Intelligent lock authentication method, security chip, intelligent lock and management system thereof

An authentication method and technology of a security chip, applied in the security field, can solve the problems of unused lock authorization codes, potential security risks, high power consumption, etc., and achieve the effect of improving data security performance, improving security strength, and preventing malicious modification.

Active Publication Date: 2021-04-02
BEIJING SMARTCHIP MICROELECTRONICS TECH COMPANY +3
View PDF9 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing technology of smart locks has great security risks:
[0003]1. There is an illegal modification of the attribute information of the smart lock;
[0004]2. Unauthorized electronic keys illegally obtain the authorization information of other keys to unlock the lock;
[0005]3. When the lock unlocking data is interacted, the lock authorization code is not protected and authorized by hardware encryption algorithm
[0006]The code and algorithm are easily cracked and leaked by the manufacturer's developers;
[0007]4. When it is necessary to strictly control the number of unlocking times, there is no protection authentication mechanism for the number of unlocking times, and there is a problem of multiple use of one authorization information
[0008]5. The lock unlock authentication transaction is complicated and the power consumption is huge

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent lock authentication method, security chip, intelligent lock and management system thereof
  • Intelligent lock authentication method, security chip, intelligent lock and management system thereof
  • Intelligent lock authentication method, security chip, intelligent lock and management system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The specific implementation manners of the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific implementation manners described here are only used to illustrate and explain the implementation manners of the present invention, and are not intended to limit the implementation manners of the present invention.

[0043] figure 1 It is a schematic diagram of the steps of the smart lock authentication method in an embodiment of the present invention, as figure 1 Shown, a kind of intelligent lock authentication method, described authentication method comprises:

[0044] S01. Analyze the obtained unlocking authentication data, which includes command codes and ciphertext parts; in this embodiment, according to different scenarios such as whether it is necessary to strictly control the number of unlocking times, different authority data organization methods are set, and di...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention relates to the technical field of safety, in particular to an intelligent lock authentication method, a safety chip, an intelligent lock and a management system thereof. The intelligent lock authentication method comprises the following steps: analyzing acquired unlocking authentication data, wherein the unlocking authentication data comprises a command code and a ciphertext part; determining a decryption key and an authentication rule of the ciphertext part based on the command code, wherein the decryption key and the encryption key of the ciphertext part are in a symmetric relationship or a dispersed relationship; decrypting the ciphertext part based on the determined decryption key to obtain an unlocking parameter; and authenticating the unlocking parameter based on the determined authentication rule. Meanwhile, the invention further provides a corresponding safety chip, an intelligent lock and a management system of the intelligent lock. According tothe embodiment provided by the invention, the data security of the security chip and the intelligent lock can be improved.

Description

technical field [0001] The invention relates to the field of security technology, in particular to an intelligent lock authentication method, a security chip, an intelligent lock and an intelligent lock management system. Background technique [0002] Under the background of smart cities and the construction of the Internet of Things, the application of electronic smart locks has become popular. At present, most of the common smart locks on the market lack security protection mechanisms, or the security mechanisms are relatively weak. The existing technology of smart locks has great security risks: [0003] 1. There is a problem of illegal modification of the attribute information of the smart lock; [0004] 2. Unauthorized electronic keys illegally obtain the authorization information of other keys to unlock the lock; [0005] 3. When the lock unlocking data is interacted, the lock authorization code is not protected and authorized by the hardware encryption algorithm ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00H04L9/32
CPCG07C9/00174H04L9/3226
Inventor 薛斌斌卢玉华刘国营杨科闻王辉王文赫侯占斌王铮张谦杜君苏斓
Owner BEIJING SMARTCHIP MICROELECTRONICS TECH COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products