Cloud intelligent lock system based on multiple encryption mode and secret key management method

A multiple encryption and smart lock technology, applied in the field of smart locks, can solve the problems of single encryption processing content, low security, inconvenient management, etc., and achieve the effect of facilitating personnel and safety management, ensuring safety, and facilitating centralized management

Pending Publication Date: 2019-03-08
HANGZHOU GOGENIUS TECH
View PDF5 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] There are many types of smart locks currently on the market. In addition to common passwords, fingerprints, ordinary IC cards, and ID cards, there are also wireless door opening methods such as zigbee, wifi, and Bluetooth. However, these smart locks still have the following problems. Password, Fingerprints are entered by the front-end, and passwords and fingerprint information are stored locally. After information is entered, it is easy to lose and inconvenient to manage, and there are risks at the same time; the traditional IC card or ID card lacks an encryption mechanism, which makes it easy to be copied and has low security; wifi, Bluetooth or zigbee networking needs to add additional devices such as relay gateways, and there is a security risk of being cracked; the above-mentioned smart locks that open the door lack security encryption mechanisms. Although software and hardware communication encryption are also used, the data encryption method is single or The encryption processing content is single, and these smart lock devices exist independently, so it is impossible to network the smart locks, especially in the fields of public rental housing or serviced apartments, it is impossible to realize centralized management of smart locks and data information cannot be classified and controlled

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud intelligent lock system based on multiple encryption mode and secret key management method
  • Cloud intelligent lock system based on multiple encryption mode and secret key management method
  • Cloud intelligent lock system based on multiple encryption mode and secret key management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0036] Such as figure 1 As shown, the present invention combines the smart lock and the smart lock management platform together, so that the smart lock cloud management platform directly controls each smart lock and realizes networking; the key dispersion algorithm is used to disperse the corresponding root key to form a lock-one-key key, one card one key, one bluetooth one key and fingerprint key to ensure different encryption keys for different door opening ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a cloud intelligent lock system based on a multiple encryption mode and a secret key management method. The cloud intelligent lock system comprises an intelligent lock, a cloud management platform and a client, the intelligent lock is registered to the cloud management platform by adopting networking authentication registration through a NB-IOT (Narrow Band-Internet of Things) network, the client binds the authority information of fingerprints, an entrance guard card and bluetooth of a user in a matched mode according to the identity information of the user, the authority information is enabled to generate ciphertext to be sent to the corresponding intelligent lock through communication secret keys of the intelligent lock and an encryption algorithm, and the cloudmanagement platform adopts a secret key dispersing algorithm to disperse corresponding Managekeys so as to form modes of one lock to one secret key, one card to one secret key and one bluetooth to onesecret key. According to the cloud intelligent lock system based on a multiple encryption mode and the secret key management method, the intelligent lock is registered to the cloud management platform by adopting a networking authentication mode, so that networking of intelligent lock equipment is realized, centralized management is facilitated, particularly for hotels and public renting housings, personnel and safety management is facilitated, different encryption secret keys for different door opening modes and different encryption secret keys for the same door opening mode are adopted, andtherefore the safety is fully guaranteed.

Description

[0001] Technical field: The present invention relates to the technical field of smart locks, in particular to a cloud smart lock system and key management method based on multiple encryption modes. Background technique [0002] There are many types of smart locks currently on the market. In addition to common passwords, fingerprints, ordinary IC cards, and ID cards, there are also wireless door opening methods such as zigbee, wifi, and Bluetooth. However, these smart locks still have the following problems. Password, Fingerprints are entered by the front-end, and passwords and fingerprint information are stored locally. After information is entered, it is easy to lose and inconvenient to manage, and there are risks at the same time; the traditional IC card or ID card lacks an encryption mechanism, which makes it easy to be copied and has low security; wifi, Bluetooth or zigbee networking needs to add additional devices such as relay gateways, and there is a security risk of bei...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00H04L29/06H04L29/08
CPCH04L63/06H04L67/12G07C9/00174G07C9/00563G07C9/00571
Inventor 陈水明范孜文王成周丹丹
Owner HANGZHOU GOGENIUS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products