技术领域technical field
本发明属于智能锁控制技术领域,具体涉及一种控制门锁的方法、装置及电子设备。The invention belongs to the technical field of intelligent lock control, and in particular relates to a method, device and electronic equipment for controlling a door lock.
背景技术Background technique
目前门锁开门使用指纹等方式进行开门,极少使用蓝牙方式进行开门。在现存的蓝牙开门方案中,一般都是以探测是否有靠近门锁的蓝牙设备,门锁接收到蓝牙广播,对接收到的蓝牙广播进行蓝牙MAC地址对比,核对成功即可开门;现有蓝牙方式开门存在着不足,一方面门锁一直处于接收信号状态,未进行休眠,会增加电子门锁的额外功耗,如门锁的电池容量较小的话,续航时间不足;另一方面在身份核验时,未使用安全芯片及安全算法,安全性不高;由此,现有蓝牙方式开门存在着功耗高且安全性低的问题。At present, door locks use fingerprints to open the door, and Bluetooth is rarely used to open the door. In the existing bluetooth door opening scheme, it is generally to detect whether there is a bluetooth device close to the door lock, the door lock receives the bluetooth broadcast, compares the received bluetooth broadcast with the bluetooth MAC address, and the door can be opened after the verification is successful; the existing bluetooth There are deficiencies in opening the door in this way. On the one hand, the door lock is always in the state of receiving signals and does not go to sleep, which will increase the extra power consumption of the electronic door lock. If the battery capacity of the door lock is small, the battery life is insufficient; At the same time, the security chip and security algorithm are not used, and the security is not high; thus, the existing Bluetooth way to open the door has the problems of high power consumption and low security.
发明内容Contents of the invention
为此,本发明提供了一种控制门锁的方法、装置及电子设备,以解决现有蓝牙方式开门存在着功耗高且安全性低的问题。Therefore, the present invention provides a method, device and electronic equipment for controlling a door lock, so as to solve the problems of high power consumption and low security in the existing bluetooth way of opening the door.
为实现以上目的,本发明采用如下技术方案:To achieve the above object, the present invention adopts the following technical solutions:
第一方面,本发明提供了一种控制门锁的方法,应用于门锁,所述方法包括:In a first aspect, the present invention provides a method for controlling a door lock, which is applied to a door lock, and the method includes:
当接收到触碰信号时,开启蓝牙模块;When a touch signal is received, turn on the Bluetooth module;
通过所述蓝牙模块获取蓝牙设备的第一MAC地址;所述蓝牙设备为7芯卡蓝牙芯片;Obtain the first MAC address of the Bluetooth device through the Bluetooth module; the Bluetooth device is a 7-core card Bluetooth chip;
若存在所述第一MAC地址与第二MAC地址相同,则将所述门锁的蓝牙模块与所述第一MAC地址对应的所述蓝牙设备连接,所述第二MAC地址为所述门锁保存在白名单中的MAC地址;If the first MAC address is the same as the second MAC address, the Bluetooth module of the door lock is connected to the Bluetooth device corresponding to the first MAC address, and the second MAC address is the same as the door lock. MAC addresses saved in the whitelist;
通过所述蓝牙模块接收所述蓝牙设备发送的开门指令和第一身份认证信息;receiving the door opening instruction and the first identity authentication information sent by the Bluetooth device through the Bluetooth module;
根据预设密钥得到第二身份认证信息,所述预设密钥与所述第二MAC地址唯一对应;obtaining second identity authentication information according to a preset key, the preset key uniquely corresponding to the second MAC address;
若所述第一身份认证信息与第二身份认证信息相同则执行开锁指令。If the first identity authentication information is the same as the second identity authentication information, an unlock instruction is executed.
进一步地,所述通过所述蓝牙模块接收所述蓝牙设备发送的开门指令和第一身份认证信息之前,包括:Further, before receiving the door opening instruction and the first identity authentication information sent by the Bluetooth device through the Bluetooth module, it includes:
随机生成N个字节长度的随机数发送给所述蓝牙设备;Randomly generate a random number with a length of N bytes and send it to the Bluetooth device;
通过所述蓝牙设备将所述预设密钥与所述随机数合并后得到第一过程数据;所述预设密钥长度设置为M个字节长度;The first process data is obtained after combining the preset key and the random number through the Bluetooth device; the length of the preset key is set to M bytes in length;
通过所述蓝牙设备将所述第一过程数据的首位向后P个字节长度数据拼接末位向前P个字节长度数据后得到第二过程数据,将第二过程数据进行按位异或运算得到第一按位异或值;其中,P<M+N;By the Bluetooth device, the first process data of the first process data is spliced backward with P byte length data and the last bit is forward with P byte length data to obtain the second process data, and the second process data is bitwise XORed The operation obtains the first bitwise XOR value; wherein, P<M+N;
通过所述蓝牙设备将所述第一按位异或值与所述第一按位异或值取反后的值拼接得到所述第一身份认证信息。The first identity authentication information is obtained by splicing the first bitwise XOR value and the inverse value of the first bitwise XOR value by the Bluetooth device.
进一步地,所述通过所述蓝牙模块获取所述蓝牙设备的第一MAC地址之前,包括:Further, before obtaining the first MAC address of the Bluetooth device through the Bluetooth module, it includes:
所述蓝牙设备为SIM卡,所述SIM卡设置在用户手机内,以便通过手机对所述蓝牙装置供电,及通过所述手机控制所述蓝牙装置向所述门锁发送所述开锁指令。The bluetooth device is a SIM card, and the SIM card is set in the mobile phone of the user so as to supply power to the bluetooth device through the mobile phone, and to control the bluetooth device to send the unlock command to the door lock through the mobile phone.
进一步地,所述方法还包括:Further, the method also includes:
接收并保存服务器后台发送的白名单和预设密钥。Receive and save the whitelist and preset key sent by the server background.
进一步地,所述门锁包括预设按钮和触摸显示装置,所述方法还包括:Further, the door lock includes a preset button and a touch display device, and the method further includes:
当接收到预设按钮被按压的信号时,搜索预设距离内蓝牙设备并将搜索到的蓝牙设备显示到所述触摸显示装置上;When receiving a signal that a preset button is pressed, search for Bluetooth devices within a preset distance and display the searched Bluetooth devices on the touch display device;
响应用户在所述触摸显示装置上的选择指令,所述选择指令包括用户确定的目标蓝牙设备;Responding to a user's selection instruction on the touch display device, the selection instruction includes a target Bluetooth device determined by the user;
将所述目标蓝牙设备的MAC地址添加到白名单中。Add the MAC address of the target Bluetooth device to the whitelist.
进一步地,所述将所述目标蓝牙设备的MAC地址添加到白名单中之后,包括:Further, after adding the MAC address of the target Bluetooth device to the white list, it includes:
通过所述蓝牙模块与所述蓝牙设备连接并发送预设密钥。Connect with the bluetooth device through the bluetooth module and send a preset key.
进一步地,所述根据预设密钥得到第二身份认证信息,包括:Further, said obtaining the second identity authentication information according to the preset key includes:
将所述预设密钥与所述随机数合并后得到第三过程数据;所述预设密钥的长度设置为M个字节长度;The third process data is obtained after combining the preset key and the random number; the length of the preset key is set to M bytes in length;
将所述第三过程数据的首位向后P个字节长度数据拼接末位向前P个字节长度数据后得到第四过程数据,将第四过程数据进行按位异或运算得到第二按位异或值;其中,P<M+N;The fourth process data is obtained by splicing the first digit backward P bytes length data of the third process data and the last digit forward P bytes length data, and performing a bitwise XOR operation on the fourth process data to obtain the second Bit XOR value; among them, P<M+N;
将所述第二按位异或值与所述第二按位异或值取反后的值拼接得到所述第二身份认证信息。The second identity authentication information is obtained by splicing the second bitwise XOR value and a value obtained by inverting the second bitwise XOR value.
第二方面,本发明提供了一种控制门锁的装置,包括:In a second aspect, the present invention provides a device for controlling a door lock, comprising:
感应模块,用于当接收到触碰信号时,开启蓝牙模块;The sensing module is used to turn on the bluetooth module when a touch signal is received;
蓝牙连接模块,用于通过所述蓝牙模块获取蓝牙设备的第一MAC地址;所述蓝牙设备为7芯卡蓝牙芯片;存在所述第一MAC地址与第二MAC地址相同,则将所述门锁的蓝牙模块与所述第一MAC地址对应的所述蓝牙设备连接,所述第二MAC地址为所述门锁保存在白名单中的MAC地址;The Bluetooth connection module is used to obtain the first MAC address of the Bluetooth device through the Bluetooth module; the Bluetooth device is a 7-core card Bluetooth chip; if the first MAC address is the same as the second MAC address, the door The Bluetooth module of the lock is connected to the Bluetooth device corresponding to the first MAC address, and the second MAC address is the MAC address stored in the white list of the door lock;
认证开锁模块,用于通过所述蓝牙模块接收所述蓝牙设备发送的开门指令和第一身份认证信息;根据预设密钥得到第二身份认证信息,所述预设密钥与所述第二MAC地址唯一对应;若所述第一身份认证信息与第二身份认证信息相同则执行开锁指令。The authentication and unlocking module is used to receive the door opening instruction and the first identity authentication information sent by the bluetooth device through the bluetooth module; obtain the second identity authentication information according to the preset key, the preset key and the second The MAC address is uniquely corresponding; if the first identity authentication information is the same as the second identity authentication information, an unlock instruction is executed.
第三方面,本发明提供了一种电子设备,包括:In a third aspect, the present invention provides an electronic device, comprising:
至少一个处理器;以及at least one processor; and
与所述至少一个处理器通信连接的存储器;其中,a memory communicatively coupled to the at least one processor; wherein,
所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够执行上述任一所述控制门锁的方法。The memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor, so that the at least one processor can execute any one of the methods for controlling door locks described above.
第四方面,本发明提供了一种门锁,应用上述任一所述控制门锁的方法。In a fourth aspect, the present invention provides a door lock using any one of the methods for controlling the door lock described above.
本发明采用以上技术方案,至少具备以下有益效果:The present invention adopts the above technical solutions, and at least has the following beneficial effects:
提供了一种控制门锁的方法、装置及电子设备,通过触碰感应区来激活门锁的蓝牙模块,才会搜索并配对周围蓝牙设备,减少了用于蓝牙的功耗;采用了外置独立蓝牙装置,蓝牙装置与门锁间控制指令均通过加密,通过身份认证后门锁才会执行开锁指令,提高了蓝牙开门的安全性。A method, device and electronic equipment for controlling a door lock are provided. The Bluetooth module of the door lock is activated by touching the sensing area, and then the surrounding Bluetooth devices are searched and paired, which reduces the power consumption for Bluetooth; an external Independent Bluetooth device, the control commands between the Bluetooth device and the door lock are encrypted, and the door lock will execute the unlock command only after the identity authentication is passed, which improves the security of Bluetooth door opening.
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本发明。It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention.
附图说明Description of drawings
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions in the embodiments of the present invention or the prior art, the following will briefly introduce the drawings that need to be used in the description of the embodiments or the prior art. Obviously, the accompanying drawings in the following description are only These are some embodiments of the present invention. Those skilled in the art can also obtain other drawings based on these drawings without creative work.
图1是本发明一示例性实施例示出的一种控制门锁的方法的流程图;Fig. 1 is a flow chart of a method for controlling a door lock shown in an exemplary embodiment of the present invention;
图2是本发明另一示例性实施例示出的一种控制门锁的方法的流程图;Fig. 2 is a flowchart of a method for controlling a door lock shown in another exemplary embodiment of the present invention;
图3是本发明一示例性实施例示出的一种控制门锁的装置的示意框图;Fig. 3 is a schematic block diagram of a device for controlling a door lock shown in an exemplary embodiment of the present invention;
图4是本发明一示例性实施例示出的一种电子设备的示意框图;Fig. 4 is a schematic block diagram of an electronic device shown in an exemplary embodiment of the present invention;
下面结合附图和具体实施方式对本发明作进一步的说明。The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.
具体实施方式Detailed ways
为使本发明的目的、技术方案和优点更加清楚,下面将对本发明的技术方案进行详细的描述。显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动的前提下所得到的所有其它实施方式,都属于本发明所保护的范围。In order to make the purpose, technical solution and advantages of the present invention clearer, the technical solution of the present invention will be described in detail below. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other implementations obtained by persons of ordinary skill in the art without making creative efforts fall within the protection scope of the present invention.
现有蓝牙无感开门,门锁接收到蓝牙广播,对接收到的蓝牙广播进行蓝牙mac地址对比,核对成功即可开门,在此过程中门锁一直处于接收信号状态,未进行休眠,如门锁的电池容量较小的话,存在续航时间不足的问题;现有蓝牙无感开门直接使用蓝牙MAC地址进行白名单比对,未做传输加密和进一步的身份验证等措施,存在安全性低的问题。The existing Bluetooth sensorless door opening, the door lock receives the Bluetooth broadcast, compares the received Bluetooth broadcast with the Bluetooth mac address, and the door can be opened after the verification is successful. If the battery capacity of the lock is small, there is a problem of insufficient battery life; the existing Bluetooth non-sensing door directly uses the Bluetooth MAC address for whitelist comparison, without transmission encryption and further identity verification measures, there is a problem of low security .
本发明实施例,提供了一种控制门锁的方法、装置及电子设备,通过触碰感应区来激活门锁的蓝牙模块,才会搜索并配对周围蓝牙设备,减少了用于蓝牙的功耗;采用了外置独立蓝牙装置,蓝牙设备为7芯卡蓝牙芯片,蓝牙装置与门锁间控制指令均通过加密,通过身份认证后门锁才会执行开锁指令,提高了蓝牙开门的安全性。Embodiments of the present invention provide a method, device and electronic equipment for controlling a door lock. Only by touching the sensing area to activate the Bluetooth module of the door lock can search and pair with surrounding Bluetooth devices, reducing the power consumption for Bluetooth The external independent Bluetooth device is adopted, and the Bluetooth device is a 7-core card Bluetooth chip. The control commands between the Bluetooth device and the door lock are encrypted.
下面通过具体地实施例对本发明中实时推送消息的方法进行说明。The method for pushing messages in real time in the present invention will be described below through specific embodiments.
请参阅图1,图1是本发明一示例性实施例示出的一种控制门锁的方法的流程图,参见图1,该方法包括:Please refer to FIG. 1. FIG. 1 is a flowchart of a method for controlling a door lock shown in an exemplary embodiment of the present invention. Referring to FIG. 1, the method includes:
步骤S11、当接收到触碰信号时,开启蓝牙模块;Step S11, when a touch signal is received, turn on the Bluetooth module;
步骤S12、通过蓝牙模块获取蓝牙设备的第一MAC地址;Step S12, obtaining the first MAC address of the Bluetooth device through the Bluetooth module;
步骤S13、若存在第一MAC地址与第二MAC地址相同,则将门锁的蓝牙模块与第一MAC地址对应的蓝牙设备连接,第二MAC地址为门锁保存在白名单中的MAC地址;Step S13, if the first MAC address is the same as the second MAC address, connect the Bluetooth module of the door lock to the Bluetooth device corresponding to the first MAC address, and the second MAC address is the MAC address stored in the white list of the door lock;
步骤S14、通过蓝牙模块接收蓝牙设备发送的开门指令和第一身份认证信息;Step S14, receiving the door opening instruction and the first identity authentication information sent by the Bluetooth device through the Bluetooth module;
步骤S15、根据预设密钥得到第二身份认证信息,预设密钥与第二MAC地址唯一对应;Step S15, obtaining the second identity authentication information according to the preset key, which uniquely corresponds to the second MAC address;
步骤S16、若第一身份认证信息与第二身份认证信息相同则执行开锁指令。Step S16, if the first identity authentication information is the same as the second identity authentication information, execute the unlock instruction.
需要说明的是,本实施例提供的技术方案在具体实践中可以适用的场景包括但不限于:蓝牙门锁、蓝牙柜锁、蓝牙天窗以及需要蓝牙控制无感开关的其他场景。It should be noted that the technical solution provided by this embodiment can be applied to scenarios including but not limited to: Bluetooth door locks, Bluetooth cabinet locks, Bluetooth sunroofs, and other scenarios that require Bluetooth-controlled non-inductive switches.
在具体实践中,蓝牙设备为7芯卡蓝牙芯片,蓝牙设备与门锁的蓝牙模块间采用数据加密传输,可以采用现有加密传输算法,例如,通过第三方服务提供的公钥私钥方式,对传输的数据进行加密解密。In practice, the Bluetooth device is a 7-core card Bluetooth chip, and the data encryption transmission is used between the Bluetooth device and the Bluetooth module of the door lock. The existing encryption transmission algorithm can be used, for example, through the public key private key method provided by a third-party service, Encrypt and decrypt the transmitted data.
可以理解的是,本实施例提供的技术方案,通过触碰感应区来激活门锁的蓝牙模块,才会搜索并配对周围蓝牙设备,减少了用于蓝牙的功耗;采用了外置独立蓝牙装置,蓝牙装置与门锁间控制指令均通过加密,通过身份认证后门锁才会执行开锁指令,提高了蓝牙开门的安全性。It can be understood that, in the technical solution provided by this embodiment, the Bluetooth module of the door lock is activated by touching the sensing area, and then the surrounding Bluetooth devices are searched and paired, which reduces the power consumption for Bluetooth; an external independent Bluetooth module is adopted device, the control commands between the Bluetooth device and the door lock are all encrypted, and the door lock will execute the unlock command only after the identity authentication is passed, which improves the security of Bluetooth door opening.
在具体实践中,步骤S11中“当接收到触碰信号时,开启蓝牙模块”包括:用户触碰门锁的感应区时,感应区向门锁的控制单元传递触碰信号,控制单元收到触碰信号后开启门锁的蓝牙模块。In practice, "turning on the Bluetooth module when a touch signal is received" in step S11 includes: when the user touches the sensing area of the door lock, the sensing area transmits a touch signal to the control unit of the door lock, and the control unit receives The Bluetooth module that opens the door lock after touching the signal.
需要说明的是,向门锁的控制单元传递触碰信号的操作也可以由感应按钮被按下触发,或以类似形式触发;当完成开锁指令或身份认证失败则门锁的蓝牙模块进入休眠状态,等待触发激活后才会再次启动。It should be noted that the operation of transmitting the touch signal to the control unit of the door lock can also be triggered by pressing the sensor button, or in a similar manner; when the unlock command is completed or the identity authentication fails, the Bluetooth module of the door lock enters a dormant state , wait for the trigger to activate before starting again.
可以理解的是,本实施例提供的技术方案,在门锁的控制单元接收到触碰信号才会开启蓝牙模块,在不用时,没有触发触碰信号,蓝牙模块不会产生额外的功耗,实现了减少门锁无用功耗的目的,进而提高了门锁的续航能力。It can be understood that, in the technical solution provided by this embodiment, the Bluetooth module will not be turned on until the control unit of the door lock receives a touch signal. When not in use, the touch signal is not triggered, and the Bluetooth module will not generate additional power consumption. The purpose of reducing the useless power consumption of the door lock is realized, thereby improving the battery life of the door lock.
在具体实践中,步骤S12中“通过蓝牙模块获取蓝牙设备的第一MAC地址”,包括:蓝牙模块开启后扫描并接收蓝牙设备的广播,从广播中得到蓝牙设备的MAC地址。In practice, "obtaining the first MAC address of the Bluetooth device through the Bluetooth module" in step S12 includes: scanning and receiving the broadcast of the Bluetooth device after the Bluetooth module is turned on, and obtaining the MAC address of the Bluetooth device from the broadcast.
需要说明的是,蓝牙设备为SIM卡样式的7芯卡蓝牙芯片,7芯卡蓝牙芯片设置在用户手机内,以便通过手机对7芯卡蓝牙芯片供电,7芯卡供电正常后,7芯卡蓝牙芯片会向外发送广播,以便配对门锁的蓝牙模块。It should be noted that the Bluetooth device is a 7-core card Bluetooth chip in the form of a SIM card. The Bluetooth chip will send a broadcast to the outside to pair with the Bluetooth module of the door lock.
可以理解的是,本实施例提供的技术方案,外置了独立的蓝牙设备与手机连接,可以通过手机控制蓝牙设备发送开锁指令,同时在蓝牙设备采用7芯卡蓝牙芯片,可以实现定制功能,以实现传输数据加密。It can be understood that, in the technical solution provided by this embodiment, an external independent Bluetooth device is connected to the mobile phone, and the mobile phone can control the Bluetooth device to send an unlock command. At the same time, the Bluetooth device uses a 7-pin card Bluetooth chip to realize the customization function. In order to realize the transmission data encryption.
在具体实践中,步骤S13中“若存在第一MAC地址与第二MAC地址相同,则将门锁的蓝牙模块与第一MAC地址对应的蓝牙设备连接”,包括:将获取到的蓝牙设备的MAC地址与保存在门锁的白名单中的MAC地址逐一比对,当比对到与蓝牙设备的MAC地址相同值时,停止比对操作,门锁白名单认证通过,蓝牙模块与蓝牙设备正常配对,建立连接。In practice, in step S13 "if the first MAC address is the same as the second MAC address, connect the Bluetooth module of the door lock to the Bluetooth device corresponding to the first MAC address", including: The address is compared with the MAC address stored in the white list of the door lock one by one. When the same value is compared with the MAC address of the Bluetooth device, the comparison operation is stopped, the white list of the door lock is authenticated, and the Bluetooth module and the Bluetooth device are paired normally. ,establish connection.
需要说明的是,用户可以通过门锁的服务器后台设置白名单和蓝牙设备的预设密钥,并同步更新到门锁中;或者,通过门锁上设置按钮,当门锁接收到按钮被按压的信号时,搜索预设距离内蓝牙设备并将搜索到的蓝牙设备显示到触摸显示装置上;响应用户在触摸显示装置上的选择指令,选择指令包括用户确定的目标蓝牙设备;将目标蓝牙设备的MAC地址添加到白名单中;通过蓝牙模块与蓝牙设备进行一次连接发送预设密钥;预设距离由蓝牙设备的蓝牙版本决定;预设密钥与蓝牙设备的MAC地址是唯一对应的,可以由服务器后台手动设置,或由门锁依据蓝牙设备的PIN值自动生成;蓝牙设备通过门锁白名单验证后,门锁才会控制蓝牙模块与蓝牙设备正常配对建立连接,为后续身份验证和接收开锁指令建立通信通道。It should be noted that the user can set the whitelist and the preset key of the Bluetooth device through the server background of the door lock, and update it to the door lock synchronously; or, through the setting button on the door lock, when the door lock receives the button is pressed When the signal is received, search for Bluetooth devices within a preset distance and display the searched Bluetooth devices on the touch display device; respond to the user's selection instruction on the touch display device, the selection instruction includes the target Bluetooth device determined by the user; display the target Bluetooth device The MAC address of the Bluetooth device is added to the white list; the preset key is sent through a connection between the Bluetooth module and the Bluetooth device; the preset distance is determined by the Bluetooth version of the Bluetooth device; the preset key is uniquely corresponding to the MAC address of the Bluetooth device. It can be manually set by the server background, or automatically generated by the door lock according to the PIN value of the Bluetooth device; after the Bluetooth device passes the white list verification of the door lock, the door lock will control the Bluetooth module to pair with the Bluetooth device to establish a connection normally, for subsequent identity verification and Receive the unlock command to establish a communication channel.
可以理解的是,本实施例提供的技术方案,门锁的白名单采用多种设置方式,可以满足不同的场景;蓝牙设备要经过白名单验证才会被允许与门锁的蓝牙模块连接,能有效避免门锁周围蓝牙设备太多轮询时间过长的问题。It can be understood that, in the technical solution provided by this embodiment, the white list of the door lock adopts multiple setting methods, which can meet different scenarios; the Bluetooth device is only allowed to connect with the Bluetooth module of the door lock after passing the white list verification, which can Effectively avoid the problem of too many Bluetooth devices around the door lock and too long polling time.
在具体实践中,步骤S14中“通过蓝牙模块接收蓝牙设备发送的开门指令和第一身份认证信息”之前,包括:In practice, before "receiving the door opening instruction and the first identity authentication information sent by the Bluetooth device through the Bluetooth module" in step S14, it includes:
门锁随机生成N个字节长度的随机数发送给蓝牙设备;The door lock randomly generates a random number with a length of N bytes and sends it to the Bluetooth device;
通过蓝牙设备将预设密钥与随机数合并后得到第一过程数据;预设密钥长度设置为M个字节长度;The first process data is obtained after combining the preset key and the random number through the Bluetooth device; the length of the preset key is set to M bytes in length;
通过蓝牙设备将第一过程数据的首位向后P个字节长度数据拼接末位向前P个字节长度数据后得到第二过程数据,将第二过程数据进行按位异或运算得到第一按位异或值;其中,P<M+N;Through the Bluetooth device, the first process data of the first process data is spliced backward with the length of P bytes and the last digit is forwarded with the length of P bytes to obtain the second process data, and the second process data is subjected to a bitwise XOR operation to obtain the first process data. Bitwise XOR value; among them, P<M+N;
通过蓝牙设备将第一按位异或值与第一按位异或值取反后的值拼接得到第一身份认证信息。The first identity authentication information is obtained by splicing the first bitwise XOR value and the inverse value of the first bitwise XOR value by the Bluetooth device.
需要说明的是,对独立外置的蓝牙设备中加入了加密算法,以实现将接收到的随机数结合唯一对应的预设密钥,生成身份验证信息。It should be noted that an encryption algorithm is added to the independent external Bluetooth device to realize the combination of the received random number and the unique corresponding preset key to generate identity verification information.
在具体实践中,步骤S15中“根据预设密钥得到第二身份认证信息”,包括:将预设密钥与随机数合并后得到第三过程数据;预设密钥的长度设置为M个字节长度;In practice, in step S15, "obtaining the second identity authentication information according to the preset key" includes: combining the preset key with the random number to obtain the third process data; the length of the preset key is set to M byte length;
将第三过程数据的首位向后P个字节长度数据拼接末位向前P个字节长度数据后得到第四过程数据,将第四过程数据进行按位异或运算得到第二按位异或值;其中,P<M+N;The fourth process data is obtained by splicing the first digit of the third process data to the backward P byte length data and the last digit to the forward P byte length data, and performing the bitwise XOR operation on the fourth process data to obtain the second bitwise XOR operation or value; where, P<M+N;
将第二按位异或值与第二按位异或值取反后的值拼接得到第二身份认证信息。The second identity authentication information is obtained by splicing the second bitwise XOR value and the inverse value of the second bitwise XOR value.
可以理解的是,本实施例提供的技术方案,采用了外置独立蓝牙装置,可以支持更多的定制化安全策略,蓝牙装置与门锁间的控制指令均通过加密,得到身份认证信息,通过身份认证信息认证通过后才会执行开锁指令,提高了蓝牙开门的安全性。It can be understood that the technical solution provided by this embodiment adopts an external independent Bluetooth device, which can support more customized security strategies. The control commands between the Bluetooth device and the door lock are all encrypted to obtain identity authentication information. The unlock command will be executed only after the authentication of the identity authentication information is passed, which improves the security of unlocking the door through Bluetooth.
请参阅图2,图2是本发明另一示例性实施例示出的一种控制门锁的方法的流程图,参见图2,该方法包括:Please refer to FIG. 2. FIG. 2 is a flowchart of a method for controlling a door lock according to another exemplary embodiment of the present invention. Referring to FIG. 2, the method includes:
步骤S21、触碰门锁激活蓝牙模块;Step S21, touch the door lock to activate the Bluetooth module;
步骤S22、通过蓝牙模块获取蓝牙设备MAC地址,并与白名单中MAC地址比对,若白名单中不存在蓝牙设备的MAC地址,则继续比对搜索到的另外蓝牙设备MAC地址;Step S22, obtain the MAC address of the Bluetooth device through the Bluetooth module, and compare it with the MAC address in the white list. If the MAC address of the Bluetooth device does not exist in the white list, continue to compare the MAC addresses of other Bluetooth devices found;
步骤S23、若白名单中存在蓝牙设备的MAC地址,向蓝牙设备发送随机数请求指令,蓝牙设备为7芯卡蓝牙芯片,接收7芯卡蓝牙芯片生成的随机数,以便建立与蓝牙设备的蓝牙连接;设置与蓝牙设备唯一对应的密钥,生成随机数,将随机数和密钥存储后发送给蓝牙设备;Step S23, if the MAC address of the bluetooth device exists in the white list, send a random number request command to the bluetooth device, the bluetooth device is a 7-core card bluetooth chip, and receives the random number generated by the 7-pin card bluetooth chip, so as to establish a bluetooth connection with the bluetooth device Connect; set the unique key corresponding to the Bluetooth device, generate a random number, store the random number and key and send it to the Bluetooth device;
步骤S24、蓝牙设备接收蓝牙模块发送的密钥和随机数,并等待用户的开锁指令,若接收到开锁指令,则基于加密算法,依据密钥和随机数生成第一身份认证信息,将第一身份认证信息和开锁指令发送到蓝牙模块;Step S24, the bluetooth device receives the key and the random number sent by the bluetooth module, and waits for the user's unlock command, if the unlock command is received, then based on the encryption algorithm, the first identity authentication information is generated according to the key and the random number, and the first Identity authentication information and unlock instructions are sent to the Bluetooth module;
步骤S25、蓝牙模块接收到第一身份认证信息和开锁指令后,基于加密算法,依据密钥和随机数生成第二身份认证信息,比较第一身份认证信息与第二身份认证信息是否相同,若相同则门锁执行开锁指令,并向蓝牙设备反馈开锁成功信息。Step S25, after the Bluetooth module receives the first identity authentication information and the unlock instruction, it generates the second identity authentication information based on the encryption algorithm, the key and the random number, and compares whether the first identity authentication information is the same as the second identity authentication information, if If they are the same, the door lock executes the unlock command and feeds back the unlock success information to the Bluetooth device.
需要说明的是,本实施例提供的技术方案在具体实践中可以适用的场景包括但不限于:蓝牙门锁、蓝牙柜锁、蓝牙天窗以及需要蓝牙控制无感开关的其他场景。It should be noted that the technical solution provided by this embodiment can be applied to scenarios including but not limited to: Bluetooth door locks, Bluetooth cabinet locks, Bluetooth sunroofs, and other scenarios that require Bluetooth-controlled non-inductive switches.
在具体实践中,蓝牙设备与门锁的蓝牙模块间采用数据加密传输,可以采用现有加密传输算法,例如,通过第三方服务提供的公钥私钥方式,对传输的数据进行加密解密。In practice, encrypted data transmission is used between the Bluetooth device and the Bluetooth module of the door lock. Existing encrypted transmission algorithms can be used, for example, to encrypt and decrypt the transmitted data through public and private keys provided by third-party services.
可以理解的是,本实施例提供的技术方案,通过触碰感应区来激活门锁的蓝牙模块,才会搜索并配对周围蓝牙设备,减少了用于蓝牙的功耗;采用了外置独立蓝牙装置,蓝牙装置与门锁间控制指令均通过加密,通过身份认证后门锁才会执行开锁指令,提高了蓝牙开门的安全性。It can be understood that, in the technical solution provided by this embodiment, the Bluetooth module of the door lock is activated by touching the sensing area, and then the surrounding Bluetooth devices are searched and paired, which reduces the power consumption for Bluetooth; an external independent Bluetooth module is adopted device, the control commands between the Bluetooth device and the door lock are all encrypted, and the door lock will execute the unlock command only after the identity authentication is passed, which improves the security of Bluetooth door opening.
在一个实施例中,包括:In one embodiment, including:
步骤S31、触碰门锁,激活门锁蓝牙模块;Step S31, touch the door lock to activate the Bluetooth module of the door lock;
步骤S32、通过门锁蓝牙模块扫描到白名单中MAC地址,并向该MAC地址对应的蓝牙芯片发送生成随机数指令;Step S32, scan the MAC address in the white list through the door lock Bluetooth module, and send a random number generation instruction to the Bluetooth chip corresponding to the MAC address;
步骤S33、蓝牙芯片生成N个自己长度的随机数,将随机数和蓝牙芯片PIN发送给门锁蓝牙模块;Step S33, the Bluetooth chip generates N random numbers of its own length, and sends the random number and the Bluetooth chip PIN to the door lock Bluetooth module;
步骤S34、门锁控制器根据接收到的蓝牙芯片PIN和随机数,生成过程密钥;Step S34, the door lock controller generates a process key according to the received Bluetooth chip PIN and random number;
步骤S35、门锁根据过程密钥对蓝牙芯片PIN加密后得到认证信息发送给蓝牙芯片;Step S35, the door lock encrypts the PIN of the Bluetooth chip according to the process key and sends the authentication information to the Bluetooth chip;
步骤S36、蓝牙芯片解密认证信息得到蓝牙芯片PIN,将认证成功信息返回给门锁;Step S36, the Bluetooth chip decrypts the authentication information to obtain the Bluetooth chip PIN, and returns the successful authentication information to the door lock;
步骤S37、门锁接到认证成功信息,启动高安全CPU身份认证,发送ISD选择指令到蓝牙芯片,同时生成随机数据并存储;Step S37, the door lock receives the authentication success message, starts the high-security CPU identity authentication, sends the ISD selection command to the Bluetooth chip, and generates random data and stores it at the same time;
步骤S38、门锁依据公钥将随机数据进行加密得到签名数据,并将签名数据发送给蓝牙芯片;Step S38, the door lock encrypts the random data according to the public key to obtain signature data, and sends the signature data to the Bluetooth chip;
步骤S39、蓝牙芯片依据私钥对签名数据进行解密得到随机数据,将随机数据发送给门锁;Step S39, the Bluetooth chip decrypts the signature data according to the private key to obtain random data, and sends the random data to the door lock;
步骤S40、门锁接收到随机数据并与本地存储的随即数据比较,若相同则执行开锁指令。Step S40, the door lock receives the random data and compares it with the random data stored locally, and if they are the same, executes the unlock command.
需要说明的是,本实施例提供的技术方案在具体实践中可以适用的场景包括但不限于:蓝牙门锁、蓝牙柜锁、蓝牙天窗以及需要蓝牙控制无感开关的其他场景。It should be noted that the technical solution provided by this embodiment can be applied to scenarios including but not limited to: Bluetooth door locks, Bluetooth cabinet locks, Bluetooth sunroofs, and other scenarios that require Bluetooth-controlled non-inductive switches.
在具体实践中,蓝牙芯片与门锁蓝牙模块间采用数据加密传输,采用了公钥加密私钥解密的方式,对传输的数据进行加密传输,门锁公钥和蓝牙芯片的私钥均在该方法前已经配置完成。In practice, the data encrypted transmission is adopted between the Bluetooth chip and the Bluetooth module of the door lock, and the method of public key encryption and private key decryption is used to encrypt and transmit the transmitted data. Both the public key of the door lock and the private key of the Bluetooth chip are in the The method has been configured before.
在具体实践中,步骤S34中“门锁控制器根据接收到的蓝牙芯片PIN和随机数,生成过程密钥”,包括:In practice, in step S34, "the door lock controller generates a process key according to the received Bluetooth chip PIN and random number", including:
将随机数和蓝牙芯片PIN合并得到第五过程数据,取过程数据前I个字节长度和后I个字节长度进行合并得到第六过程数据,对第六过程数据进行按位异或运算得到第七过程数据,第七过程数据合并第七过程数据取反后的值得到过程密钥;其中随机数的字节长度加蓝牙芯片PIN的字节长度大于I。Combine the random number and the Bluetooth chip PIN to obtain the fifth process data, take the length of the first I byte and the length of the last I byte of the process data and merge to obtain the sixth process data, and perform a bitwise XOR operation on the sixth process data to obtain The 7th process data, the 7th process data merges the value after the 7th process data is reversed and obtains the process key; Wherein the byte length of the random number plus the byte length of the bluetooth chip PIN is greater than 1.
在具体实践中,步骤S38中“门锁依据随机数据得到签名数据”,包括:In practice, in step S38, "the door lock obtains the signature data according to the random data", including:
取过程密钥对应第i个字节数据并对其求8的余数,得到的数据赋值给变量bits;取随机数据对应第i个字节数据,与过程密钥第i个字节数据进行按位异或运算得到按位异或运算值;将按位异或运算值取反左移bits个比特位得到第一变量值;将按位异或运算值右移8个比特位得到第二变量值;将第一变量值和第二变量值进行按位异或运算得到签名数据。Take the i-th byte data corresponding to the process key and calculate the remainder of 8, and assign the obtained data to the variable bits; take the random data corresponding to the i-th byte data, and press the i-th byte data with the process key The bitwise XOR operation is used to obtain the bitwise XOR operation value; the bitwise XOR operation value is reversed and shifted left by bits to obtain the first variable value; the bitwise XOR operation value is shifted right by 8 bits to obtain the second variable value; perform a bitwise XOR operation on the first variable value and the second variable value to obtain the signature data.
在具体实践中,步骤S39中“蓝牙芯片恢复签名数据得到随机数据”,是步骤S38中“门锁依据随机数据得到签名数据”的反向操作,可以得到随机数据。In practice, "the bluetooth chip restores the signature data to obtain random data" in step S39 is the reverse operation of "the door lock obtains signature data based on random data" in step S38, and random data can be obtained.
可以理解的是,本实施例提供的技术方案,通过触碰感应区来激活门锁的蓝牙模块,才会搜索并配对周围蓝牙设备,减少了用于蓝牙的功耗;采用了外置独立蓝牙装置,蓝牙装置与门锁间控制指令均通过加密,通过身份认证后门锁才会执行开锁指令,提高了蓝牙开门的安全性。It can be understood that, in the technical solution provided by this embodiment, the Bluetooth module of the door lock is activated by touching the sensing area, and then the surrounding Bluetooth devices are searched and paired, which reduces the power consumption for Bluetooth; an external independent Bluetooth module is adopted device, the control commands between the Bluetooth device and the door lock are all encrypted, and the door lock will execute the unlock command only after the identity authentication is passed, which improves the security of Bluetooth door opening.
请参阅图3,图3是本发明一示例性实施例示出的一种控制门锁的装置的示意框图,参见图3,控制门锁的装置100包括:Please refer to FIG. 3. FIG. 3 is a schematic block diagram of a device for controlling a door lock shown in an exemplary embodiment of the present invention. Referring to FIG. 3, the device 100 for controlling a door lock includes:
感应模块101,用于当接收到触碰信号时,开启蓝牙模块;The sensing module 101 is used to turn on the bluetooth module when a touch signal is received;
蓝牙连接模块102,用于通过蓝牙模块获取蓝牙设备的第一MAC地址;存在第一MAC地址与第二MAC地址相同,则将门锁的蓝牙模块与第一MAC地址对应的蓝牙设备连接,第二MAC地址为门锁保存在白名单中的MAC地址;Bluetooth connection module 102, is used for obtaining the first MAC address of bluetooth device by bluetooth module; Exists that first MAC address is identical with the second MAC address, then the bluetooth module of door lock is connected with the bluetooth device corresponding to the first MAC address, second The MAC address is the MAC address saved in the white list of the door lock;
认证开锁模块103,用于通过蓝牙模块接收蓝牙设备发送的开门指令和第一身份认证信息;根据预设密钥得到第二身份认证信息,预设密钥与第二MAC地址唯一对应;若第一身份认证信息与第二身份认证信息相同则执行开锁指令。The authentication and unlocking module 103 is used to receive the door opening instruction and the first identity authentication information sent by the bluetooth device through the bluetooth module; obtain the second identity authentication information according to the preset key, and the preset key is uniquely corresponding to the second MAC address; if the second If the first identity authentication information is the same as the second identity authentication information, the unlock instruction is executed.
需要说明的是,本实施例提供的装置,在具体实践中可以适用的场景包括但不限于:蓝牙门锁、蓝牙柜锁、蓝牙天窗以及需要蓝牙控制无感开关的其他场景。It should be noted that the device provided in this embodiment is applicable to scenarios including but not limited to: Bluetooth door locks, Bluetooth cabinet locks, Bluetooth sunroofs, and other scenarios that require Bluetooth-controlled non-inductive switches.
在具体实践中,蓝牙设备与门锁的蓝牙模块间采用数据加密传输,可以采用现有加密传输算法,例如,通过第三方服务提供的公钥私钥方式,对传输的数据进行加密解密。In practice, encrypted data transmission is used between the Bluetooth device and the Bluetooth module of the door lock. Existing encrypted transmission algorithms can be used, for example, to encrypt and decrypt the transmitted data through public and private keys provided by third-party services.
可以理解的是,本实施例提供的装置,通过触碰感应区来激活门锁的蓝牙模块,才会搜索并配对周围蓝牙设备,减少了用于蓝牙的功耗;采用了外置独立蓝牙装置,蓝牙装置与门锁间控制指令均通过加密,通过身份认证后门锁才会执行开锁指令,提高了蓝牙开门的安全性。It can be understood that the device provided in this embodiment only searches and pairs surrounding Bluetooth devices by activating the Bluetooth module of the door lock by touching the sensing area, which reduces the power consumption for Bluetooth; an external independent Bluetooth device is adopted , The control commands between the Bluetooth device and the door lock are encrypted, and the door lock will execute the unlock command only after the identity authentication is passed, which improves the security of Bluetooth door opening.
请参阅图4,图4是本发明一示例性实施例示出的一种电子设备的示意框图,参见图4,电子设备200包括:Please refer to FIG. 4. FIG. 4 is a schematic block diagram of an electronic device according to an exemplary embodiment of the present invention. Referring to FIG. 4, the electronic device 200 includes:
至少一个处理器202;以及at least one processor 202; and
与至少一个处理器202通信连接的存储器201;其中,A memory 201 communicatively connected to at least one processor 202; wherein,
存储器201存储有可被至少一个处理器202执行的指令,该指令被至少一个处理器202执行,以使至少一个处理器202能够执行上述任一控制门锁的方法。The memory 201 stores instructions that can be executed by at least one processor 202, and the instructions are executed by at least one processor 202, so that at least one processor 202 can execute any one of the methods for controlling a door lock described above.
在一个实施例中,提供了一种门锁,该门锁应用了上述任一控制门锁的方法。In one embodiment, a door lock is provided, which applies any of the methods for controlling the door lock described above.
在本说明书的描述中,参考术语“一个实施例”、“一些实施例”、“示例”、“具体示例”、或“一些示例”等的描述意指结合该实施例或示例描述的具体特征、结构、材料或者特点包含于本发明的至少一个实施例或示例中。在本说明书中,对上述术语的示意性表述不一定指的是相同的实施例或示例。而且,描述的具体特征、结构、材料或者特点可以在任何的一个或多个实施例或示例中以合适的方式结合。In the description of this specification, descriptions referring to the terms "one embodiment", "some embodiments", "example", "specific examples", or "some examples" mean that specific features described in connection with the embodiment or example , structure, material or feature is included in at least one embodiment or example of the present invention. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiment or example. Furthermore, the specific features, structures, materials or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
尽管上面已经示出和描述了本发明的实施例,可以理解的是,上述实施例是示例性的,不能理解为对本发明的限制,本领域的普通技术人员在本发明的范围内可以对上述实施例进行变化、修改、替换和变型。Although the embodiments of the present invention have been shown and described above, it can be understood that the above embodiments are exemplary and should not be construed as limiting the present invention, those skilled in the art can make the above-mentioned The embodiments are subject to changes, modifications, substitutions and variations.
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202310797342.XACN116645748A (en) | 2023-06-30 | 2023-06-30 | Method and device for controlling door lock and electronic equipment |
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202310797342.XACN116645748A (en) | 2023-06-30 | 2023-06-30 | Method and device for controlling door lock and electronic equipment |
| Publication Number | Publication Date |
|---|---|
| CN116645748Atrue CN116645748A (en) | 2023-08-25 |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202310797342.XAPendingCN116645748A (en) | 2023-06-30 | 2023-06-30 | Method and device for controlling door lock and electronic equipment |
| Country | Link |
|---|---|
| CN (1) | CN116645748A (en) |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN205405654U (en)* | 2016-02-29 | 2016-07-27 | 云丁网络技术(北京)有限公司 | Intelligence lock system based on touch -sensitive |
| CN105894627A (en)* | 2016-03-30 | 2016-08-24 | 北京千丁互联科技有限公司 | Bluetooth access control equipment and bluetooth access control management system and method |
| CN105933039A (en)* | 2016-06-24 | 2016-09-07 | 飞天诚信科技股份有限公司 | Bluetooth device and working method of the Bluetooth device |
| CN206128889U (en)* | 2016-03-01 | 2017-04-26 | 河南久匀电子科技有限公司 | Novel intelligent lock that no key was opened |
| CN108471610A (en)* | 2018-03-02 | 2018-08-31 | 杨宪国 | Bluetooth connection control system |
| CN111186414A (en)* | 2019-12-31 | 2020-05-22 | 深圳前海智安信息科技有限公司 | Automobile Bluetooth key safety management system and method |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN205405654U (en)* | 2016-02-29 | 2016-07-27 | 云丁网络技术(北京)有限公司 | Intelligence lock system based on touch -sensitive |
| CN206128889U (en)* | 2016-03-01 | 2017-04-26 | 河南久匀电子科技有限公司 | Novel intelligent lock that no key was opened |
| CN105894627A (en)* | 2016-03-30 | 2016-08-24 | 北京千丁互联科技有限公司 | Bluetooth access control equipment and bluetooth access control management system and method |
| CN105933039A (en)* | 2016-06-24 | 2016-09-07 | 飞天诚信科技股份有限公司 | Bluetooth device and working method of the Bluetooth device |
| CN108471610A (en)* | 2018-03-02 | 2018-08-31 | 杨宪国 | Bluetooth connection control system |
| CN111186414A (en)* | 2019-12-31 | 2020-05-22 | 深圳前海智安信息科技有限公司 | Automobile Bluetooth key safety management system and method |
| Publication | Publication Date | Title |
|---|---|---|
| JP6218841B2 (en) | Wireless communication system | |
| CN101291224B (en) | Method and system for processing data in communication system | |
| US7584357B2 (en) | Control device for creating one-time password using pre-input button code, home server for authenticating control device using one-time password, and method for authenticating control device with one-time password | |
| CN100590639C (en) | System and method for managing multiple smart card sessions | |
| WO2019007252A1 (en) | Control method and apparatus | |
| CN105450269A (en) | Method and device for realizing safe interaction and pairing authentication between Bluetooth devices | |
| WO2017041599A1 (en) | Service processing method and electronic device | |
| CN114125832B (en) | A network connection method, a terminal, a network-to-be-distributed device, and a storage medium | |
| KR20160129839A (en) | An authentication apparatus with a bluetooth interface | |
| US12407492B2 (en) | Method and system for communicating with authenticator | |
| WO2016201811A1 (en) | Identity authentication method, apparatus and system | |
| CN106845177A (en) | Cipher management method and system | |
| WO2018120836A1 (en) | Terminal pairing method, device, and system, terminal, and computer readable storage medium | |
| TW201608408A (en) | Wireless authentication system and method for USB storage device | |
| WO2015100675A1 (en) | Network configuration method, and related device and system | |
| WO2021083349A1 (en) | Security chip-based security authentication method and system, security chip, and readable storage medium | |
| US20230052917A1 (en) | Pairing method applied to short-range communication system and wireless device | |
| CN114419765A (en) | Method and device for realizing vehicle safety control by NFC card and readable storage medium | |
| CN112425116B (en) | Intelligent door lock wireless communication method, intelligent door lock, gateway and communication equipment | |
| US20140025946A1 (en) | Audio-security storage apparatus and method for managing certificate using the same | |
| US11741214B2 (en) | Passcode authentication based data storage device | |
| CN114726521A (en) | Smart lock temporary password generation method and electronic device | |
| WO2015124798A2 (en) | Method & system for enabling authenticated operation of a data processing device | |
| CN116645748A (en) | Method and device for controlling door lock and electronic equipment | |
| US20250047145A1 (en) | Nfc wireless charging method, nfc wireless charging system, electronic device and readable storage medium |
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination |