the bound unlocking device according to the first feedback data, sending second verification data to the unlocking device through communication connection established with the unlocking device in a second near field communication mode;
and receiving second feedback data generated by the unlocking equipment according to the second verification data, and unlocking after the second feedback data is verified.
In a second aspect, an embodiment of the present invention provides an unlocking method applied to unlocking equipment, including:
receiving first verification data sent by the electronic door lock through communication connection established with the electronic door lock in a first near field communication mode;
generating first feedback data according to the first verification data, and returning the first feedback data to the electronic door lock, so that the electronic door lock verifies whether the unlocking equipment is bound unlocking equipment according to the first feedback data;
receiving second verification data sent by the electronic door lock through communication connection established with the electronic door lock in a second near field communication mode, wherein the second verification data are sent when the electronic door lock verifies that the unlocking device is the bound unlocking device according to the first feedback data;
and generating second feedback data according to the second verification data, and returning the second feedback data to the electronic door lock so that the electronic door lock verifies the second feedback data, and unlocking after the second feedback data is verified.
In a third aspect, an embodiment of the present invention provides an unlocking device applied to an electronic door lock, including: the system comprises a first communication module, a second communication module and a processing module;
the first communication module is used for establishing communication connection with the unlocking equipment in a first near field communication mode;
a second communication module for establishing communication connection with the unlocking device by adopting a second near field communication mode
The processing module is used for sending first verification data to the unlocking equipment through the communication connection established by the first communication module and receiving first feedback data generated by the unlocking equipment according to the first verification data;
the processing module is also used for verifying whether the unlocking equipment is bound unlocking equipment or not according to the first feedback data; after the unlocking device is verified to be the bound unlocking device according to the first feedback data, second verification data are sent to the unlocking device through the communication connection established by the second communication module, and second feedback data generated by the unlocking device according to the second verification data are received;
the processing module is further configured to: and unlocking after the second feedback data is verified.
In a fourth aspect, an embodiment of the present invention provides an unlocking device, which is applied to unlocking equipment, and includes: the system comprises a first communication module, a second communication module, a processing module and a safety module;
the first communication module is used for establishing communication connection with the electronic door lock in a first near field communication mode;
the second communication module is used for establishing communication connection with the electronic door lock in a second near field communication mode;
the processing module is used for acquiring first verification data from the electronic door lock through the communication connection established by the first communication module, generating first feedback data based on the first verification data through the security module, and returning the first feedback data to the electronic door lock through the communication connection established by the first communication module, so that the electronic door lock verifies whether the unlocking equipment is bound unlocking equipment according to the first feedback data;
the processing module is further used for acquiring second verification data from the electronic door lock through the communication connection established by the second communication module, generating second feedback data based on the second verification data through the security module, and returning the second feedback data to the electronic door lock through the communication connection established by the second communication module, so that the electronic door lock unlocks after the second feedback data is verified.
According to the unlocking method and the unlocking device provided by the embodiment of the invention, when the electronic door lock detects an unlocking action, the electronic door lock firstly sends first verification data to the unlocking device through the communication connection established between the electronic door lock and the unlocking device in the first near-field communication mode, receives first feedback data generated by the unlocking device according to the first verification data, verifies that the unlocking device is bound unlocking device according to the first feedback data, then sends second verification data to the unlocking device through the communication connection established between the electronic door lock and the unlocking device in the second near-field communication mode, receives second feedback data generated by the unlocking device according to the second verification data, and finally unlocks after the second feedback data is verified, namely, a double unlocking verification mechanism is adopted during unlocking, so that the complexity of unlocking verification can be increased, and the safety of the electronic door lock is further improved.
Drawings
Fig. 1 is a schematic flow chart of an unlocking method according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of another unlocking method provided by the embodiment of the invention;
fig. 3 is a schematic flow chart of another unlocking method provided by the embodiment of the invention;
fig. 4 is a schematic structural diagram of an unlocking device according to an embodiment of the present invention;
fig. 5 is a schematic structural view of another unlocking device provided by the embodiment of the invention;
fig. 6 is a schematic structural diagram of an electronic door lock according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of an unlocking apparatus provided in the embodiment of the present invention.
Detailed Description
Aiming at the technical problem that the safety of an electronic door lock is not high because the existing unlocking method is single and is easy to be cracked by a third party, the embodiment of the invention provides an unlocking method and a device, which mainly send first verification data to an unlocking device through a communication connection established between the electronic door lock and the unlocking device in a first near field communication mode when the electronic door lock detects the unlocking action, then receive first feedback data generated by the unlocking device according to the first verification data, verify whether the unlocking device is a bound unlocking device according to the first feedback data, send second verification data to the unlocking device through the communication connection established between the unlocking device and the second near field communication mode if the unlocking device is verified to be the bound unlocking device according to the first feedback data, and then receive second feedback data generated by the unlocking device according to the second verification data, unblank after passing to the verification of second feedback data to verify the complexity that the mechanism increased the verification of unblanking through dual unblanking, and then improve electronic door lock's security.
Embodiments of the present invention are described below with reference to the accompanying drawings, which show exemplary embodiments of the present disclosure, however, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
Fig. 1 is a schematic flow diagram of an unlocking method provided in an embodiment of the present invention, and as shown in fig. 1, the method provided in this embodiment may include the following steps:
s101, when the unlocking action is detected, the electronic door lock sends first verification data to the unlocking device through communication connection established between the electronic door lock and the unlocking device in a first near field communication mode.
Specifically, the electronic door lock can confirm that the unlocking action is detected when the unlocking device is detected within the scanning range. In order to reduce energy consumption, the electronic door lock can be in a low-power consumption standby state in a default state, and only the touch key is in a scanning state; after approaching, a person can touch a touch key of the electronic door lock to wake up the electronic door lock, and the electronic door lock confirms that the unlocking action is detected; then, the electronic door lock starts to scan the unlocking device, and after the unlocking device is scanned, a communication connection is established with the unlocking device in a first near field communication mode so as to send first verification data to the unlocking device.
In this embodiment, equipment of unblanking can be intelligent bracelet, bluetooth equipment or other intelligence wearing equipment.
The first Near Field Communication mode may be Near Field Communication (NFC), Bluetooth technology (Bluetooth), wireless broadband technology (WI-FI), ZigBee protocol (ZigBee), or the like, which is not specifically limited in this embodiment of the present invention.
The first authentication data may be any data, such as a random number. In order to ensure the security of the data, the unlocking device and the agreed key pre-stored in the door lock can be used for encrypting the first verification data and then sending the first verification data to the unlocking device.
S102, the unlocking device generates first feedback data according to the first verification data.
Specifically, after the unlocking device receives the first verification data, the first verification data can be signed by using a private key of the unlocking device to obtain first feedback data; the first verification data may also be encrypted by using a contract key or a data interaction key calculated in real time by using a contract key calculation method to obtain the first feedback data. For the convenience of identification, the first feedback data can also carry the equipment identifier of the unlocking equipment.
S103, the electronic door lock receives first feedback data generated by the unlocking device according to the first verification data, and verifies whether the unlocking device is a bound unlocking device according to the first feedback data.
Correspondingly, after receiving the first feedback data, the electronic door lock verifies the first feedback data, and the verification process may be: the electronic door lock checks the first feedback data by using a prestored public key of the unlocking device; or the first verification data is decrypted by adopting an agreed key or a data interaction key calculated in real time by adopting an agreed key calculation mode; and if the signature verification and decryption are successful, or the decrypted equipment identifier and the first verification data are consistent with the pre-stored bound unlocking equipment identifier and the first verification data, judging that the unlocking equipment is bound unlocking equipment. In order to improve the unlocking safety, a safety chip can be arranged in the unlocking equipment before leaving a factory, a public key and a private key of the unlocking equipment, a preset key or a key generation algorithm can be stored in the safety chip, and in addition, the data calculation processing work can also be completed by the safety chip.
And S104, if the electronic door lock verifies that the unlocking device is the bound unlocking device according to the first feedback data, sending second verification data to the unlocking device through communication connection established with the unlocking device in a second near field communication mode.
After the first feedback data verification is passed, the electronic door lock sends a message of successful verification of the unlocking device based on the first communication mode to the unlocking device, the unlocking device identifies the verified bound electronic door lock, and the unlocking device can also display the successful message on a display screen of the unlocking device. Further, after the electronic door lock and the unlocking device are successfully verified based on the first Near Field Communication mode, a second Near Field Communication connection is established between the electronic door lock and the unlocking device, and the second Near Field Communication connection mode can also be Near Field Communication (NFC), Bluetooth (Bluetooth), wireless broadband (WI-FI), ZigBee (ZigBee) or other Near Field Communication modes. Therefore, the unlocking difficulty is improved, and the sequence of the two communication modes is not specifically limited during implementation.
After the electronic door lock and the unlocking device establish communication connection based on the second near field communication mode, the electronic door lock sends second verification data to the unlocking device, and the second verification data is similar to the first verification data and can be any data, such as a random number. Optionally, the second verification data may include an agreement field generated based on the first feedback data, so that the unlocking device identifies the verified bound electronic door lock based on the agreement field.
And S105, the unlocking device generates second feedback data according to the second verification data.
Specifically, after the unlocking device receives the second verification data, the second verification data and the identifier of the unlocking device can be signed by using a private key of the unlocking device to obtain second feedback data; the agreed key or the data interaction key calculated in real time by adopting an agreed key calculation mode can be used for encrypting the second verification data and the identifier of the unlocking device to obtain second feedback data.
S106, the electronic door lock receives second feedback data generated by the unlocking equipment according to the second verification data, and unlocking is carried out after the second feedback data are verified.
The electronic door lock checks the second feedback data by using a prestored public key of the unlocking device; or decrypting the second verification data by adopting an agreed key, comparing the device identifier and the second verification data obtained by decryption with the bound unlocking device identifier and the second verification data which are stored in advance, and if the verification is successful or the comparison result is consistent, judging that the unlocking device is the bound unlocking device.
According to the unlocking method provided by the embodiment, the complexity of unlocking verification is increased through a dual unlocking verification mechanism, and the safety of the electronic door lock is further improved.
Fig. 2 is a schematic flow chart of another unlocking method provided by an embodiment of the present invention, where the embodiment mainly provides a specific implementation manner that a hardware key is added as an unlocking device on the basis of the above embodiment, and unlocking is performed on the basis of the hardware key, as shown in fig. 2, the method provided by the embodiment may include the following steps:
s201, after the electronic door lock establishes communication connection with the unlocking device in a first near field communication mode or a second near field communication mode, authorization data are sent to the unlocking device.
Specifically, the hardware key can be added to the management interface of the electronic door lock, the hardware key which is added when being selected is taken as an encryption bracelet for example and is explained below, when the selected first near field communication mode is NFC, the NFC antenna position of the encryption bracelet can be closely attached to the position of the door lock NFC card reader, and when the selected first near field communication mode is Bluetooth, the touch key of the encryption bracelet can be pressed for a long time, so that the encryption bracelet enters a waiting binding state. The request authorization data sent by the electronic door lock to the hardware key can be any data, such as a random number, and in order to enhance the security of the connection device, the authorization data can be encrypted by using a convention key and then sent to the hardware key.
S202, the unlocking device receives authorization data sent by the electronic door lock through communication connection established between the unlocking device and the electronic door lock in a first near field communication mode or a second near field communication mode, and returns authorization response data and a prestored digital certificate of the unlocking device to the electronic door lock.
If the authorized data is encrypted by using the agreed key in the process of sending the verification data by the electronic door lock, the unlocking equipment can firstly decrypt the encrypted authorized data by using the agreed key to obtain the authorized data after receiving the encrypted authorized data sent by the electronic door lock. The unlocking device receives the authorization data and then generates authorization response data according to the authorization data, and when the authorization response data are specifically generated, the unlocking device can encrypt the authorization data by using a private key of the unlocking device, namely, the authorization data are signed and generated.
After the unlocking device generates the authorization response data, the signed signature data and the digital certificate can be sent to the electronic door lock together, wherein the digital certificate comprises the public key and the digital signature of the unlocking device.
S203, the electronic door lock receives the authorization response data fed back by the unlocking equipment and the digital certificate of the unlocking equipment, verifies the digital certificate and the authorization response data, and marks the unlocking equipment as a hardware key after the verification is successful.
Specifically, the electronic door lock can adopt the public key of the root device to decrypt the digital certificate to verify the digital certificate, and the public key of the unlocking device can be obtained after the verification is passed; and then, the public key of the unlocking device can be used for checking and signing the authorization response data, if the checking and signing are successful, the unlocking device can be recorded as a hardware key, and meanwhile, the identification of the unlocking device, such as a Media Access Control Address (MAC) and a public key, can be stored. Then, the electronic door lock can return an authorization success result to the unlocking device, and the unlocking device can display the authorization result through the display screen.
And S204, when the electronic door lock detects an unlocking action, sending first verification data to the unlocking equipment through the communication connection established between the electronic door lock and the unlocking equipment in the first near field communication mode.
Taking the first near field communication mode as an example for explanation, when the electronic door lock detects that a person touches a door lock touch key, the NFC card reader can be opened to perform NFC scanning; when the unlocking device is close to the door lock NFC scanning area, the electronic door lock is connected with the unlocking device through NFC after scanning is successful, and first verification data is sent to the unlocking device through the NFC connection channel, wherein the first verification data can be any data, such as a random number.
S205, the unlocking device receives first verification data through the communication connection established between the unlocking device and the electronic door lock in the first near field communication mode, generates first feedback data according to the first verification data, and returns the first feedback data to the electronic door lock.
After the unlocking device receives the first verification data, the first verification data and the identification of the unlocking device can be signed by using the private key of the unlocking device to obtain first feedback data, and then the first feedback data is sent to the electronic door lock. The first verification data and the identifier of the unlocking device can be encrypted by using the agreed key or the data interaction key calculated in real time by adopting an agreed key calculation mode to obtain the first feedback data.
S206, the electronic door lock receives the first feedback data, and whether the unlocking device is the bound unlocking device or not is verified according to the first feedback data.
After receiving the first feedback data, the electronic door lock can use a pre-stored public key of the unlocking device to check and sign the first feedback data; or decrypting the unlocking equipment by using a pre-agreed secret key, comparing the equipment identifier and the verification data obtained by decryption with the bound unlocking equipment identifier and the verification data which are stored in advance, and judging the unlocking equipment as the bound unlocking equipment after the verification is successful or when the comparison result is consistent.
And S207, if the electronic door lock verifies that the unlocking device is the bound unlocking device according to the first feedback data, returning a verification passing message to the unlocking device.
The authentication is completed by a message indicating that the authentication process using the first short-range communication method is completed.
And S208, after receiving the verification passing message, the unlocking device sends a connection signal to the electronic door lock.
Wherein, the connection signal may carry an agreement field generated based on the first verification data and/or the first feedback data.
Explaining by using the second near field communication mode as Bluetooth, after the first feedback data verification is passed, the unlocking device starts Bluetooth broadcasting, and the Bluetooth broadcasting information of the unlocking device can carry an agreement field of the first NFC unlocking stage verification information. For example, when the authentication information in the NFC unlocking stage is 123456, the pre-agreed field may be defined as 123, and the specification of the agreed field is not specifically limited in this embodiment. The NFC verification stage verifies the connecting equipment once, and then in the connection process of the Bluetooth connection mode, the NFC verification information protocol field is used, so that the safety of the connecting equipment is confirmed, and the safety of Bluetooth connection of the electronic door lock is improved.
S209, the electronic door lock extracts an agreement field generated based on the first verification data and/or the first feedback data from the connection signal sent by the unlocking device so as to identify the verified bound unlocking device according to the agreement field.
The electronic door lock starts Bluetooth scanning, the effective time of the Bluetooth scanning can be set, and if legal unlocking equipment is not scanned within the effective time, unlocking fails. After the Bluetooth of the electronic door lock scans the Bluetooth broadcast sent by the unlocking equipment, the protocol field carried in the broadcast information is extracted, and then the protocol field is compared with the protocol field stored by the electronic door lock, if the protocol field is matched with the protocol field stored by the electronic door lock, the electronic door lock can determine that the unlocking equipment is a legal hardware key, and at the moment, the electronic door lock can establish Bluetooth connection with the unlocking equipment.
And S210, after the verification is passed, the electronic door lock sends second verification data to the unlocking device through the communication connection established between the electronic door lock and the unlocking device in the second near field communication mode.
And S211, the unlocking device receives second verification data through the communication connection established between the unlocking device and the electronic door lock in the second near field communication mode, generates second feedback data according to the second verification data, and returns the second feedback data to the electronic door lock.
In a possible design, the unlocking device may use its own private key to sign the second verification data and/or the unlocking device identifier to obtain the second feedback data, or use a predetermined key to encrypt the second verification data and/or the unlocking device identifier to obtain the second feedback data, and then return the second feedback data to the unlocking device.
S212, the electronic door lock receives the second feedback data, then the unlocking equipment is verified according to the second feedback data, and unlocking is carried out after verification is passed.
After the electronic door lock receives the second feedback data, based on a verification protocol agreed with the unlocking device in advance, the public key of the unlocking device can be used for verifying the signature of the second feedback data, or the agreed key is used for decrypting the second feedback data to verify whether the decrypted data is consistent with the agreed data, and the electronic door lock is unlocked after the signature is verified successfully or the decrypted data is successfully decrypted.
In one possible design, the second verification data sent by the electronic door lock to the unlocking device includes an agreement field generated based on the first feedback data, and the unlocking device identifies the bound electronic door lock verified by the first near field communication mode based on the agreement field.
Specifically, a certain number of bits of the first feedback data may be used as the agreement field, for example, when the first feedback data is ABCDE, the first three bits may be defined as the agreement field, and the agreement field is ABC, or a function may be defined to transcode the first feedback data to obtain the agreement field. This embodiment is not particularly limited. In this kind of implementation, because the agreement field of the verification data in the first verification process has been used to the second verification process, then only when dual verification all passes, the action of just can carrying out safety unblanking, this to a great extent has improved the degree of difficulty of cracking the unblanking, because subsequent bluetooth is unblanked and is verified some data that have still used NFC to unblank to verify, make only NFC unblank attack and bluetooth attack, can not realize cracking and unblanking, the degree of difficulty of cracking of making up has also improved simultaneously.
According to the unlocking method provided by the embodiment, the unlocking equipment such as the encryption bracelet is bound as the hardware key of the electronic door lock, the unlocking equipment is verified in the first verification mode, then the unlocking equipment is verified in the second verification mode, and in the second verification process, the protocol field of the data in the first verification stage is used, so that the unlocking can not be cracked only by conducting attack in a certain verification mode, meanwhile, the difficulty of combination and cracking is improved, and the difficulty of cracking the unlocking is improved to a great extent.
Fig. 3 is a schematic flow chart of another unlocking method provided by an embodiment of the present invention, where the embodiment mainly describes a specific interaction process between an electronic door lock and an unlocking device when a bluetooth channel binding key is selected in the above embodiment, and as shown in fig. 3, the method provided by the embodiment may include the following steps:
s301, when the unlocking device is added as a hardware key, after the electronic door lock is connected with the unlocking device through Bluetooth, a pairing request is sent to the unlocking device, and the pairing request comprises a second key parameter.
When a hardware key is added, a communication channel can be selected from the communication channels to establish communication connection, and when a Bluetooth channel is selected for key binding, in order to prevent packet capturing in the air and increase security, the Bluetooth connection can be established in the following mode.
Use equipment of unblanking to explain for encrypting the bracelet as an example below, it has the security chip that has data storage processing ability to embed before the encryption bracelet dispatches from the factory, and is concrete, and the user can press making it of encrypting the bracelet long and get into and pair the broadcast state, and at this moment, the security chip of encrypting the bracelet can generate and pair the sign indicating number and show on encrypting the bracelet screen, and wherein, should pair the sign indicating number and can be arbitrary random number. Meanwhile, the encryption bracelet may encrypt the agreement field of the random code by using a contract key, and carry the encrypted agreement field in the broadcast data of the bluetooth, for example, when the pairing code is 123456, 123 in 123456 is encrypted as ABC, and ABC is carried in the broadcast data of the bluetooth. The user can touch the electronic lock to make it get into the bluetooth scanning state, then inputs complete pairing code in the electronic lock, like 123456, after the bluetooth of electronic lock scans data ABC in the encryption bracelet bluetooth broadcast, can use the agreed key of prestoring to decrypt it and obtain 123, verify whether 123 that the decryption obtained is the partial field of complete pairing code 123456, verify that after successful, the electronic lock can establish the bluetooth with encrypting the bracelet and be connected.
After the electronic door lock is connected with the encryption bracelet through Bluetooth, a pairing request can be sent to the encryption bracelet, and second key parameters included in the pairing request can include an encrypted basic key, a host machine MAC address and any random number R1. The basic key is the same encryption key carried by both the electronic door lock and the unlocking device when the electronic door lock leaves a factory, the host machine MAC address is the door lock MAC address, and the random number R1 can be any random number.
S302, after the unlocking device establishes Bluetooth connection with the electronic door lock, the unlocking device receives a pairing request sent by the electronic door lock, generates a preset secret key according to a second secret key parameter in the pairing request, and sends a pairing response to the electronic door lock after the preset secret key is generated.
After the encryption bracelet receives a pairing request sent by an electronic door lock, an encrypted basic key can be decrypted by using a key carried in factory and identical with the electronic door lock, and after the basic keys of the two parties are confirmed to be identical, a preset key is generated according to a second key parameter in the pairing request, wherein the preset key is used for generating a data interaction key in a handshaking process with the electronic door lock.
Optionally, the generating, by the unlocking device, the preset key according to the second key parameter in the pairing request includes: the unlocking device generates a preset key according to the basic key, the host MAC and the random number R1.
S303, the electronic door lock receives the pairing response sent by the unlocking device and generates a preset key according to the second key parameter.
After receiving the pairing response, the electronic door lock is successfully paired with the encryption bracelet in a Bluetooth mode, and the MAC address of the encryption bracelet can be acquired through a Bluetooth channel for storage, so that pairing and binding of the electronic door lock and the encryption bracelet are completed; and the electronic door lock also generates a preset secret key, so that the electronic door lock and the application layer of the encryption bracelet are paired.
And S304, when the electronic door lock detects an unlocking action, the electronic door lock sends first verification data to the unlocking equipment through the communication connection established between the electronic door lock and the unlocking equipment in the first near field communication mode.
The electronic door lock can open first verification data which are sent by NFC or Bluetooth and used for requesting unlocking and are sent by scanning the encryption bracelet. Next, the first near field communication method is NFC, and the second near field communication method is bluetooth.
S305, the unlocking device receives first verification data through the communication connection established between the unlocking device and the electronic door lock in the first near field communication mode, generates first feedback data according to the first verification data, and returns the first feedback data to the electronic door lock.
The encryption bracelet can receive the verification data through the NFC channel, and the encryption bracelet uses a private key of the encryption bracelet to sign the verification data and the bracelet identification and then sends the verification data and the bracelet identification to the door lock.
S306, the electronic door lock receives the first feedback data, and whether the unlocking device is the bound unlocking device or not is verified according to the first feedback data.
And after receiving the first feedback data, the electronic door lock checks the first feedback data by using a prestored public key of the unlocking device, and if the check is successful, the unlocking device is determined to be the bound unlocking device.
S307, after the verification is successful, the electronic door lock sends a handshake command to the unlocking device, and verification data carried by the handshake command comprises a first key parameter.
After NFC verifies, the lock establishes the bluetooth with encrypting the bracelet and is connected, and electronic lock has already been carried out in advance with encrypting the bracelet and has been paired, and this step can not input the pairing code again, and later electronic lock can send the command of shaking hands to the bracelet, and the first key parameter that contains in the command of shaking hands can include following information: firmware version, algorithm information, host MAC address, and initial vector. The handshake command is mainly used for transmitting an initial vector encrypted by Advanced Encryption Standard (AES) in subsequent communication, the firmware version and the algorithm information are used for synchronizing the door lock and bracelet firmware version and the algorithm information, and the host MAC address is used for verifying the identity of the door lock.
S308, the unlocking equipment receives a handshake command sent by the electronic door lock and generates a data interaction key according to the first key parameter and a preset key; and sending a handshake response to the electronic door lock, wherein feedback data carried by the handshake response comprises a data ciphertext encrypted by the data interaction key.
After the encryption bracelet receives the handshake command, the data interaction key can be calculated according to the preset key stored during binding and the initial vector in the first key parameter, after the data interaction key is calculated, the encryption bracelet can encrypt agreed data by using the data interaction key to generate a data ciphertext, for example, the encryption bracelet encrypts the agreed data involved in the NFC verification process to form the data ciphertext, and sends the data ciphertext to the electronic door lock as feedback data.
S309, the electronic door lock receives the handshake response sent by the unlocking device, the data cipher text is decrypted and verified by using the data interaction key generated by the electronic door lock, and the electronic door lock is unlocked after the data cipher text is verified successfully.
And generating an interactive key at the side of the electronic door lock, decrypting the encrypted data by using the interactive key, and unlocking after the verification is passed. When unlocking, the exchange sequence can be verified by NFC and Bluetooth.
According to the unlocking method, the unlocking device and the electronic door lock are bound on the application layer, two communication channels are used for verification in the unlocking process, verification is carried out based on application layer handshaking in Bluetooth connection channel verification, the bag can be prevented from being grabbed in the air in the Bluetooth connection process, the safety is improved, the unlocking difficulty is improved, and the safety of the electronic door lock is improved.
Based on the same inventive concept, as an implementation of the foregoing method, an embodiment of the present invention provides an unlocking apparatus, where an embodiment of the apparatus corresponds to the foregoing method embodiment, and for convenience of reading, details in the foregoing method embodiment are not repeated in this apparatus embodiment one by one, but it should be clear that the apparatus in this embodiment can correspondingly implement all the contents in the foregoing method embodiment.
Fig. 4 is a schematic structural diagram of an unlocking device according to an embodiment of the present invention, which is applied to an electronic door lock, and as shown in fig. 4, the device 110 according to this embodiment includes: a first communication module 111, a second communication module 112 and a processing module 113;
the first communication module 111 is configured to establish a communication connection with the unlocking device in a first near field communication manner;
the second communication module 112 is configured to establish a communication connection with the unlocking device in a second near field communication manner;
the processing module 113 is configured to send first verification data to the unlocking device through the communication connection established by the first communication module 111 and receive first feedback data generated by the unlocking device according to the first verification data through the first communication module 111;
the processing module 113 is further configured to verify whether the unlocking device is a bound unlocking device according to the first feedback data; and after the unlocking device is verified as the bound unlocking device according to the first feedback data, sending second verification data to the unlocking device through the communication connection established by the second communication module 112 and receiving second feedback data generated by the unlocking device according to the second verification data through the second communication module 112.
The processing module 113 is further configured to: and unlocking after the second feedback data passes verification.
As an optional implementation manner of the embodiment of the present invention, the processing module 113 is further configured to extract, from the connection signal sent by the unlocking device, an agreement field generated based on the first verification data and/or the first feedback data in the process of establishing a communication connection with the unlocking device in the second near-field communication manner, so as to identify the verified bound unlocking device according to the agreement field.
As an optional implementation manner of the embodiment of the present invention, the second verification data includes an agreement field generated based on the first feedback data, and the agreement field is used for the unlocking device to identify the verified bound electronic door lock.
As an optional implementation manner of the embodiment of the present invention, the first near field communication manner or the second near field communication manner may be a bluetooth communication manner; correspondingly, the processing module 113 is specifically configured to:
the method comprises the steps that a Bluetooth communication connection is established with unlocking equipment, a handshake command is sent to the unlocking equipment, and verification data carried by the handshake command comprises a first key parameter, so that the unlocking equipment generates a data interaction key according to the first key parameter and a preset key;
and receiving a handshake response sent by the unlocking equipment, wherein feedback data carried by the handshake response comprises a data ciphertext encrypted by the data interaction key.
As an optional implementation manner of the embodiment of the present invention, the processing module 113 is further configured to: generating a data interaction key according to the first key parameter and a preset key;
in terms of verifying the feedback data of the unlocking device, the processing module 113 is specifically configured to: and verifying whether the data ciphertext can be successfully decrypted by using the self-generated data interaction key.
As an optional implementation manner of the embodiment of the present invention, the processing module 113 is further configured to add an unlocking device as a hardware key, where:
after Bluetooth connection with the unlocking equipment is established, a pairing request is sent to the unlocking equipment, wherein the pairing request comprises a second secret key parameter;
and receiving the pairing response sent by the unlocking device and generating a preset key according to the second key parameter.
As an optional implementation manner of the embodiment of the present invention, the processing module 113 is further configured to: adding an unlocking device as a hardware key, wherein:
after establishing communication connection with the unlocking equipment by adopting a first close-range communication mode or a second close-range communication mode, sending authorization data to the unlocking equipment;
receiving authorization response data fed back by the unlocking equipment according to the authorization data and a digital certificate of the unlocking equipment;
and verifying the digital certificate and the authorization response data, and marking the unlocking equipment as a hardware key after the verification is successful.
The apparatus provided in this embodiment may perform the above method embodiments, and the implementation principle and the technical effect are similar, which are not described herein again.
Fig. 5 is a schematic structural diagram of another unlocking device provided in an embodiment of the present invention, which is applied to an unlocking apparatus, as shown in fig. 5, a device 120 provided in this embodiment includes: a first communication module 121, a second communication module 122, a processing module 123 and a security module 124;
the first communication module 121 is configured to establish a communication connection with the electronic door lock by using a first near field communication manner;
the second communication module 122 is configured to establish a communication connection with the electronic door lock by using a second near field communication manner;
the processing module 123 is configured to obtain first verification data from the electronic door lock through the communication connection established by the first communication module 121, generate first feedback data based on the first verification data through the security module 124, and return the first feedback data to the electronic door lock through the communication connection established by the first communication module 121, so that the electronic door lock verifies whether the unlocking device is a bound unlocking device according to the first feedback data;
the processing module 123 is further configured to obtain second verification data from the electronic door lock through the communication connection established by the second communication module 122, generate second feedback data based on the second verification data through the security module 124, and return the second feedback data to the electronic door lock through the communication connection established by the second communication module 122, so that the electronic door lock unlocks after the second feedback data is verified.
As an optional implementation manner of the embodiment of the present invention, the processing module 123 is further configured to send a connection signal to the electronic door lock in a process of establishing a communication connection with the electronic door lock in a second near field communication manner, where the connection signal carries an agreement field generated based on the first verification data and/or the first feedback data, so that the electronic door lock identifies the verified bound unlocking device according to the agreement field.
As an optional implementation manner of the embodiment of the present invention, the second verification data includes an agreement field generated based on the first feedback data, and the method further includes: and identifying the verified bound electronic door lock according to the agreement field.
As an optional implementation manner of the embodiment of the present invention, the first near field communication mode or the second near field communication mode is a bluetooth communication mode;
correspondingly, the processing module 123 is specifically configured to: after establishing Bluetooth communication connection with the electronic door lock, receiving a handshake command sent by the electronic door lock, wherein verification data carried by the handshake command comprises a first key parameter; the security module 124 generates a data interaction key based on the first key parameter and the preset key, and encrypts the preset data to generate a data ciphertext based on the data interaction key;
the processing module 123 sends a handshake response to the electronic door lock, and feedback data carried in the handshake response includes a data cipher text encrypted by the data interaction key.
As an optional implementation manner of the embodiment of the present invention, the processing module 123 is further configured to add an unlocking device where the processing module is located as a hardware key of the electronic door lock, where:
after Bluetooth connection with the electronic door lock is established, a pairing request sent by the electronic door lock is received, wherein the pairing request comprises a second key parameter;
after the security module 124 generates the preset key according to the second key parameter, the processing module 123 sends a pairing response to the electronic door lock.
As an optional implementation manner of the embodiment of the present invention, the processing module 123 is further configured to add an unlocking device where the processing module is located as a hardware key of the electronic door lock, where:
after establishing communication connection with the electronic door lock in a first near field communication mode or a second near field communication mode, receiving authorization data sent by the electronic door lock;
the authorization response data generated by the security module 124 and the pre-stored digital certificate of the unlocking device are returned to the electronic door lock.
The apparatus provided in this embodiment may perform the above method embodiments, and the implementation principle and the technical effect are similar, which are not described herein again.
Based on the same inventive concept, the embodiment of the invention also provides an electronic door lock. Fig. 6 is a schematic structural diagram of an electronic door lock according to an embodiment of the present invention, and as shown in fig. 6, the electronic door lock according to the embodiment includes: a memory 211 and a processor 212, the memory 211 being for storing computer programs; the processor 212 is adapted to perform the methods of the above-described method embodiments when the computer program is invoked.
The electronic door lock provided by the embodiment can execute the method embodiments, and the implementation principle and the technical effect are similar, and are not described herein again.
Based on the same inventive concept, the embodiment of the invention also provides unlocking equipment. Fig. 7 is a schematic structural diagram of an unlocking apparatus according to an embodiment of the present invention, and as shown in fig. 7, the unlocking apparatus according to the embodiment includes: a memory 221, a processor 222 and a secure chip 223, the memory 221 being for storing computer programs; the processor 222 is configured to implement the method steps implemented by the processing module 123 in the above embodiment when the computer program is called, and the secure chip 223 is configured to implement the method steps implemented by the secure module 124 in the above embodiment.
The intelligent terminal device provided by this embodiment may execute the above method embodiment, and the implementation principle and the technical effect are similar, which are not described herein again.
Based on the same inventive concept, the embodiment of the invention also provides an electronic lock system, and the electronic lock system comprises the electronic door lock and the unlocking equipment of the embodiment.
For the related description of the electronic door lock and the unlocking device, reference may be made to the above method embodiments, and details are not described herein.
Embodiments of the present invention further provide a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the method described in the above method embodiments.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, apparatus, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media having computer-usable program code embodied in the medium.
The Processor may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). The memory is an example of a computer-readable medium.
Computer readable media include both permanent and non-permanent, removable and non-removable storage media. Storage media may implement information storage by any method or technology, and the information may be computer-readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.
Claims (13)
1. An unlocking method is applied to an electronic door lock, and is characterized by comprising the following steps:
when an unlocking action is detected, sending first verification data to unlocking equipment through communication connection established between the unlocking equipment and a first near field communication mode;
receiving first feedback data generated by the unlocking equipment according to the first verification data, and verifying whether the unlocking equipment is bound unlocking equipment or not according to the first feedback data;
if the unlocking device is verified to be the bound unlocking device according to the first feedback data, sending second verification data to the unlocking device through communication connection established with the unlocking device in a second close-range communication mode; during the process of establishing communication connection with the unlocking device in a second near field communication mode, extracting a first agreement field generated based on the first verification data and/or the first feedback data from a connection signal sent by the unlocking device so as to identify the verified bound unlocking device according to the first agreement field; the first close range communication mode and the second close range communication mode are different communication modes;
and receiving second feedback data generated by the unlocking equipment according to the second verification data, and unlocking after the second feedback data is verified.
2. The method according to claim 1, wherein the second verification data comprises a second agreement field generated based on the first feedback data, and the second agreement field is used for identifying the verified bound electronic door lock by an unlocking device.
3. The method according to claim 1, wherein the first close-range communication method or the second close-range communication method is a bluetooth communication method;
correspondingly, establish bluetooth communication connection back with equipment of unblanking to equipment of unblanking sends verification data and receives equipment of unblanking's feedback data, includes:
sending a handshake command to the unlocking equipment, wherein verification data carried by the handshake command comprises a first key parameter, so that the unlocking equipment generates a data interaction key according to the first key parameter and a preset key;
and receiving a handshake response sent by the unlocking equipment, wherein feedback data carried by the handshake response comprises a data ciphertext encrypted by the data interaction key.
4. The method of claim 3, further comprising: generating a data interaction key according to the first key parameter and a preset key;
verifying feedback data of the unlocking device, comprising: and verifying whether the data ciphertext can be successfully decrypted by using the self-generated data interaction key.
5. The method according to claim 3 or 4, characterized in that the method further comprises: adding the unlocking device as a hardware key, wherein:
after Bluetooth connection with the unlocking equipment is established, sending a pairing request to the unlocking equipment, wherein the pairing request comprises a second secret key parameter;
and receiving a pairing response sent by the unlocking device and generating the preset key according to the second key parameter.
6. The method of claim 1, further comprising: adding the unlocking device as a hardware key, wherein:
after the first close-range communication mode or the second close-range communication mode is adopted to establish communication connection with the unlocking equipment, authorization data are sent to the unlocking equipment;
receiving authorization response data fed back by the unlocking equipment according to the authorization data and a digital certificate of the unlocking equipment;
and verifying the digital certificate and the authorization response data, and marking the unlocking equipment as a hardware key after the verification is successful.
7. An unlocking method is applied to unlocking equipment and is characterized by comprising the following steps:
receiving first verification data sent by an electronic door lock through communication connection established with the electronic door lock in a first near field communication mode;
generating first feedback data according to the first verification data, and returning the first feedback data to the electronic door lock, so that the electronic door lock verifies whether the unlocking equipment is bound unlocking equipment according to the first feedback data;
receiving second verification data sent by the electronic door lock through communication connection established with the electronic door lock in a second near field communication mode, wherein the second verification data are sent when the electronic door lock verifies that the unlocking device is a bound unlocking device according to the first feedback data; in the process of establishing communication connection with the electronic door lock in a second near field communication mode, sending a connection signal to the electronic door lock, wherein the connection signal carries a first agreement field generated based on the first verification data and/or the first feedback data, so that the electronic door lock identifies the verified bound unlocking equipment according to the first agreement field; the first close range communication mode and the second close range communication mode are different communication modes;
and generating second feedback data according to the second verification data, and returning the second feedback data to the electronic door lock, so that the electronic door lock verifies the second feedback data, and unlocking after the second feedback data is verified.
8. The method of claim 7, wherein the second verification data includes a second agreement field generated based on the first feedback data, the method further comprising: and identifying the verified bound electronic door lock according to the second agreement field.
9. The method according to claim 7, wherein the first close-range communication method or the second close-range communication method is a Bluetooth communication method;
correspondingly, receive the verification data that the electron lock sent and to the electron lock sends feedback data after establishing bluetooth communication connection with the electron lock, include:
receiving a handshake command sent by the electronic door lock, wherein verification data carried by the handshake command comprises a first key parameter;
generating a data interaction key according to the first key parameter and a preset key;
and sending a handshake response to the electronic door lock, wherein feedback data carried by the handshake response comprises a data ciphertext encrypted by the data interaction key.
10. The method of claim 9, further comprising: add a hardware key that becomes an electronic door lock, wherein:
after Bluetooth connection with the electronic door lock is established, receiving a pairing request sent by the electronic door lock, wherein the pairing request comprises a second key parameter;
and generating the preset key according to the second key parameter and sending a pairing response to the electronic door lock.
11. The method of claim 7, further comprising: add a hardware key that becomes an electronic door lock, wherein:
after establishing communication connection with the electronic door lock in a first near field communication mode or a second near field communication mode, receiving authorization data sent by the electronic door lock;
and returning authorization response data and a prestored digital certificate of the unlocking device to the electronic door lock.
12. The utility model provides an unlocking means is applied to electronic lock, its characterized in that includes: the system comprises a first communication module, a second communication module and a processing module;
the first communication module is used for establishing communication connection with the unlocking equipment in a first near field communication mode;
the second communication module is used for establishing communication connection with the unlocking equipment in a second short-distance communication mode; the first close range communication mode and the second close range communication mode are different communication modes;
the processing module is used for sending first verification data to the unlocking equipment through the communication connection established by the first communication module and receiving first feedback data generated by the unlocking equipment according to the first verification data;
the processing module is further used for verifying whether the unlocking device is a bound unlocking device according to the first feedback data; after the unlocking device is verified to be the bound unlocking device according to the first feedback data, second verification data are sent to the unlocking device through the communication connection established by the second communication module, and second feedback data generated by the unlocking device according to the second verification data are received;
the processing module is further configured to extract a first agreement field generated based on the first verification data and/or the first feedback data from a connection signal sent by the unlocking device in a process of establishing a communication connection with the unlocking device in a second near field communication manner, so as to identify a verified bound unlocking device according to the first agreement field;
the processing module is further configured to: and unlocking after the second feedback data is verified.
13. The utility model provides an unlocking means is applied to unlocking equipment, its characterized in that includes: the system comprises a first communication module, a second communication module, a processing module and a safety module;
the first communication module is used for establishing communication connection with the electronic door lock in a first near field communication mode;
the second communication module is used for establishing communication connection with the electronic door lock in a second near field communication mode; the first close range communication mode and the second close range communication mode are different communication modes;
the processing module is used for acquiring first verification data from the electronic door lock through the communication connection established by the first communication module, generating first feedback data based on the first verification data through the security module, and returning the first feedback data to the electronic door lock through the communication connection established by the first communication module, so that the electronic door lock verifies whether the unlocking equipment is bound unlocking equipment according to the first feedback data;
the processing module is further configured to acquire second verification data from the electronic door lock through the communication connection established by the second communication module, generate second feedback data based on the second verification data through the security module, and return the second feedback data to the electronic door lock through the communication connection established by the second communication module, so that the electronic door lock is unlocked after the second feedback data is verified;
the processing module is further configured to send a connection signal to the electronic door lock in a process of establishing a communication connection with the electronic door lock in a second near field communication manner, where the connection signal carries a first agreement field generated based on the first verification data and/or the first feedback data, so that the electronic door lock identifies the verified bound unlocking device according to the first agreement field.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910199130.5A CN109949461B (en) | 2019-03-15 | 2019-03-15 | Unlocking method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910199130.5A CN109949461B (en) | 2019-03-15 | 2019-03-15 | Unlocking method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109949461A CN109949461A (en) | 2019-06-28 |
CN109949461B true CN109949461B (en) | 2021-01-01 |
Family
ID=67010121
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910199130.5A Active CN109949461B (en) | 2019-03-15 | 2019-03-15 | Unlocking method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109949461B (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110473327B (en) * | 2019-09-05 | 2020-11-24 | 广东纬德信息科技股份有限公司 | Lock control method, system and storage medium based on NFC |
CN111862399A (en) * | 2019-12-30 | 2020-10-30 | 北京骑胜科技有限公司 | Unlocking request generation method and device and electronic equipment |
CN113345130A (en) * | 2020-02-18 | 2021-09-03 | 佛山市云米电器科技有限公司 | Control method of intelligent door, intelligent door and computer readable storage medium |
CN111105528B (en) * | 2020-02-20 | 2021-09-10 | 南京艾弗雷德网络技术有限公司 | Intelligent door lock system based on Bluetooth broadcast |
CN111340987A (en) * | 2020-03-02 | 2020-06-26 | 深圳晒尔科技有限公司 | Internet of things door lock communication method, device and system and computer storage medium |
CN113763599A (en) * | 2020-06-04 | 2021-12-07 | 曾惠瑜 | System and method for executing encryption, decryption and unlocking management |
CN116634362B (en) * | 2020-08-05 | 2025-09-05 | 华为技术有限公司 | Automatic control method, electronic device and computer-readable storage medium |
CN113744434B (en) * | 2021-08-20 | 2023-09-01 | 北京万千维度网络科技有限公司 | Automatic multi-mode unlocking method and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101793115A (en) * | 2009-12-20 | 2010-08-04 | 姜君凯 | Electronic lock and key and workflow control |
CN104966343A (en) * | 2015-07-14 | 2015-10-07 | 深圳市亲邻科技有限公司 | Entrance guard control method based on Internet |
CN107038777A (en) * | 2017-03-29 | 2017-08-11 | 云丁网络技术(北京)有限公司 | A kind of safety communicating method and its intelligent door lock system based on intelligent door lock system |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101246607A (en) * | 2007-02-13 | 2008-08-20 | 陈年 | Digital authentication control method for access control system and access control system using the same |
US8929861B2 (en) * | 2011-02-24 | 2015-01-06 | Blackberry Limited | Personnel access system with verification features utilizing near field communication (NFC) and related methods |
FI124237B (en) * | 2012-04-05 | 2014-05-15 | Tosibox Oy | Data-safe procedure for granting the right of operation carried out via remote connection |
US9704317B2 (en) * | 2014-09-23 | 2017-07-11 | Schlage Lock Company Llc | Long range wireless credentials for entryway |
CN104767624B (en) * | 2015-04-23 | 2018-02-09 | 北京航空航天大学 | Remote authentication protocol method based on biological characteristic |
JP2016223212A (en) * | 2015-06-02 | 2016-12-28 | ソニー株式会社 | Lock device, information processing method, program, and communication terminal |
CN105069864A (en) * | 2015-07-10 | 2015-11-18 | 西安电子科技大学 | Door lock control secure communication scheme based on NFC (near field communication) function of smart phone |
TWM523744U (en) * | 2016-01-08 | 2016-06-11 | Guo-Zhi Yang | WiFi and Bluetooth dual system NFC smart door lock system device |
US20170214664A1 (en) * | 2016-01-26 | 2017-07-27 | Google Inc. | Secure connections for low power devices |
CN105554035B (en) * | 2016-02-06 | 2019-08-30 | 安钥(北京)科技股份有限公司 | An electronic lock system and its control method |
CN108460862A (en) * | 2017-02-20 | 2018-08-28 | 掌握科技无锡有限公司 | The method and electric lockset, lock system having with palmprint authentication and Mobile phone control lock |
CN108973934A (en) * | 2018-07-12 | 2018-12-11 | 宁波华科汽车零部件有限公司 | A kind of keyless access system and method |
-
2019
- 2019-03-15 CN CN201910199130.5A patent/CN109949461B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101793115A (en) * | 2009-12-20 | 2010-08-04 | 姜君凯 | Electronic lock and key and workflow control |
CN104966343A (en) * | 2015-07-14 | 2015-10-07 | 深圳市亲邻科技有限公司 | Entrance guard control method based on Internet |
CN107038777A (en) * | 2017-03-29 | 2017-08-11 | 云丁网络技术(北京)有限公司 | A kind of safety communicating method and its intelligent door lock system based on intelligent door lock system |
Also Published As
Publication number | Publication date |
---|---|
CN109949461A (en) | 2019-06-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109949461B (en) | Unlocking method and device | |
CN109150548B (en) | Digital certificate signing and signature checking method and system and digital certificate system | |
CN108551455B (en) | Configuration method and device of smart card | |
WO2018127081A1 (en) | Method and system for obtaining encryption key | |
US7552322B2 (en) | Using a portable security token to facilitate public key certification for devices in a network | |
CN103001773B (en) | Fingerprint authentication system and fingerprint authentication method based on near field communication (NFC) | |
US9762567B2 (en) | Wireless communication of a user identifier and encrypted time-sensitive data | |
CN103888436B (en) | The method and apparatus of user authentication | |
WO2016201811A1 (en) | Identity authentication method, apparatus and system | |
CN105553932A (en) | Method, device and system of remote control safety binding of intelligent home appliance | |
CN105516103A (en) | Method, device and system for binding intelligent household electrical appliances | |
CN105069864A (en) | Door lock control secure communication scheme based on NFC (near field communication) function of smart phone | |
CN103944736A (en) | Data security interactive method | |
CN105989386A (en) | Method and device for reading and writing radio frequency identification card | |
JP2014503159A (en) | Method for authenticating a first communication device using a second communication device | |
CN100566337C (en) | Method for enhancing security of wireless local area network | |
CN101964805B (en) | Method, equipment and system for safely sending and receiving data | |
CN101819614A (en) | System and method for enhancing network transaction safety by utilizing voice verification USBKey | |
CN109309910A (en) | Communication data transmission method, system, equipment and computer readable storage medium | |
CN109920100A (en) | A kind of smart lock method for unlocking and system | |
CN101944216A (en) | Double-factor online transaction security authentication method and system | |
CN111224965A (en) | Information interaction method and device | |
CN115171245A (en) | HCE-based door lock security authentication method and system | |
CN111200807A (en) | A Bluetooth-based information exchange method and device | |
CN115915116A (en) | Data transmission method and device and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder | ||
CP01 | Change in the name or title of a patent holder |
Address after: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing Patentee after: Beijing Shendun Technology Co.,Ltd. Address before: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing Patentee before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd. |