WO2018133832A1 - 智能门锁的开锁方法、移动终端、智能门锁及云服务器 - Google Patents

智能门锁的开锁方法、移动终端、智能门锁及云服务器 Download PDF

Info

Publication number
WO2018133832A1
WO2018133832A1 PCT/CN2018/073369 CN2018073369W WO2018133832A1 WO 2018133832 A1 WO2018133832 A1 WO 2018133832A1 CN 2018073369 W CN2018073369 W CN 2018073369W WO 2018133832 A1 WO2018133832 A1 WO 2018133832A1
Authority
WO
WIPO (PCT)
Prior art keywords
verification code
door lock
unlocking
smart door
mobile terminal
Prior art date
Application number
PCT/CN2018/073369
Other languages
English (en)
French (fr)
Inventor
唐皓
陈彬
张东胜
Original Assignee
云丁网络技术(北京)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 云丁网络技术(北京)有限公司 filed Critical 云丁网络技术(北京)有限公司
Priority to CN201880007809.3A priority Critical patent/CN110462691A/zh
Publication of WO2018133832A1 publication Critical patent/WO2018133832A1/zh
Priority to US16/517,378 priority patent/US11335144B2/en

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00182Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72412User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00182Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
    • G07C2009/00238Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks the transmittted data signal containing a code which is changed
    • G07C2009/00246Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks the transmittted data signal containing a code which is changed periodically, e.g. after a time period
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00182Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
    • G07C2009/00261Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks the keyless data carrier having more than one function
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00412Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00769Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/08With time considerations, e.g. temporary activation, valid time window or time limitations

Definitions

  • the invention relates to an unlocking method of a smart door lock, belonging to the field of smart home and security technology.
  • the popularity of smartphones and Bluetooth low energy technology is increasing, and many applications enable smartphones to unlock via Bluetooth.
  • the unlock command relies on wireless transmission, which is easier to be monitored, increasing the risk of stealing, tampering, and replaying commands.
  • the fixed communication content or the physical address of Bluetooth is used as the communication content; if it is replayed after listening, it can be cracked.
  • the object of the present invention is to overcome the above disadvantages and to propose a method for unlocking a smart door lock.
  • the technical solution adopted is as follows:
  • an embodiment of the present application provides a method for unlocking a smart door lock, where the method includes:
  • the mobile terminal receives an initial key and a communication key from the cloud server;
  • the mobile terminal encrypts the initial key and the preset key data by using the communication key to generate an unlock verification code
  • the mobile terminal sends the unlock verification code to which the key data is attached to the smart door lock, so that the smart door lock is unlocked according to the unlock verification code to which the key data is attached.
  • the preset key data is a timestamp.
  • the mobile terminal is configured with an incremental counter corresponding to the initial key, the preset key data is a count of the incremental counter; and the mobile terminal receives an initial key from a cloud server. After the communication key, the count of the up counter is incremented by one.
  • the method further includes:
  • the mobile terminal establishes a connection with the smart door lock via Bluetooth, zigbee or WIFI wireless communication.
  • an embodiment of the present application provides a method for unlocking a smart door lock, where the method includes:
  • the smart door lock After receiving the unlock verification code from the mobile terminal with the preset key data, the smart door lock verifies the legality of the unlock verification code
  • the unlocking is performed according to the unlocking verification code.
  • the preset key data is a timestamp; after the smart door lock receives the unlocking verification code from the mobile terminal with the preset key data, verifying that the unlocking verification code is legal Sex, including:
  • the smart door lock compares the time stamp with the time of the local clock module; the time of the local clock module is a standard time for automatically matching the update;
  • the method further includes:
  • the smart door lock synchronizes the time of the local clock module with the timestamp.
  • the preset key data is a count of an incrementing counter
  • the smart door lock verifies the unlocking verification code after receiving an unlocking verification code from the mobile terminal with preset key data appended thereto.
  • Legality including:
  • the smart door lock compares the count of the increment counter attached to the unlock verification code with the count value of the locally stored counter
  • the count of the up counter is greater than the count value of the locally saved counter, determining that the unlock verification code is legal; if the count of the up counter is less than or equal to the count value of the locally saved counter, determining that the unlock verification code is illegal.
  • the method further includes:
  • the smart door lock updates the count value of the locally saved counter to the count of the up counter.
  • the unlocking according to the unlocking verification code includes:
  • the unlocking verification code is decoded by using the key data and a locally stored communication key to obtain an initial key to be matched;
  • the smart door lock matches the to-be-matched initial key with the locally stored initial key, and if the matching is successful, performs an unlocking action.
  • the unlocking according to the unlocking verification code includes:
  • the unlock verification code is matched with a local pre-generated legal verification code; wherein the legal verification code is stored locally by using a locally stored communication key
  • the initial key and the key data are encrypted and generated;
  • the embodiment of the present application further provides a method for unlocking a smart door lock, the method comprising:
  • the cloud server transmits the initial key and the communication key to the mobile terminal and the smart door lock, respectively, so that the mobile terminal and the smart door lock are unlocked by the initial key and the communication key.
  • the cloud server sends the initial key and the communication key to the mobile terminal and the smart door lock respectively, including:
  • the cloud server sends the initial key and the communication key to the mobile terminal and the smart door lock respectively through secure out-of-band transmission or a private encrypted channel.
  • the embodiment of the present application further provides a mobile terminal, where the mobile terminal includes:
  • a first receiving module configured to receive an initial key and a communication key from the cloud server
  • a first encryption module configured to encrypt the initial key and the preset key data by using the communication key to generate an unlock verification code
  • An additional module configured to add the key data to the unlock verification code to obtain an unlock verification code to which the key data is attached;
  • a first sending module configured to send the unlock verification code to which the key data is attached to the smart door lock, so that the smart door lock is unlocked according to the unlock verification code to which the key data is attached.
  • the preset key data is a timestamp.
  • the mobile terminal is configured with an incremental counter corresponding to the initial key, the preset key data is a count of the incremental counter; and the mobile terminal receives an initial key from a cloud server. After the communication key, the count of the up counter is incremented by one.
  • the mobile terminal further includes:
  • a connection module for establishing a connection with a smart door lock via Bluetooth, zigbee or WIFI wireless communication.
  • an embodiment of the present application provides a smart door lock, where the smart door lock includes:
  • a verification module configured to verify validity of the unlock verification code after receiving an unlock verification code from the mobile terminal with preset key data added
  • an unlocking module configured to perform unlocking according to the unlocking verification code when determining that the unlocking verification code is legal.
  • the preset key data is a timestamp
  • the verification module includes:
  • a first comparison submodule configured to compare the timestamp with a time of the local clock module; the time of the local clock module is a standard time for automatically matching the update;
  • a first determining submodule configured to determine that the unlocking verification code is invalid when a difference between the timestamp and a time of the local clock module exceeds a defined threshold
  • a second determining submodule configured to determine that the unlocking verification code is legal when the difference does not exceed the defined threshold.
  • the smart door lock further includes:
  • a synchronization module configured to synchronize the time of the local clock module with the timestamp.
  • the preset key data is a count of an up counter
  • the verification module includes:
  • a second comparison submodule configured to compare a count of the increment counter attached to the unlock verification code with a count value of a locally saved counter
  • a third determining submodule configured to determine that the unlocking verification code is legal when the count of the up counter is greater than a count value of a locally saved counter
  • the fourth determining submodule is configured to determine that the unlocking verification code is illegal when the count of the up counter is less than or equal to a count value of a locally saved counter.
  • the smart door lock further includes:
  • An update module for updating the count value of the locally saved counter to the count of the up counter.
  • the unlocking module includes:
  • a decoding submodule configured to: when the smart door lock determines that the unlock verification code is legal, use the key data and a locally stored communication key to decode the unlock verification code to obtain an initial key to be matched;
  • a first matching submodule configured to match the initial key to be matched with the locally stored initial key by the smart door lock
  • the first unlocking submodule is configured to perform an unlocking action when the first matching submodule is successfully matched.
  • the unlocking module includes:
  • a second matching submodule configured to: when the smart door lock determines that the unlocking verification code is legal, matching the unlocking verification code with a local pre-generated legal verification code; wherein the legal verification code is localized
  • the stored communication key is generated by encrypting the locally stored initial key and the key data;
  • the second unlocking submodule is configured to perform an unlocking action when the second matching submodule is successfully matched.
  • the embodiment of the present application provides a cloud server, where the cloud server includes:
  • a sending module configured to separately send the initial key and the communication key to the mobile terminal and the smart door lock, so that the mobile terminal and the smart door lock are unlocked by using the initial key and the communication key.
  • the sending module is specifically configured to:
  • the initial key and the communication key are sent to the mobile terminal and the smart door lock respectively through a secure out-of-band transmission or a private encrypted channel.
  • the unlocking method of the smart door lock uses the communication key to encrypt the initial password and the preset key data to generate an unlocking verification code, and the transmission of the unlocking verification code can prevent the initial key and the communication key from being tampered with. Ensure the safety of unlocking the intelligent door lock and avoid property damage.
  • FIG. 1 is a schematic flowchart of a method for unlocking a smart door lock according to an embodiment of the present application
  • FIG. 1b is a schematic flowchart of another method for unlocking a smart door lock according to an embodiment of the present application
  • FIG. 1 is a schematic flowchart of another method for unlocking a smart door lock according to an embodiment of the present application
  • FIG. 2 is a schematic diagram of encryption according to an embodiment of the present application.
  • FIG. 3 is another schematic diagram of encryption provided by an embodiment of the present application.
  • FIG. 5 is a schematic flow chart of steps (2)-(8) of an unlocking method for a smart door lock according to Embodiment 1 of the present application;
  • FIG. 6 is a schematic flowchart of step (1) of Embodiment 2 of the present application.
  • FIG. 7 is a schematic flow chart of steps (2)-(9) of an unlocking method for a smart door lock according to Embodiment 2 of the present application;
  • FIG. 8 is a schematic diagram of a mobile terminal according to an embodiment of the present application.
  • FIG. 9 is a schematic diagram of a smart door lock according to an embodiment of the present application.
  • FIG. 1 is a flowchart of a method for unlocking a smart door lock according to an embodiment of the present disclosure. The method is applied to a mobile terminal, and the method specifically includes:
  • S101a The mobile terminal receives an initial key and a communication key from the cloud server.
  • the cloud server delivers the initial key and the communication key to the mobile terminal, so that the mobile terminal unlocks the smart door lock according to the initial key and the communication key.
  • the cloud server can deliver the initial key and the communication key through a secure outband transmission or a private encrypted channel.
  • S102a The mobile terminal encrypts the initial key and the preset key data by using the communication key to generate an unlock verification code.
  • the preset key data may be a time stamp, or may be a count of an increment counter corresponding to the initial password configured by the mobile terminal.
  • the key data preset in the embodiment of the present application is not limited to the foregoing two implementation manners.
  • S103a The mobile terminal adds the preset key data to the unlock verification code to obtain an unlock verification code to which the preset key data is attached.
  • the preset key data is added as the plaintext to the unlocking verification code, and an unlocking verification code to which the preset key data is attached is obtained.
  • S104a The mobile terminal sends the unlock verification code to which the preset key data is attached to the smart door lock, so that the smart door lock is unlocked according to the preset key data attached thereto.
  • the verification code is unlocked.
  • the mobile terminal After obtaining the unlock verification code to which the preset key data is attached, the mobile terminal sends the unlock verification code to which the preset key data is attached to the smart door lock.
  • the unlocking method of the smart door lock uses the communication key to encrypt the initial password and the preset key data to generate an unlocking verification code, and the transmission of the unlocking verification code can prevent the initial key and the communication key from being tampered with. Ensure the safety of unlocking the intelligent door lock and avoid property damage.
  • 1b is a flowchart of a method for unlocking a smart door lock according to an embodiment of the present application. The method is applied to a smart door lock, and the method includes:
  • the smart door lock after receiving the unlocking verification code with the preset key data, the smart door lock first verifies its legality to ensure that the received unlocking verification code with the preset key data is received.
  • the security during the transmission process, and the specific method for verifying the legality of the unlocking verification code are described in detail later.
  • the smart door lock when the smart door lock determines that the unlocking verification code is legal, it can continue to unlock according to the unlocking verification code, otherwise the unlocking operation is terminated.
  • the method of unlocking according to the unlocking verification code is specifically introduced later.
  • the initial key and the communication key need to be separately sent to the mobile terminal and the smart door lock, so that the mobile terminal and the smart door lock can be unlocked by the initial key and the communication key.
  • FIG. 1c a flowchart of a method for unlocking a smart door lock according to an embodiment of the present disclosure is applied to a cloud server, a mobile terminal, and a smart door lock.
  • the method specifically includes:
  • S101c The cloud server sends the initial key and the communication key to the mobile terminal and the smart door lock respectively.
  • the cloud server may separately send the generated initial key and communication key to the mobile terminal and the smart door lock in a preset manner.
  • the preset method may be through a secure out-of-band transmission or a private encrypted channel.
  • the initial key may be an initial token
  • the communication key may be a key
  • S102c The mobile terminal and the smart door lock establish a connection by wireless communication.
  • the mobile terminal and the smart door lock can establish a connection by wireless communication methods such as Bluetooth, zigbee or WIFI.
  • S103c The mobile terminal encrypts the initial key and the preset key data by using a communication key to generate an unlock verification code.
  • the preset key data may be a timestamp timestamp.
  • the mobile terminal encrypts the initial key unlocking token and the timestamp by using the communication key key, and obtains the ciphertext as the unlocking verification. code.
  • the mobile terminal is configured with an increment counter corresponding to the initial password, and after the mobile terminal receives the initial key and the communication key from the cloud server, the count of the increment counter corresponding to the initial key is incremented by one.
  • the preset key data may be the count of the increment counter.
  • the mobile terminal encrypts the initial key unlock token and the count count by using the communication key key, and obtains the ciphertext as the unlocking verification code.
  • S104c The mobile terminal adds the preset key data as the plaintext to the unlock verification code, and obtains an unlock verification code to which the preset key data is attached.
  • the mobile terminal After the unlocking verification code is generated, the mobile terminal adds the preset key data as the plaintext to the unlocking verification code to obtain the unlocking verification code with the key data added.
  • the mobile terminal may attach the unlock time verification code to the current time stamp to generate a time-stamped unlock verification code and send it to the smart door lock.
  • the current timestamp is 2016-08-11-20:21
  • this timestamp can be attached to the unlocking verification code to generate a time-stamped unlocking verification code and sent to the smart door lock.
  • S105c The smart door lock verifies the validity of the unlocking verification code after receiving the unlocking verification code from the mobile terminal with the preset key data attached.
  • the smart door lock compares the time stamp with the time of the local clock, and if the difference between the time stamp and the time of the local clock does not exceed the defined threshold, determining the The unlock verification code is legal, otherwise it is illegal. If it is not legal, the smart door lock can feed the illegal comparison result to the mobile terminal via Bluetooth.
  • the limit threshold can be determined according to the actual situation, usually set within 15min ⁇ 60min, assuming the set limit threshold is 20min; then the difference exceeds 20min can be considered illegal unlock code.
  • the unlock verification code is legal, it may be further determined whether the unlock verification code is tampered with, for example, by comparing the time stamp attached to the unlock verification code with the time stamp obtained by decoding the unlock verification code to determine Whether the unlock verification code is falsified, if it is the same, it is considered that it has not been tampered, otherwise it is considered to have been tampered with, and after determining that the unlock verification code has not been tampered with, the execution of S106c is continued.
  • the local clock module is a clock chip that is internally powered by a button battery.
  • the smart door lock is powered by the No. 5 dry battery.
  • the clock module inside the door lock remains in normal operation, and the time of the clock module remains.
  • the updated standard time for example, the current standard time is 17:00, the time of the clock module is also 17:00.
  • the smart door lock compares the count of the increment counter attached to the unlock code verification code with the count value of the locally saved counter, if the count of the up counter is greater than The count value of the locally saved counter determines that the unlock verification code is legal; otherwise it is illegal.
  • the mobile terminal and the smart door lock store an increment counter count for each initial key, and the counter of the mobile terminal is incremented by 1 before each unlocking; the mobile terminal uses the communication key to count the initial key and the counter.
  • the encryption algorithm performs encryption to generate an unlock verification code.
  • the unlocking verification code is decoded by using the locally stored communication key and the key data in the plaintext to obtain an initial key to be matched.
  • the smart door lock matches the initial key to be matched with the locally stored initial key. If the matching is successful, the unlocking action is performed.
  • the smart door lock synchronizes the time of the local clock module with the time stamp to update the time of the local clock module.
  • the unlock verification code is matched with the local pre-generated legal verification code, and if the matching is successful, the unlocking action is performed.
  • the legal verification code is that the smart door lock uses the locally stored communication key to encrypt the locally stored initial key and the key data, that is, only the same unlock verification code as any legal verification code is received. After that, the unlocking action can be performed.
  • the smart door lock updates the count value of the locally saved counter to the count of the incrementing counter.
  • the unlocking method of the smart door lock uses the communication key to encrypt the initial password and the preset key data to generate an unlocking verification code, and the transmission of the unlocking verification code can prevent the initial key and the communication key from being Tampering to ensure the safety of unlocking the smart door lock and avoiding property damage.
  • the present application further provides the following two specific methods for unlocking the smart door lock, as follows:
  • FIG. 4 is a schematic flowchart of step (1) of Embodiment 1
  • FIG. 5 is a schematic flowchart of steps (2)-(8) of an unlocking method for a smart door lock according to Embodiment 1.
  • the unlocking method of the smart door lock includes the following steps:
  • the cloud server generates a Bluetooth key, and the cloud server sends the Bluetooth key to the Bluetooth mobile phone and the smart door lock through a secure outband transmission or a private encrypted channel;
  • Bluetooth mobile phone and smart door lock establish connection through Bluetooth or zigbee wireless communication; or establish Bluetooth connection through Bluetooth key verification;
  • the initial key is an initial token
  • the Bluetooth mobile phone unlocks the token and the timestamp timestamp, and uses the communication key to complete the encryption to generate an unlocking verification code
  • the Bluetooth mobile phone adds the current time stamp to the unlocking verification code to generate a time-stamped unlocking verification code and sends it to the smart door lock;
  • the smart door lock compares the time stamp with the time saved by the clock module in the smart door lock; if the deviation is the difference between the time stamp in the plaintext and the time saved by the clock module exceeds the limit threshold, the unlock verification is determined.
  • the code is an illegal data packet, and the verification result is fed back to the mobile terminal through Bluetooth; generally, the threshold value can be set within 15 minutes to 60 minutes according to the situation, for example, the set threshold value is 20 minutes; if the deviation exceeds 20 minutes, the judgment is performed.
  • the unlocking verification code is an illegal data packet, and the verification result is fed back to the Bluetooth mobile phone through Bluetooth, thereby avoiding illegal time value transmission, or replaying the previous unlocking information;
  • the clock chip inside the clock module is powered by a button battery for a long time.
  • the smart door lock is powered by the No. 5 dry battery.
  • the clock inside the door lock is kept, and the time in the clock module is the standard time for automatic matching and updating; For example, the current time is 17:00, and the time of the clock module is also 17:00.
  • the unlocking verification code is decoded using a timestamp, the timestamp in the unlocking verification code and the timestamp in the plaintext are compared, and it is determined that the plaintext portion of the data packet has not been tampered with.
  • comparing the timestamp in the unlocking verification code with the timestamp in the plaintext of the timestamped unlocking verification code determining whether the plaintext part of the timestamped unlocking verification code has been tampered; if unlocking If the timestamp in the verification code is the same as the timestamp in the plaintext of the timestamped unlock verification code, it is considered that there is no tampering; if it is different, it is considered to be falsified.
  • the result of the check is that the time-stamped unlock verification code is legal; if it is tampered, the check result is that the time-stamped unlock verification code is invalid, and the verification result is fed back to the Bluetooth via Bluetooth Bluetooth phone.
  • the comparison initial key is consistent with the legal key stored in the lock, and the initial key and the legal key stored in the lock belong to the combination of the mobile terminal and the smart door lock, it is determined that the matching is successful, and the verification result is passed through the Bluetooth. Feedback to the Bluetooth mobile phone, the smart door lock performs the unlocking action;
  • the smart door lock synchronizes the time stamp in the time stamped unlock verification code sent by the smart phone with the time in the smart door lock; disconnects the Bluetooth connection.
  • FIG. 6 is a schematic flow chart of the step (1) of the embodiment 2
  • FIG. 7 is a schematic flow chart of the steps (2)-(9) of the unlocking method of the smart door lock of the second embodiment.
  • the unlocking method of the smart door lock provided by the embodiment of the present application includes:
  • the cloud server generates a Bluetooth key, which is delivered to the Bluetooth mobile phone and the smart door lock through a secure out-of-band transmission or a private encrypted channel;
  • the Bluetooth mobile phone and the smart door lock establish a connection through Bluetooth or zigbee wireless communication; or compare whether the initial key of the mobile terminal and the smart door lock are consistent, and establish a Bluetooth connection when the initial key is consistent;
  • the Bluetooth mobile phone and the smart door lock store an incremental counter count for each key, and the counter of the mobile terminal is incremented by 1 before each unlocking; the counting range is large enough to ensure the life of the lock. , not accounting full.
  • the counter of the Bluetooth mobile phone is incremented by 1 each time the lock is unlocked.
  • the initial key includes an initial token, and the Bluetooth mobile phone encrypts the initial token as an initial key and preset key data by using a communication key to generate an unlock verification code; the preset key data is a counter count and/ Or timestamp timestamp.
  • the Bluetooth mobile phone adds the current time stamp to the unlocking verification code to generate a time-stamped unlocking verification code and sends it to the smart door lock through the Bluetooth channel;
  • the smart door lock uses the timestamp to decode the unlocking verification code, compares the timestamp in the unlocking verification code with the timestamp in the plaintext, and determines whether the plaintext part of the data packet has been tampered with;
  • the timestamp in the comparison unlocking verification code and the timestamp in the plaintext of the timestamped unlocking verification code are the same, it is considered that there is no tampering; if it is different, it is considered to be falsified. If it is tampered with, the verification result is fed back to the mobile terminal via Bluetooth.
  • the decoding of the initial key unlock token is further compared with the legal key legal token stored in the lock; and the initial secret is verified. Whether the key stored in the key and the lock belongs to the combination of the mobile terminal and the smart door lock.
  • the comparison initial key is consistent with the legal key stored in the lock, and the initial key and the legal key stored in the lock belong to the combination of the Bluetooth mobile phone and the smart door lock, it is determined that the matching is successful, and the verification result is passed through the Bluetooth. Feedback to the Bluetooth mobile phone, the smart door lock performs the unlocking action.
  • Embodiment 1 realizes anti-theft, tamper-proof and anti-replay of the Bluetooth key in the unlocking process of the smart door lock.
  • the smart lock is required to include a clock module, and the anti-replay is completed by using the time non-reversible feature.
  • Embodiment 2 implements a time-independent anti-replay mechanism that is more widely applicable and avoids time deviations that occur in the case of long-term unsynchronization.
  • the embodiment of the present application further provides a mobile terminal.
  • FIG. 8 it is a schematic diagram of a mobile terminal according to an embodiment of the present application.
  • the mobile terminal includes:
  • the first receiving module 801 is configured to receive an initial key and a communication key from the cloud server.
  • the first encryption module 802 is configured to encrypt the initial key and the preset key data by using the communication key to generate an unlock verification code.
  • An additional module 803, configured to add the key data to the unlock verification code to obtain an unlock verification code to which the key data is attached;
  • a first sending module 804 configured to send the unlock verification code to which the key data is attached to the smart door lock, so that the smart door lock is unlocked according to the unlock verification code to which the key data is attached .
  • the preset key data is a timestamp.
  • the mobile terminal is configured with an incremental counter corresponding to the initial key, the preset key data is a count of the incremental counter, and the mobile terminal receives a cloud server. After the initial key and the communication key, the count of the up counter is incremented by one.
  • the mobile terminal further includes:
  • a connection module for establishing a connection with a smart door lock via Bluetooth, zigbee or WIFI wireless communication.
  • FIG. 9 is a schematic diagram of a smart door lock according to an embodiment of the present application, where the smart door lock includes:
  • the verification module 901 is configured to verify the validity of the unlock verification code after receiving an unlock verification code from the mobile terminal with preset key data added;
  • the unlocking module 902 is configured to perform unlocking according to the unlocking verification code when determining that the unlocking verification code is legal.
  • the preset key data is a timestamp
  • the verification module includes:
  • a first comparison submodule configured to compare the timestamp with a time of the local clock module; the time of the local clock module is a standard time for automatically matching the update;
  • a first determining submodule configured to determine that the unlocking verification code is invalid when a difference between the timestamp and a time of the local clock module exceeds a defined threshold
  • a second determining submodule configured to determine that the unlocking verification code is legal when the difference does not exceed the defined threshold.
  • the smart door lock further includes:
  • a synchronization module configured to synchronize the time of the local clock module with the timestamp.
  • the preset key data is a count of an up counter
  • the verification module includes:
  • a second comparison submodule configured to compare a count of the increment counter attached to the unlock verification code with a count value of a locally saved counter
  • a third determining submodule configured to determine that the unlocking verification code is legal when the count of the up counter is greater than a count value of a locally saved counter
  • the fourth determining submodule is configured to determine that the unlocking verification code is illegal when the count of the up counter is less than or equal to a count value of a locally saved counter.
  • the smart door lock further includes:
  • An update module for updating the count value of the locally saved counter to the count of the up counter.
  • the unlocking module includes:
  • a decoding submodule configured to: when the smart door lock determines that the unlock verification code is legal, use the key data and a locally stored communication key to decode the unlock verification code to obtain an initial key to be matched;
  • a first matching submodule configured to match the initial key to be matched with the locally stored initial key by the smart door lock
  • the first unlocking submodule is configured to perform an unlocking action when the first matching submodule is successfully matched.
  • the unlocking module includes:
  • a second matching submodule configured to: when the smart door lock determines that the unlocking verification code is legal, matching the unlocking verification code with a local pre-generated legal verification code; wherein the legal verification code is localized
  • the stored communication key is generated by encrypting the locally stored initial key and the key data;
  • the second unlocking submodule is configured to perform an unlocking action when the second matching submodule is successfully matched.
  • the embodiment of the present application further provides a cloud server, where the cloud server includes:
  • a sending module configured to separately send the initial key and the communication key to the mobile terminal and the smart door lock, so that the mobile terminal and the smart door lock are unlocked by using the initial key and the communication key.
  • the sending module is specifically configured to:
  • the initial key and the communication key are sent to the mobile terminal and the smart door lock respectively through a secure out-of-band transmission or a private encrypted channel.
  • the disclosed technical contents may be implemented in other manners.
  • the device embodiments described above are only schematic.
  • the division of the unit may be a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or may be Integrate into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, unit or module, and may be electrical or otherwise.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Lock And Its Accessories (AREA)
  • Telephone Function (AREA)

Abstract

一种智能门锁的开锁方法、移动终端、智能门锁及云服务器,方法包括:移动终端接收来自云服务器的初始密钥和通信密钥(S101a);移动终端利用通信密钥对初始密钥和预设的密钥数据进行加密,生成开锁验证码(S102a);移动终端将预设的密钥数据附加于开锁验证码后,得到附加有预设的密钥数据的开锁验证码(S103a);移动终端将附加有预设的密钥数据的开锁验证码发送至智能门锁,以便智能门锁根据附加有预设的密钥数据的开锁验证码进行开锁(S104a)。利用通信密钥对初始密码和预设的密钥数据进行加密生成开锁验证码,通过开锁验证码的传输能够避免初始密钥和通信密钥被篡改,保证智能门锁的开锁安全,避免造成财产损失。

Description

智能门锁的开锁方法、移动终端、智能门锁及云服务器
本申请要求于2017年1月21日提交中国专利局、申请号为201710044914.1、发明名称为“一种智能门锁的开锁方法”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及智能门锁的开锁方法,属于智能家居和安防技术领域。
背景技术
智能手机和低功耗蓝牙技术的普及率越来越高,很多应用均实现了智能手机通过蓝牙开锁。而开锁指令依靠无线传输,较容易被监听,增大了命令被窃取、篡改、重放的风险。
目前已有的方案:
(1)固定的通信内容或者蓝牙的物理地址作为通信内容;监听后重新播放即可破解。
(2)依赖蓝牙的物理地址进行内容加密,因为蓝牙的地址可以通过监听工具得到,算法一旦公开,依然可以破解。
(3)使用蓝牙协议提供的加密和认证功能。因为所有的加密通信均有一个初始密钥交换,生成长期密钥的过程。只要能够监听到这个交互密钥的过程,加密功能即可破解。
蓝牙开锁的安全性要求很高,一旦被破解,会造成重大的财产损失。
发明内容
本发明的目的就是克服上述缺点,提出一种智能门锁的开锁方法,所采用的技术方案如下:
第一方面,本申请实施例提供了一种智能门锁的开锁方法,所述方法包括:
移动终端接收来自云服务器的初始密钥和通信密钥;
所述移动终端利用所述通信密钥对所述初始密钥和预设的密钥数据进行加密,生成开锁验证码;
所述移动终端将所述密钥数据附加于所述开锁验证码后,得到附加有所述密钥数据的开锁验证码;
所述移动终端将所述附加有所述密钥数据的开锁验证码发送至智能门锁,以便所述智能门锁根据所述附加有所述密钥数据的开锁验证码进行开锁。
可选的,所述预设的密钥数据为时间戳。
可选的,所述移动终端配置有与所述初始密钥对应的递增计数器,所述预设的密钥数据为所述递增计数器的计数;在所述移动终端接收来自云服务器的初始密钥和通信密钥之后,所述递增计数器的计数加1。
可选的,所述移动终端将所述附加有所述密钥数据的开锁验证码发送至智能门锁之前,还包括:
所述移动终端通过蓝牙,zigbee或WIFI无线通信方式与智能门锁建立连接。
第二方面,本申请实施例提供了一种智能门锁的开锁方法,所述方法包括:
智能门锁在接收到来自移动终端的附加有预设的密钥数据的开锁验证码后,验证所述开锁验证码的合法性;
当所述智能门锁确定所述开锁验证码合法时,根据所述开锁验证码进行开锁。
可选的,所述预设的密钥数据为时间戳;所述智能门锁在接收到来自移动终端的附加有预设的密钥数据的开锁验证码后,验证所述开锁验证码的合法性,包括:
所述智能门锁将所述时间戳与本地时钟模块的时间做对比;所述本地时钟模块的时间为自动匹配更新的标准时间;
如果所述时间戳与所述本地时钟模块的时间的差值超过限定阈值,则确定所述开锁验证码不合法;
如果所述差值未超过所述限定阈值,则确定所述开锁验证码合法。
可选的,所述根据所述开锁验证码进行开锁后,还包括:
所述智能门锁将本地时钟模块的时间与所述时间戳进行同步。
可选的,所述预设的密钥数据为递增计数器的计数,所述智能门锁在接收到来自移动终端的附加有预设的密钥数据的开锁验证码后,验证所述开锁验证码的合法性,包括:
所述智能门锁将所述开锁验证码附加的递增计数器的计数与本地保存的计数器的计数值比较;
如果所述递增计数器的计数大于本地保存的计数器的计数值,则确定所述开锁验证码合法;如果所述递增计数器的计数小于等于本地保存的计数器的计数值,则确定所述开锁验证码为不合法。
可选的,所述根据所述开锁验证码进行开锁后,还包括:
所述智能门锁将本地保存的计数器的计数值更新为所述递增计数器的计数。
可选的,所述当所述智能门锁确定所述开锁验证码合法时,根据所述开锁验证码进行开锁,包括:
当所述智能门锁确定所述开锁验证码合法时,利用所述密钥数据和本地存储的通信密钥对所述开锁验证码进行解码,得到待匹配初始密钥;
所述智能门锁将所述待匹配初始密钥与本地存储的初始密钥进行匹配,如果匹配成功,则执行开锁动作。
可选的,所述当所述智能门锁确定所述开锁验证码合法时,根据所述开锁验证码进行开锁,包括:
当所述智能门锁确定所述开锁验证码合法时,将所述开锁验证码与本地预先生成的合法验证码进行匹配;其中,所述合法验证码是利用本地存储的通信密钥对本地存储的初始密钥和所述密钥数据进行加密生成的;
如果匹配成功,则执行开锁动作。
第三方面,本申请实施例还提供了一种智能门锁的开锁方法,所述方法包括:
云服务器将初始密钥和通信密钥分别发送至移动终端和智能门锁,以便所述移动终端和所述智能门锁通过所述初始密钥和所述通信密钥进行开锁。
可选的,所述云服务器将初始密钥和通信密钥分别发送至移动终端和智能门锁,包括:
所述云服务器通过安全的带外传输或者私有的加密通道,将初始密钥和通信密钥分别发送至移动终端和智能门锁。
第四方面,本申请实施例还提供了一种移动终端,所述移动终端包括:
第一接收模块,用于接收来自云服务器的初始密钥和通信密钥;
第一加密模块,用于利用所述通信密钥对所述初始密钥和预设的密钥数据进行加密,生成开锁验证码;
附加模块,用于将所述密钥数据附加于所述开锁验证码后,得到附加有所述密钥数据的开锁验证码;
第一发送模块,用于将所述附加有所述密钥数据的开锁验证码发送至智能门锁,以便所述智能门锁根据所述附加有所述密钥数据的开锁验证码进行开锁。
可选的,所述预设的密钥数据为时间戳。
可选的,所述移动终端配置有与所述初始密钥对应的递增计数器,所述预设的密钥数据为所述递增计数器的计数;在所述移动终端接收来自云服务器的初始密钥和通信密钥之后,所述递增计数器的计数加1。
可选的,所述移动终端还包括:
连接模块,用于通过蓝牙,zigbee或WIFI无线通信方式与智能门锁建立连接。
第五方面,本申请实施例提供了一种智能门锁,所述智能门锁包括:
验证模块,用于在接收到来自移动终端的附加有预设的密钥数据的开锁验证码后,验证所述开锁验证码的合法性;
开锁模块,用于在确定所述开锁验证码合法时,根据所述开锁验证码进行开锁。
可选的,所述预设的密钥数据为时间戳;所述验证模块,包括:
第一对比子模块,用于将所述时间戳与本地时钟模块的时间做对比;所述本地时钟模块的时间为自动匹配更新的标准时间;
第一确定子模块,用于在所述时间戳与所述本地时钟模块的时间的差值超过限定阈值,确定所述开锁验证码不合法;
第二确定子模块,用于在所述差值未超过所述限定阈值时,确定所述开锁验证码合法。
可选的,所述智能门锁还包括:
同步模块,用于将本地时钟模块的时间与所述时间戳进行同步。
可选的,所述预设的密钥数据为递增计数器的计数,所述验证模块,包括:
第二比对子模块,用于将所述开锁验证码附加的递增计数器的计数与本地保存的计数器的计数值比较;
第三确定子模块,用于在所述递增计数器的计数大于本地保存的计数器的计数值时,确定所述开锁验证码合法;
第四确定子模块,用于在所述递增计数器的计数小于等于本地保存的计数器的计数值时,确定所述开锁验证码为不合法。
可选的,所述智能门锁还包括:
更新模块,用于将本地保存的计数器的计数值更新为所述递增计数器的计数。
可选的,所述开锁模块,包括:
解码子模块,用于当所述智能门锁确定所述开锁验证码合法时,利用所述密钥数据和本地存储的通信密钥对所述开锁验证码进行解码,得到待匹配初始密钥;
第一匹配子模块,用于所述智能门锁将所述待匹配初始密钥与本地存储的初始密钥进行匹配;
第一开锁子模块,用于在所述第一匹配子模块匹配成功时,执行开锁动作。
可选的,所述开锁模块,包括:
第二匹配子模块,用于当所述智能门锁确定所述开锁验证码合法时,将所述开锁验证码与本地预先生成的合法验证码进行匹配;其中,所述合法验 证码是利用本地存储的通信密钥对本地存储的初始密钥和所述密钥数据进行加密生成的;
第二开锁子模块,用于在所述第二匹配子模块匹配成功时,执行开锁动作。
第六方面,本申请实施例提供了一种云服务器,所述云服务器包括:
发送模块,用于将初始密钥和通信密钥分别发送至移动终端和智能门锁,以便所述移动终端和所述智能门锁通过所述初始密钥和所述通信密钥进行开锁。
可选的,所述发送模块,具体用于:
通过安全的带外传输或者私有的加密通道,将初始密钥和通信密钥分别发送至移动终端和智能门锁。
本申请提供的智能门锁的开锁方法,利用通信密钥对初始密码和预设的密钥数据进行加密生成开锁验证码,通过开锁验证码的传输能够避免初始密钥和通信密钥被篡改,保证智能门锁的开锁安全,避免造成财产损失。
上述说明仅是本发明技术方案的概述,为了能够更清楚了解本发明的技术手段,而可依照说明书的内容予以实施,并且为了让本发明的上述和其它目的、特征和优点能够更明显易懂,以下特举本发明的具体实施方式。
附图说明
通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本发明的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:
图1a为本申请实施例提供的一种智能门锁的开锁方法的流程示意图;
图1b为本申请实施例提供的另一种智能门锁的开锁方法的流程示意图;
图1c为本申请实施例提供的另一种智能门锁的开锁方法的流程示意图;
图2为本申请实施例提供的一种加密示意图;
图3为本申请实施例提供的另一种加密示意图;
图4为本申请的实施例1步骤(1)的流程示意图;
图5为本申请的实施例1的一种智能门锁的开锁方法步骤(2)-(8)的流程示意图;
图6为本申请的实施例2步骤(1)的流程示意图;
图7为本申请的实施例2的一种智能门锁的开锁方法步骤(2)-(9)的流程示意图;
图8为本申请实施例提供的一种移动终端的示意图;
图9为本申请实施例提供的一种智能门锁的示意图。
具体实施方式
为了使本技术领域的人员更好地理解本发明方案,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分的实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员所获得的所有其他实施例,都应当属于本发明保护的范围。
本发明的说明书和权利要求书及上述附图中的术语“第一”、“第二”、“第三”“第四”等(如果存在)是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的实施例能够以除了在这里图示或描述的内容以外的顺序实施。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、***、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。下面将参照附图更详细地描述本公开的示例性实施例。虽然附图中显示了本公开的示例性实施例,然而应当理解,可以以各种形式实现本公开而不应被这里阐述的实 施例所限制。相反,提供这些实施例是为了能够更透彻地理解本公开,并且能够将本公开的范围完整的传达给本领域的技术人员。
参考图1a,为本申请实施例提供的一种智能门锁的开锁方法流程图,该方法应用于移动终端,该方法具体包括:
S101a:移动终端接收来自云服务器的初始密钥和通信密钥。
实际应用中,云服务器将初始密钥和通信密钥下发至移动终端,以便移动终端根据初始密钥和通信密钥实现智能门锁的开锁。
为了保证初始密钥和通信密钥下发的安全性,云服务器可以通过安全的带外传输或者私有的加密通道的方式完成初始密钥和通信密钥的下发。
S102a:所述移动终端利用所述通信密钥对所述初始密钥和预设的密钥数据进行加密,生成开锁验证码。
预设的密钥数据可以为时间戳,也可以为移动终端配置的与初始密码对应的递增计数器的计数,本申请实施例中预设的密钥数据不限定于上述两种实现方式。
另外,具体的生成开锁验证码的方法在后续进行具体介绍。
S103a:所述移动终端将所述预设的密钥数据附加于所述开锁验证码后,得到附加有所述预设的密钥数据的开锁验证码。
本申请实施例中,在移动终端生成开锁验证码后,将预设的密钥数据作为明文附加于该开锁验证码,得到附加有预设的密钥数据的开锁验证码。
S104a:所述移动终端将所述附加有所述预设的密钥数据的开锁验证码发送至智能门锁,以便所述智能门锁根据所述附加有所述预设的密钥数据的开锁验证码进行开锁。
实际应用中,移动终端在得到附加有预设的密钥数据的开锁验证码后,将该附加有预设的密钥数据的开锁验证码发送至智能门锁。
本申请提供的智能门锁的开锁方法,利用通信密钥对初始密码和预设的密钥数据进行加密生成开锁验证码,通过开锁验证码的传输能够避免初始密钥和通信密钥被篡改,保证智能门锁的开锁安全,避免造成财产损失。
参考图1b,为本申请实施例提供的一种智能门锁的开锁方法流程图,该方法应用于智能门锁,该方法包括:
S101b:智能门锁在接收到来自移动终端的附加有预设的密钥数据的开锁验证码后,验证所述开锁验证码的合法性。
本申请实施例中,智能门锁在接收到附加有预设的密钥数据的开锁验证码后,首先验证其合法性,以保证接收到的附加有预设的密钥数据的开锁验证码在传输过程中的安全性,具体的验证开锁验证码的合法性的方法在后续进行具体介绍。
S102b:当所述智能门锁确定所述开锁验证码合法时,根据所述开锁验证码进行开锁。
本申请实施例中,智能门锁确定开锁验证码合法时,才能继续根据开锁验证码进行开锁,否则终止开锁操作。具体的,根据开锁验证码进行开锁的方法在后续进行具体介绍。
另外,对于云服务器,需要预先将初始密钥和通信密钥分别发送至移动终端和智能门锁,以便移动终端和智能门锁可以通过初始密钥和通信密钥进行开锁。
以下提供一种具体实施场景,请参阅图1c,为本申请实施例提供的一种智能门锁的开锁方法流程图,该方法应用于云服务器、移动终端和智能门锁,该方法具体包括:
S101c:云服务器将初始密钥和通信密钥分别发送至移动终端和智能门锁。
具体的,云服务器可以在生成一组初始密钥和通信密钥后,通过预设置的方式将生成的初始密钥和通信密钥分别发送至移动终端和智能门锁。其中,预设置的方式可以是通过安全的带外传输或者私有的加密通道等。
实际应用中,初始密钥可以为初始token,通信密钥可以为key。
S102c:移动终端和智能门锁通过无线通信方式建立连接。
具体的,移动终端和智能门锁可以通过蓝牙、zigbee或WIFI等无线通信方式建立连接。
S103c:移动终端利用通信密钥对初始密钥和预设的密钥数据进行加密,生成开锁验证码。
一种实现方式中,预设的密钥数据可以为时间戳timestamp,如图2所示,移动终端利用通信密钥key对初始密钥开锁token和时间戳进行加密,得到密文即为开锁验证码。
另一种实现方式中,移动终端配置有与初始密码对应的递增计数器,在移动终端接收到来自云服务器的初始密钥和通信密钥后,该初始密钥对应的递增计数器的计数加1。预设的密钥数据可以为该递增计数器的计数count。如图3所示,移动终端利用通信密钥key对初始密钥开锁token和计数count进行加密,得到密文即为开锁验证码。
S104c:移动终端将预设的密钥数据作为明文附加于开锁验证码后,得到附加有预设的密钥数据的开锁验证码。
移动终端在生成开锁验证码后,为了保证传输过程中开锁验证码的安全,将预设的密钥数据作为明文附加于开锁验证码,得到附加有密钥数据的开锁验证码。
具体的,移动终端可以将开锁验证码附加当前时间戳,以生成带有时间戳的开锁验证码,并发送至智能门锁。例如当前时间戳为2016-08-11-20:21,则可以将此作为时间戳附加于开锁验证码,生成带有时间戳的开锁验证码并发送至智能门锁。
S105c:智能门锁在接收到来自移动终端的附加有预设的密钥数据的开锁验证码后,验证开锁验证码的合法性。
一种实现方式中,预设的密钥数据为时间戳时,智能门锁将时间戳与本地时钟的时间进行对比,如果时间戳与本地时钟的时间的差值未超过限定阈值,则确定该开锁验证码是合法的,否则是不合法的。如果不合法,智能门锁可以将不合法的比对结果通过蓝牙反馈至移动终端。另外,限定阈值可根据实际情况确定,通常设定在15min~60min内,假设设定限定阈值为20min;则差值超过20min可认定开锁验证码是非法的。
另外,如果确定开锁验证码是合法的,则可以进一步判定该开锁验证码是否被篡改,例如,通过比较附加在开锁验证码的时间戳与对开锁验证码进行解码后得到的时间戳,以确定开锁验证码是否被篡改,具体的如果二者相 同,则认为未被篡改,否则认为已经被篡改,在确定开锁验证码未被篡改后,继续执行S106c。
实际应用中,本地时钟模块是内部用纽扣电池长期供电的时钟芯片,例如智能门锁使用5号干电池供电,即使更换5号电池前后,门锁内部的时钟模块依然保持正常运行,时钟模块的时间为自动匹配更新的标准时间,例如当前标准时间为17:00,则时钟模块的时间也为17:00。
另一种实现方式中,预设的密钥数据为递增计数器的计数时,智能门锁将开锁验证码附加的递增计数器的计数与本地保存的计数器的计数值进行比较,如果递增计数器的计数大于本地保存的计数器的计数值,则确定开锁验证码合法;否则是不合法的。
实际应用中,移动终端和智能门锁对每一个初始密钥均保存一个递增计数器count,每次开锁前,移动终端的计数器加1;移动终端利用通信密钥对初始密钥和计数器的计数通过加密算法进行加密生成开锁验证码。
S106c:当智能门锁确定开锁验证码合法时,根据开锁验证码进行开锁。
一种实现方式中,当智能门锁确定开锁验证码合法时,利用本地存储的通信密钥和明文中的密钥数据对开锁验证码进行解码,得到待匹配初始密钥。智能门锁将待匹配初始密钥与本地存储的初始密钥进行匹配,如果匹配成功,则执行开锁动作。
实际应用中,在执行开锁动作后,智能门锁将本地时钟模块的时间与时间戳进行同步,以更新本地时钟模块的时间。
另一种实现方式中,当智能门锁确定所述开锁验证码合法时,将开锁验证码与本地预先生成的合法验证码进行匹配,如果匹配成功,则执行开锁动作。其中,合法验证码是智能门锁利用本地存储的通信密钥对本地存储的初始密钥和密钥数据进行加密生成的,也就是说,只有接收到和任一合法验证码相同的开锁验证码后,才能够执行开锁动作。
实际应用中,在执行开锁动作后,智能门锁将本地保存的计数器的计数值更新为递增计数器的计数。
本申请实施例提供的智能门锁的开锁方法,利用通信密钥对初始密码和预设的密钥数据进行加密生成开锁验证码,通过开锁验证码的传输能够避免初始密钥和通信密钥被篡改,保证智能门锁的开锁安全,避免造成财产损失。
基于上述实施例的描述,本申请还提供了以下两种具体的智能门锁的开锁方法,具体如下:
实施例1:
请参阅图4和图5,图4为实施例1步骤(1)的流程示意图,图5为实施例1的一种智能门锁的开锁方法步骤(2)-(8)的流程示意图。
具体的,本申请实施例提供的一种智能门锁的开锁方法,包括如下步骤:
(1)云服务器生成蓝牙密钥,云服务器将蓝牙密钥通过安全的带外传输或者私有的加密通道,分别下发到蓝牙手机和智能门锁中;
(2)蓝牙手机和智能门锁通过蓝牙或zigbee无线通信方式建立连接;或通过蓝牙密钥验证建立蓝牙连接;
(3)所述初始密钥为初始token,蓝牙手机将开锁token和时间戳timestamp,使用通信key完成加密,生成开锁验证码;
(4)蓝牙手机将开锁验证码附加当前时间戳生成带有时间戳的开锁验证码并发送至智能门锁;
(5)智能门锁将时间戳与智能门锁内的时钟模块保存的时间做对比;如果偏差即明文中的时间戳与时钟模块保存的时间的差值超过限定阈值,则判断所述开锁验证码是非法的数据包,将验证结果通过蓝牙反馈至所述移动终端;一般设定阈值可根据情况设定在15min~60min内,例如设定限定阈值为20min;则如果偏差超过20min,则判断所述开锁验证码是非法的数据包,将验证结果通过蓝牙反馈至蓝牙手机,避免了非法的时间值发送,或者重新播放曾经的开锁信息;
时钟模块内部用纽扣电池长期供电的时钟芯片,例如智能门锁使用5号干电池供电,即使更换5号电池前后,门锁内部的时钟依然保持,时钟模块中的时间为自动匹配更新的标准时间;例如现在时间为17:00,则时钟模块的时间也为17:00。
(6)如果偏差未超过限定阈值,使用时间戳将开锁验证码进行解码,比较开锁验证码中的时间戳和明文中的时间戳,确定数据包的明文部分没有被篡改。
具体的,比较开锁验证码中的时间戳和所述带有时间戳的开锁验证码的明文中的时间戳,确定所述带有时间戳的开锁验证码的明文部分是否有被篡改;如果开锁验证码中的时间戳和所述带有时间戳的开锁验证码的明文中的时间戳相同,则认为没有被篡改;如果不同,则认为被篡改。
如果没有被篡改,则检查结果为所述带有时间戳的开锁验证码合法;如果被篡改,则检查结果为所述带有时间戳的开锁验证码不合法,并将验证结果通过蓝牙反馈给蓝牙手机。
(7)当检查结果为所述带有时间戳的开锁验证码合法时,则继续将解码得到的初始密钥与锁内保存的合法密钥进行比较;并验证所述初始密钥与锁内保存的合法密钥是否属于该移动终端与智能门锁的组合;
若比较初始密钥与锁内保存的合法密钥一致,且所述初始密钥与锁内保存的合法密钥属于该移动终端与智能门锁的组合,则确定匹配成功,将验证结果通过蓝牙反馈给蓝牙手机,智能门锁执行开锁动作;
(8)所述智能门锁将智能手机发送的带有时间戳的开锁验证码中的时间戳与智能门锁内的时间同步;断开蓝牙连接。
实施例2
请参阅图6和图7,图6为实施例2步骤(1)的流程示意图,图7为实施例2的一种智能门锁的开锁方法步骤(2)-(9)的流程示意图.
具体的,本申请实施例提供的一种智能门锁的开锁方法,包括:
(1)云服务器生成蓝牙密钥,通过安全的带外传输或者私有的加密通道,分别下发到蓝牙手机和智能门锁中;
(2)蓝牙手机和智能门锁通过蓝牙或zigbee无线通信方式建立连接;或比较所述移动终端和智能门锁的初始密钥是否一致,当初始密钥一致时建立蓝牙连接;
(3)蓝牙手机和所述智能门锁对每一个密钥均保存一个递增的计数器count,每次开锁前,所述移动终端的计数器加1;计数范围足够大,保证在锁 的生命周期内,不会计满。每次开锁前,蓝牙手机的计数器加1。所述初始密钥包括初始token,所述蓝牙手机将初始token作为初始密钥及预设的密钥数据使用通信key进行加密生成开锁验证码;所述预设的密钥数据为计数器count和/或时间戳timestamp。
(4)蓝牙手机将所述开锁验证码附加当前时间戳生成带有时间戳的开锁验证码并通过蓝牙通道发送至智能门锁;
(5)智能门锁使用时间戳将开锁验证码进行解码,比较开锁验证码中的时间戳和明文中的时间戳,确定数据包的明文部分是否有被篡改;
比较开锁验证码中的时间戳和所述带有时间戳的开锁验证码的明文中的时间戳如果相同,则认为没有被篡改;如果不同,则认为被篡改。如果被篡改,将验证结果通过蓝牙反馈给所述移动终端。
(6)如果没有被篡改,则将所述智能门锁发送的计数器值与本地保存的count值比较,如果所述智能门锁发送的计数器值大于本地保存的值,则检查结果为所述带有时间戳的开锁验证码合法;如果所述智能门锁发送的计数器值小于等于本地保存的值,则认为是数据包被重新播放,则检查结果为所述带有时间戳的开锁验证码为不合法,则认为是数据包被重新播放,判为非法,并将验证结果通过蓝牙反馈给所述移动终端。
(7)当检查结果为所述带有时间戳的开锁验证码合法时,则继续将解码得到的初始密钥开锁token与锁内保存的合法密钥合法token进行比较;并验证所述初始密钥与锁内保存的合法密钥是否属于该移动终端与智能门锁的组合。
若比较初始密钥与锁内保存的合法密钥一致,且所述初始密钥与锁内保存的合法密钥属于该蓝牙手机与智能门锁的组合,则确定匹配成功,将验证结果通过蓝牙反馈给蓝牙手机,智能门锁执行开锁动作。
(9)将智能门锁内的计数器更新为蓝牙手机此次发送的计数器值;断开蓝牙连接。
上述实施例1和实施例2均实现了智能门锁的开锁过程中的蓝牙密钥的防窃取、防篡改和防重放。具体的,实施例1需要智能锁中包含一个时钟模块, 利用时间不可倒退的特性完成防重放。实施例2实现了一个与时间无关的防重放机制,适用范围更广泛,也避免了长期未同步的情况下出现的时间偏差。
与上述方法实施例相对应的,本申请实施例还提供了一种移动终端,参考图8,为本申请实施例提供的一种移动终端的示意图,所述移动终端包括:
第一接收模块801,用于接收来自云服务器的初始密钥和通信密钥;
第一加密模块802,用于利用所述通信密钥对所述初始密钥和预设的密钥数据进行加密,生成开锁验证码;
附加模块803,用于将所述密钥数据附加于所述开锁验证码后,得到附加有所述密钥数据的开锁验证码;
第一发送模块804,用于将所述附加有所述密钥数据的开锁验证码发送至智能门锁,以便所述智能门锁根据所述附加有所述密钥数据的开锁验证码进行开锁。
一种实现方式中,所述预设的密钥数据为时间戳。
另一种实现方式中,所述移动终端配置有与所述初始密钥对应的递增计数器,所述预设的密钥数据为所述递增计数器的计数;在所述移动终端接收来自云服务器的初始密钥和通信密钥之后,所述递增计数器的计数加1。
所述移动终端还包括:
连接模块,用于通过蓝牙,zigbee或WIFI无线通信方式与智能门锁建立连接。
参考图9,为本申请实施例提供的一种智能门锁的示意图,所述智能门锁包括:
验证模块901,用于在接收到来自移动终端的附加有预设的密钥数据的开锁验证码后,验证所述开锁验证码的合法性;
开锁模块902,用于在确定所述开锁验证码合法时,根据所述开锁验证码进行开锁。
一种实现方式中,所述预设的密钥数据为时间戳;所述验证模块,包括:
第一对比子模块,用于将所述时间戳与本地时钟模块的时间做对比;所述本地时钟模块的时间为自动匹配更新的标准时间;
第一确定子模块,用于在所述时间戳与所述本地时钟模块的时间的差值超过限定阈值,确定所述开锁验证码不合法;
第二确定子模块,用于在所述差值未超过所述限定阈值时,确定所述开锁验证码合法。
所述智能门锁还包括:
同步模块,用于将本地时钟模块的时间与所述时间戳进行同步。
另一种实现方式中,所述预设的密钥数据为递增计数器的计数,所述验证模块,包括:
第二比对子模块,用于将所述开锁验证码附加的递增计数器的计数与本地保存的计数器的计数值比较;
第三确定子模块,用于在所述递增计数器的计数大于本地保存的计数器的计数值时,确定所述开锁验证码合法;
第四确定子模块,用于在所述递增计数器的计数小于等于本地保存的计数器的计数值时,确定所述开锁验证码为不合法。
所述智能门锁还包括:
更新模块,用于将本地保存的计数器的计数值更新为所述递增计数器的计数。
具体的,所述开锁模块,包括:
解码子模块,用于当所述智能门锁确定所述开锁验证码合法时,利用所述密钥数据和本地存储的通信密钥对所述开锁验证码进行解码,得到待匹配初始密钥;
第一匹配子模块,用于所述智能门锁将所述待匹配初始密钥与本地存储的初始密钥进行匹配;
第一开锁子模块,用于在所述第一匹配子模块匹配成功时,执行开锁动作。
所述开锁模块,包括:
第二匹配子模块,用于当所述智能门锁确定所述开锁验证码合法时,将所述开锁验证码与本地预先生成的合法验证码进行匹配;其中,所述合法验 证码是利用本地存储的通信密钥对本地存储的初始密钥和所述密钥数据进行加密生成的;
第二开锁子模块,用于在所述第二匹配子模块匹配成功时,执行开锁动作。
另外,本申请实施例还提供了一种云服务器,所述云服务器包括:
发送模块,用于将初始密钥和通信密钥分别发送至移动终端和智能门锁,以便所述移动终端和所述智能门锁通过所述初始密钥和所述通信密钥进行开锁。
所述发送模块,具体用于:
通过安全的带外传输或者私有的加密通道,将初始密钥和通信密钥分别发送至移动终端和智能门锁。
上述本申请实施例序号仅仅为了描述,不代表实施例的优劣。
在本申请的上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其他实施例的相关描述。
在本申请所提供的几个实施例中,应该理解到,所揭露的技术内容,可通过其它的方式实现。其中,以上所描述的装置实施例仅仅是示意性的,例如所述单元的划分,可以为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个***,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,单元或模块的间接耦合或通信连接,可以是电性或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
以上所述仅是本申请的优选实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本申请原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也应视为本申请的保护范围。

Claims (26)

  1. 一种智能门锁的开锁方法,其特征在于,所述方法包括:
    移动终端接收来自云服务器的初始密钥和通信密钥;
    所述移动终端利用所述通信密钥对所述初始密钥和预设的密钥数据进行加密,生成开锁验证码;
    所述移动终端将所述预设的密钥数据附加于所述开锁验证码后,得到附加有所述预设的密钥数据的开锁验证码;
    所述移动终端将所述附加有所述预设的密钥数据的开锁验证码发送至智能门锁,以便所述智能门锁根据所述附加有所述预设的密钥数据的开锁验证码进行开锁。
  2. 根据权利要求1所述的方法,其特征在于,所述预设的密钥数据为时间戳。
  3. 根据权利要求1所述的方法,其特征在于,所述移动终端配置有与所述初始密钥对应的递增计数器,所述预设的密钥数据为所述递增计数器的计数;在所述移动终端接收来自云服务器的初始密钥和通信密钥之后,所述递增计数器的计数加1。
  4. 根据权利要求1所述的方法,其特征在于,所述移动终端将所述附加有所述预设的密钥数据的开锁验证码发送至智能门锁之前,还包括:
    所述移动终端通过蓝牙,zigbee或WIFI无线通信方式与智能门锁建立连接。
  5. 一种智能门锁的开锁方法,其特征在于,所述方法包括:
    智能门锁在接收到来自移动终端的附加有预设的密钥数据的开锁验证码后,验证所述开锁验证码的合法性;
    当所述智能门锁确定所述开锁验证码合法时,根据所述开锁验证码进行开锁。
  6. 根据权利要求5所述的方法,其特征在于,所述预设的密钥数据为时间戳;所述智能门锁在接收到来自移动终端的附加有预设的密钥数据的开锁验证码后,验证所述开锁验证码的合法性,包括:
    所述智能门锁将所述时间戳与本地时钟模块的时间做对比;所述本地时钟模块的时间为自动匹配更新的标准时间;
    如果所述时间戳与所述本地时钟模块的时间的差值超过限定阈值,则确定所述开锁验证码不合法;
    如果所述差值未超过所述限定阈值,则确定所述开锁验证码合法。
  7. 根据权利要求6所述的方法,其特征在于,所述根据所述开锁验证码进行开锁后,还包括:
    所述智能门锁将本地时钟模块的时间与所述时间戳进行同步。
  8. 根据权利要求5所述的方法,其特征在于,所述预设的密钥数据为递增计数器的计数,所述智能门锁在接收到来自移动终端的附加有预设的密钥数据的开锁验证码后,验证所述开锁验证码的合法性,包括:
    所述智能门锁将所述开锁验证码附加的递增计数器的计数与本地保存的计数器的计数值比较;
    如果所述递增计数器的计数大于本地保存的计数器的计数值,则确定所述开锁验证码合法;如果所述递增计数器的计数小于等于本地保存的计数器的计数值,则确定所述开锁验证码为不合法。
  9. 根据权利要求8所述的方法,其特征在于,所述根据所述开锁验证码进行开锁后,还包括:
    所述智能门锁将本地保存的计数器的计数值更新为所述递增计数器的计数。
  10. 根据权利要求5所述的方法,其特征在于,所述当所述智能门锁确定所述开锁验证码合法时,根据所述开锁验证码进行开锁,包括:
    当所述智能门锁确定所述开锁验证码合法时,利用所述预设的密钥数据和本地存储的通信密钥对所述开锁验证码进行解码,得到待匹配初始密钥;
    所述智能门锁将所述待匹配初始密钥与本地存储的初始密钥进行匹配,如果匹配成功,则执行开锁动作。
  11. 根据权利要求5所述的方法,其特征在于,所述当所述智能门锁确定所述开锁验证码合法时,根据所述开锁验证码进行开锁,包括:
    当所述智能门锁确定所述开锁验证码合法时,将所述开锁验证码与本地预先生成的合法验证码进行匹配;其中,所述合法验证码是利用本地存储的通信密钥对本地存储的初始密钥和所述预设的密钥数据进行加密生成的;
    如果匹配成功,则执行开锁动作。
  12. 一种智能门锁的开锁方法,其特征在于,所述方法包括:
    云服务器将初始密钥和通信密钥分别发送至移动终端和智能门锁,以便所述移动终端和所述智能门锁通过所述初始密钥和所述通信密钥进行开锁。
  13. 根据权利要求12所述的方法,其特征在于,所述云服务器将初始密钥和通信密钥分别发送至移动终端和智能门锁,包括:
    所述云服务器通过安全的带外传输或者私有的加密通道,将初始密钥和通信密钥分别发送至移动终端和智能门锁。
  14. 一种移动终端,其特征在于,所述移动终端包括:
    第一接收模块,用于接收来自云服务器的初始密钥和通信密钥;
    第一加密模块,用于利用所述通信密钥对所述初始密钥和预设的密钥数据进行加密,生成开锁验证码;
    附加模块,用于将所述预设的密钥数据附加于所述开锁验证码后,得到附加有所述预设的密钥数据的开锁验证码;
    第一发送模块,用于将所述附加有所述预设的密钥数据的开锁验证码发送至智能门锁,以便所述智能门锁根据所述附加有所述预设的密钥数据的开锁验证码进行开锁。
  15. 根据权利要求14所述的移动终端,其特征在于,所述预设的密钥数据为时间戳。
  16. 根据权利要求14所述的移动终端,其特征在于,所述移动终端配置有与所述初始密钥对应的递增计数器,所述预设的密钥数据为所述递增计数器的计数;在所述移动终端接收来自云服务器的初始密钥和通信密钥之后,所述递增计数器的计数加1。
  17. 根据权利要求14所述的移动终端,其特征在于,所述移动终端还包括:
    连接模块,用于通过蓝牙,zigbee或WIFI无线通信方式与智能门锁建立连接。
  18. 一种智能门锁,其特征在于,所述智能门锁包括:
    验证模块,用于在接收到来自移动终端的附加有预设的密钥数据的开锁验证码后,验证所述开锁验证码的合法性;
    开锁模块,用于在确定所述开锁验证码合法时,根据所述开锁验证码进行开锁。
  19. 根据权利要求18所述的智能门锁,其特征在于,所述预设的密钥数据为时间戳;所述验证模块,包括:
    第一对比子模块,用于将所述时间戳与本地时钟模块的时间做对比;所述本地时钟模块的时间为自动匹配更新的标准时间;
    第一确定子模块,用于在所述时间戳与所述本地时钟模块的时间的差值超过限定阈值,确定所述开锁验证码不合法;
    第二确定子模块,用于在所述差值未超过所述限定阈值时,确定所述开锁验证码合法。
  20. 根据权利要求19所述的智能门锁,其特征在于,所述智能门锁还包括:
    同步模块,用于将本地时钟模块的时间与所述时间戳进行同步。
  21. 根据权利要求18所述的智能门锁,其特征在于,所述预设的密钥数据为递增计数器的计数,所述验证模块,包括:
    第二比对子模块,用于将所述开锁验证码附加的递增计数器的计数与本地保存的计数器的计数值比较;
    第三确定子模块,用于在所述递增计数器的计数大于本地保存的计数器的计数值时,确定所述开锁验证码合法;
    第四确定子模块,用于在所述递增计数器的计数小于等于本地保存的计数器的计数值时,确定所述开锁验证码为不合法。
  22. 根据权利要求21所述的智能门锁,其特征在于,所述智能门锁还包括:
    更新模块,用于将本地保存的计数器的计数值更新为所述递增计数器的计数。
  23. 根据权利要求18所述的智能门锁,其特征在于,所述开锁模块,包括:
    解码子模块,用于当所述智能门锁确定所述开锁验证码合法时,利用所述预设的密钥数据和本地存储的通信密钥对所述开锁验证码进行解码,得到待匹配初始密钥;
    第一匹配子模块,用于所述智能门锁将所述待匹配初始密钥与本地存储的初始密钥进行匹配;
    第一开锁子模块,用于在所述第一匹配子模块匹配成功时,执行开锁动作。
  24. 根据权利要求18所述的智能门锁,其特征在于,所述开锁模块,包括:
    第二匹配子模块,用于当所述智能门锁确定所述开锁验证码合法时,将所述开锁验证码与本地预先生成的合法验证码进行匹配;其中,所述合法验证码是利用本地存储的通信密钥对本地存储的初始密钥和所述预设的密钥数据进行加密生成的;
    第二开锁子模块,用于在所述第二匹配子模块匹配成功时,执行开锁动作。
  25. 一种云服务器,其特征在于,所述云服务器包括:
    发送模块,用于将初始密钥和通信密钥分别发送至移动终端和智能门锁,以便所述移动终端和所述智能门锁通过所述初始密钥和所述通信密钥进行开锁。
  26. 根据权利要求25所述的云服务器,其特征在于,所述发送模块,具体用于:
    通过安全的带外传输或者私有的加密通道,将初始密钥和通信密钥分别发送至移动终端和智能门锁。
PCT/CN2018/073369 2017-01-21 2018-01-19 智能门锁的开锁方法、移动终端、智能门锁及云服务器 WO2018133832A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201880007809.3A CN110462691A (zh) 2017-01-21 2018-01-19 智能门锁的开锁方法、移动终端、智能门锁及云服务器
US16/517,378 US11335144B2 (en) 2017-01-21 2019-07-19 Method for unlocking intelligent lock, mobile terminal, intelligent lock and server

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710044914.1 2017-01-21
CN201710044914.1A CN106898065B (zh) 2017-01-21 2017-01-21 一种智能门锁的开锁方法

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/517,378 Continuation-In-Part US11335144B2 (en) 2017-01-21 2019-07-19 Method for unlocking intelligent lock, mobile terminal, intelligent lock and server

Publications (1)

Publication Number Publication Date
WO2018133832A1 true WO2018133832A1 (zh) 2018-07-26

Family

ID=59198927

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/073369 WO2018133832A1 (zh) 2017-01-21 2018-01-19 智能门锁的开锁方法、移动终端、智能门锁及云服务器

Country Status (3)

Country Link
US (1) US11335144B2 (zh)
CN (2) CN106898065B (zh)
WO (1) WO2018133832A1 (zh)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111815817A (zh) * 2020-06-22 2020-10-23 北京智辉空间科技有限责任公司 一种门禁安全控制方法和***
CN112233287A (zh) * 2020-10-19 2021-01-15 北京安恒利通科技股份公司 一种智能锁自动开启方法和智能锁***
CN113593090A (zh) * 2021-07-30 2021-11-02 国家电网有限公司技术学院分公司 一种基于区块链的变电站五防蓝牙锁具***
CN113611014A (zh) * 2021-07-08 2021-11-05 国家电网有限公司技术学院分公司 一种基于区块链的五防锁具管理方法

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106898065B (zh) 2017-01-21 2020-01-17 云丁网络技术(北京)有限公司 一种智能门锁的开锁方法
CN107516360A (zh) * 2017-07-28 2017-12-26 江苏邦融微电子有限公司 一种一匙一密的智能指纹锁密码实现方法
CN107564143A (zh) * 2017-08-18 2018-01-09 黎辉 一种动态二维码门锁的加密解密开锁方法
CN108122316B (zh) * 2017-12-21 2020-02-04 美智光电科技有限公司 基于安全芯片的门锁通信***及方法
CN108198308A (zh) * 2018-01-11 2018-06-22 广州得令信息科技有限公司 门禁控制方法及装置
CN110163995B (zh) * 2018-02-12 2021-04-30 天扬精密科技股份有限公司 遥控电子锁***
JP6984567B2 (ja) * 2018-08-24 2021-12-22 日本電信電話株式会社 認可システム及び認可方法
CN109712278B (zh) * 2018-11-27 2021-07-13 深圳市小石安防科技有限公司 智能门锁身份认证方法、***、可读存储介质及移动终端
CN109754503A (zh) * 2018-12-12 2019-05-14 胡渐佳 智能门锁开锁方法
WO2021023164A1 (zh) 2019-08-02 2021-02-11 云丁网络技术(北京)有限公司 一种智能锁具控制方法和***
CN112446982A (zh) * 2019-08-10 2021-03-05 云丁网络技术(北京)有限公司 用于控制智能锁的方法、装置、计算机可读介质及设备
WO2021023276A1 (zh) 2019-08-06 2021-02-11 云丁网络技术(北京)有限公司 一种智能锁控制方法和装置
CN110718004B (zh) * 2019-09-29 2021-07-20 深圳深岚视觉科技有限公司 解锁方法、装置及存储介质
CN111147452B (zh) * 2019-12-10 2020-12-25 珠海格力电器股份有限公司 一种门锁指令响应的方法、装置、门锁及存储介质
CN111080853B (zh) * 2019-12-20 2021-02-05 珠海格力电器股份有限公司 一种智能门锁***、开锁方法、装置、设备及介质
CN111815810A (zh) * 2020-06-22 2020-10-23 北京智辉空间科技有限责任公司 一种电子锁安全开锁方法和装置
CN114677784A (zh) * 2020-12-24 2022-06-28 中国电信股份有限公司 智能光控门锁***以及智能光控门锁开启方法
CN114694279A (zh) * 2020-12-28 2022-07-01 深圳Tcl新技术有限公司 离线密码的获取方法、计算机可读存储介质及终端设备
CN114172724A (zh) * 2021-12-07 2022-03-11 深圳供电局有限公司 一种基于低成本物联网智能设备的双重加密方法及***
CN114255533B (zh) * 2022-01-28 2024-04-16 无锡融卡科技有限公司 智能锁***及其实现方法
CN115766281B (zh) * 2022-12-09 2023-07-18 北京深盾科技股份有限公司 防重放攻击方法、***、电子设备及存储介质

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120213362A1 (en) * 2009-09-17 2012-08-23 Phoniro Ab Distribution Of Lock Access Data For Electromechanical Locks In An Access Control System
CN104660719A (zh) * 2015-03-20 2015-05-27 云丁网络技术(北京)有限公司 一种电子锁***及其智能化管理实现方法
CN104778773A (zh) * 2015-04-16 2015-07-15 绿锌网络科技(上海)有限公司 利用手机实现的门禁控制***与控制方法
CN104952128A (zh) * 2015-05-20 2015-09-30 范浪波 一种基于智能手持终端的电子解锁***及其解锁方法
CN204904392U (zh) * 2015-07-07 2015-12-23 程国庆 云端加密智能门锁***
CN105184931A (zh) * 2015-09-30 2015-12-23 上海艾迅士建筑科技有限公司 一种基于蓝牙的开锁方法、***、手持终端以及电子锁
CN105279832A (zh) * 2015-12-01 2016-01-27 北京卡多宝信息技术有限公司 智能门锁***及其控制方法
WO2016023558A1 (en) * 2014-08-14 2016-02-18 Poly-Care Aps Method for operating a door lock by encrypted wireless signals
CN105871874A (zh) * 2016-04-27 2016-08-17 武汉市国扬科技有限公司 一种移动互联网虚拟钥匙授权***及其硬件门锁控制方法
WO2016204446A1 (ko) * 2015-06-15 2016-12-22 김범수 전자 키를 이용한 전자식 잠금장치 이중 인증 시스템
CN106898065A (zh) * 2017-01-21 2017-06-27 云丁网络技术(北京)有限公司 一种智能门锁的开锁方法

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0688491B1 (en) * 1993-03-05 2003-08-06 Medeco Security Locks, Inc. Electronic security system with novel electronic t-handle lock
IL209793A0 (en) * 2010-12-06 2011-07-31 Robert Moskovitch A method for authentication and verification of user identity
EP2500872A1 (fr) * 2011-03-08 2012-09-19 Openways Sas Procédé sécurisé de commande d'ouverture de dispositifs de serrure par un objet communicant de type téléphone portable
CN202815965U (zh) * 2012-07-23 2013-03-20 概念家(中国)有限公司 一种网络远程客房入住控制***
CN103793960B (zh) * 2012-10-31 2016-12-21 株式会社易保 用于移动钥匙服务的方法
CN103700177A (zh) * 2013-12-25 2014-04-02 袁磊 使用加密授权数据在特定时间段开锁的密码锁***
CN103955975A (zh) * 2014-04-22 2014-07-30 广州闪购软件服务有限公司 基于手机的动态二维码门禁***
CN104157029B (zh) * 2014-05-12 2017-08-08 惠州Tcl移动通信有限公司 基于移动终端的门禁***控制方法、控制***及移动终端
CN103955982A (zh) * 2014-05-22 2014-07-30 国家电网公司 一种随时间变化的动态二维码门禁识别方法及装置
CN104008588B (zh) * 2014-06-09 2017-02-22 温州众合拉链有限公司 一种基于可见光通信的智能光控钥匙
US9996999B2 (en) * 2014-07-30 2018-06-12 Master Lock Company Llc Location tracking for locking device
CN104217478B (zh) * 2014-08-13 2016-06-08 重庆特斯联智慧科技股份有限公司 酒店蓝牙门禁智能管理方法
CN105488870A (zh) * 2014-09-18 2016-04-13 腾讯科技(深圳)有限公司 一种门禁控制方法、装置、终端及控制服务器
CN104484917B (zh) * 2014-11-17 2017-02-22 郭晖华 一种保险箱出租***
GB2536044A (en) * 2015-03-05 2016-09-07 Bell Identification Bv Method and apparatus for authenticating and processing secure transactions using a mobile device
US10439813B2 (en) * 2015-04-02 2019-10-08 Visa International Service Association Authentication and fraud prevention architecture
CN105139491B (zh) * 2015-08-10 2017-11-28 闻泰通讯股份有限公司 一种基于加密型二维码的手机门禁***
CN105321240B (zh) * 2015-11-04 2018-02-16 北京果加智能科技有限公司 智能门锁的控制方法和装置及智能门控***
CN105608779A (zh) * 2016-03-02 2016-05-25 广西师范大学 一种电子密码锁***
CN105931485B (zh) * 2016-04-15 2018-04-03 重庆金瓯科技发展有限责任公司 一种共享车位预约使用服务***
CN105788050A (zh) * 2016-04-28 2016-07-20 物联网络科技(深圳)有限公司 一种通过蓝牙信号控制的控制门锁适配器及其控制方法
CN106340104B (zh) * 2016-08-31 2018-08-03 谢志豪 一种密码锁、密码锁控制***及方法

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120213362A1 (en) * 2009-09-17 2012-08-23 Phoniro Ab Distribution Of Lock Access Data For Electromechanical Locks In An Access Control System
WO2016023558A1 (en) * 2014-08-14 2016-02-18 Poly-Care Aps Method for operating a door lock by encrypted wireless signals
CN104660719A (zh) * 2015-03-20 2015-05-27 云丁网络技术(北京)有限公司 一种电子锁***及其智能化管理实现方法
CN104778773A (zh) * 2015-04-16 2015-07-15 绿锌网络科技(上海)有限公司 利用手机实现的门禁控制***与控制方法
CN104952128A (zh) * 2015-05-20 2015-09-30 范浪波 一种基于智能手持终端的电子解锁***及其解锁方法
WO2016204446A1 (ko) * 2015-06-15 2016-12-22 김범수 전자 키를 이용한 전자식 잠금장치 이중 인증 시스템
CN204904392U (zh) * 2015-07-07 2015-12-23 程国庆 云端加密智能门锁***
CN105184931A (zh) * 2015-09-30 2015-12-23 上海艾迅士建筑科技有限公司 一种基于蓝牙的开锁方法、***、手持终端以及电子锁
CN105279832A (zh) * 2015-12-01 2016-01-27 北京卡多宝信息技术有限公司 智能门锁***及其控制方法
CN105871874A (zh) * 2016-04-27 2016-08-17 武汉市国扬科技有限公司 一种移动互联网虚拟钥匙授权***及其硬件门锁控制方法
CN106898065A (zh) * 2017-01-21 2017-06-27 云丁网络技术(北京)有限公司 一种智能门锁的开锁方法

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111815817A (zh) * 2020-06-22 2020-10-23 北京智辉空间科技有限责任公司 一种门禁安全控制方法和***
CN112233287A (zh) * 2020-10-19 2021-01-15 北京安恒利通科技股份公司 一种智能锁自动开启方法和智能锁***
CN112233287B (zh) * 2020-10-19 2023-01-24 北京安恒利通科技股份公司 一种智能锁自动开启方法和智能锁***
CN113611014A (zh) * 2021-07-08 2021-11-05 国家电网有限公司技术学院分公司 一种基于区块链的五防锁具管理方法
CN113611014B (zh) * 2021-07-08 2023-07-21 国家电网有限公司技术学院分公司 一种基于区块链的五防锁具管理方法
CN113593090A (zh) * 2021-07-30 2021-11-02 国家电网有限公司技术学院分公司 一种基于区块链的变电站五防蓝牙锁具***
CN113593090B (zh) * 2021-07-30 2023-07-18 国家电网有限公司技术学院分公司 一种基于区块链的变电站五防蓝牙锁具***

Also Published As

Publication number Publication date
CN110462691A (zh) 2019-11-15
CN106898065A (zh) 2017-06-27
CN106898065B (zh) 2020-01-17
US20190362574A1 (en) 2019-11-28
US11335144B2 (en) 2022-05-17

Similar Documents

Publication Publication Date Title
WO2018133832A1 (zh) 智能门锁的开锁方法、移动终端、智能门锁及云服务器
US11070364B2 (en) Secure communication method and smart lock system based thereof
US11818681B2 (en) Methods and architectures for secure ranging
CN110177354B (zh) 一种车辆的无线控制方法及***
EP3529965B1 (en) System and method for configuring a wireless device for wireless network access
CN111028397B (zh) 认证方法及装置、车辆控制方法及装置
CN110365484B (zh) 一种设备认证的数据处理方法、装置及***
CN104168267B (zh) 一种接入sip安防视频监控***的身份认证方法
CN109618334B (zh) 控制方法及相关设备
KR20090061915A (ko) 일회용 패스워드를 이용한 신뢰성 있는 통신 시스템 및방법
WO2014114191A1 (zh) 一种智能卡安全通讯的方法
CN101877702A (zh) 一种交互式网络电视客户端激活认证的方法和***
CN107154847A (zh) 面向离线环境的密码生成方法、验证方法及其智能设备
KR101481403B1 (ko) 차량용 데이터의 인증 및 획득 방법
CN104836784A (zh) 一种信息处理方法、客户端和服务器
CN116506854A (zh) 一种北斗短报文的加密通信***和方法
CN109547303B (zh) 控制方法及相关设备
CN112425116B (zh) 智能门锁无线通信方法、智能门锁、网关及通信设备
CN111740985A (zh) 一种tcp长连接安全验证加密方法
US20240054836A1 (en) Physical access control system with secure relay
CN114221822A (zh) 配网方法、网关设备以及计算机可读存储介质
CN112184960A (zh) 一种智能锁控制方法、装置、智能锁、***和存储介质
CN114500007B (zh) M-LAG***中的MACsec的实现方法、装置、介质及设备
CN111478774B (zh) 一种基于语音鉴别的密钥授权方法及***
CN108566365A (zh) 一种基于声波技术的智能门锁开启方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18741818

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18741818

Country of ref document: EP

Kind code of ref document: A1