CN102821110A - Password finding method used for audio/video storage device - Google Patents

Password finding method used for audio/video storage device Download PDF

Info

Publication number
CN102821110A
CN102821110A CN2012103258904A CN201210325890A CN102821110A CN 102821110 A CN102821110 A CN 102821110A CN 2012103258904 A CN2012103258904 A CN 2012103258904A CN 201210325890 A CN201210325890 A CN 201210325890A CN 102821110 A CN102821110 A CN 102821110A
Authority
CN
China
Prior art keywords
password
user
interim
encryption key
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012103258904A
Other languages
Chinese (zh)
Other versions
CN102821110B (en
Inventor
许锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Infinova Ltd
Original Assignee
Shenzhen Infinova Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Infinova Ltd filed Critical Shenzhen Infinova Ltd
Priority to CN201210325890.4A priority Critical patent/CN102821110B/en
Publication of CN102821110A publication Critical patent/CN102821110A/en
Application granted granted Critical
Publication of CN102821110B publication Critical patent/CN102821110B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a password finding method which includes adding a password forgetting channel through the user logging authentication interaction interface and acquiring an encrypted secret key through the channel. Users send the secret key to a customer service who checks identity, decrypts the secret key and generates a temporary password effective in limited time through encryption algorithm, and users can log in a system to make a new password in the effective time according to the temporary password. The password finding method has the advantages of being capable of increasing the password finding function under the condition that no corresponding hardware support exists due to the fact that the method is flexible in password encryption and decryption, being capable of avoiding the fact that the device is mistaken as malice resetting, enters system and causes insecurity like user data loss.

Description

A kind of password method for retrieving that is used for the audio frequency and video memory device
Technical field:
The invention belongs to cryptographic calculations and encoding and decoding field, be chiefly directed to the method that the password loss on the security protection audio frequency and video memory device (like numeral (network) DVR, web camera etc.) is given for change.
Background technology:
The password retrieval function is the client when the equipment of use, has set password for certain user, has but forgotten during use and has been arranged to what character, and this moment can be with entrance management person's authority through another method of putting, or the direct modification password.Traditional way is: on the hardware circuit board of equipment, increase a SR, and long by the several seconds, restarting equipment, and will remove configuration of devices information, factory reset, the password default when password recovery becomes to dispatch from the factory.
Usually the realization of this method is to be the basis with hardware, and when carrying out password recovery, the state before dispatching from the factory is got back in the user's configuration that can reset all, and for a configuration complex apparatus, like numeral (network) DVR etc., the user is unacceptable.Because configuration parameter is very many, relate to the video recording plan, the plan of deploying troops on garrison duty, alarm linkage, channel information, OSD, occlusion area, mobile detections etc. if the user need reconfigure, will be very large workloads.The most important is the reset mode on basis with hardware in addition, carries out the method that password is reset; Can't differentiate that everybody can operate to user identity, the video tape recorder that significant data is arranged; If illegally reset by the people; By the login of people's malice, deletion video recording or disk format, that will be very serious thing.
Summary of the invention
The objective of the invention is: a kind of password method for retrieving is provided, and is under the prerequisite of the resetting of basis and the user's configuration parameter of need not resetting not needing hardware, realizes giving for change of password.
The present invention provides a kind of password method for retrieving, and this method is to login the authentication interactive interface through the user, increases the passage that forgets Password; Can obtain an encrypted secret key through this passage; The user is dealt into customer service with this key, after identity is checked in customer service, generates an effectively interim password in the time that limits with secret key decryption and with AES; The user is according to this interim password, and login system is revised new password in the effective time.
Further, said method comprising the steps of: 1, the coding step of encryption key; 2, the decoding step of encryption key; 3, the generation step of interim password; 4, the comparison step of interim password; 5, revise the administrator's password step.
Further, step 1 comprises following concrete step: 1) create the passage that forgets Password that the user logins the authentication interactive interface: at the login interactive interface, increase the text hyperlink entering information of forgetting Password and obtain the interface; 2) random code and date are encrypted, obtain encryption key; 3) user sends to customer service with encryption key and product ID; 4) wait for the interim password that host computer calculates.
What adopt further, said step 2) is the Base64 AES, with random code and date encryption.
Further, step 2 comprises following concrete steps: 1) input information: create two user's condition entry edit boxes, be used for importing encryption key and product ID respectively; 2) the enabling decryption of encrypted key obtains time value: according to the encryption key that the user provides, decipher with Base64, after the secret key decryption, the time value that obtains is accurate to the sky thus; 3) whether judgement time is correct, like correct entering step 3; If incorrect then execution in step 2 again.
Further, step 3 comprises following concrete steps:
1) generation of interim password; When generating a temporary password, need to bind product ID, use the md5 encryption algorithm; System data and Equipment Serial Number are encrypted together, and cipher mode is MD5 (Date+SN), obtain 16 byte encrypted result after; Get wherein 6 bytes; To 10 modulo operations, obtain the character string that Serial No. is formed, promptly interim password;
2) interim password is issued the user of equipment end.
Further, step 4 comprises following concrete steps:
1) user obtains the interim password of host computer through customer service, and interim password is input to the equipment end system;
2) sequence number and the date of equipment end system fetch equipment, according to these two information, carry out MD5 and calculate, get preceding 8 results, obtain the character string result of 16 systems equally, get every byte and carry out 10 modular arithmetic, obtain identical interim password;
3) interim password matching success then carry out step 5, if the unsuccessful step 1 of then getting back to.
Further, step 5 specifically is the user after the password matching success, and entrance management person's new password is provided with the interface at once, directly inputs new password and preserves and withdraw from, and new password is provided with completion; Land for the second time and can use new password login system.
Further, step 1 wherein, 4,5th, realize in equipment end; Step 2, the 3rd, on host computer, realize.
Further, said method is used for the audio frequency and video memory device.
The present invention has beneficial effect to be: because software realizes that the password encryption deciphering is very flexible, can under the situation that does not have relevant hardware to support, increase the password retrieval function.And can avoid equipment to be considered to malice and reset, the entering system causes the insecurity of user data loss to take place.
Description of drawings:
Fig. 1 is a present device end workflow diagram;
Fig. 2 is the workflow diagram of host computer of the present invention.
Embodiment:
Below in conjunction with accompanying drawing and embodiment the present invention is further specified, but content of the present invention is not limited thereto.
Strategy of the present invention is to login the authentication interactive interface the user; Increase the passage that forgets Password, can obtain an encrypted secret key through this passage, the user is dealt into customer service with this key; After identity is checked in customer service; Generate an effectively interim password in the time that limits with secret key decryption and with AES, the user is according to this interim password, and login system is revised new password in the effective time.Concrete principle is following: the audio frequency and video memory device (like numeral (network) DVR, has the user and logins interactive interface, can input user name U and password P; 1) at first creates the passage that forgets Password that the user logins the authentication interactive interface.Each login inlet interactive interface at equipment comprises local login interface, the webmaster page, and client-side management software etc., spare interface can get into password and give the interface for change; 2) increase interim password comparison branch in than docking port at password: comparison process at first will inquire about in customer data base and imported user U, if search unsuccessfully, return error message; If the password comparison is then carried out in success; 3) use input password P1 and memory cipher P relatively, if the password matching success returns success state, comparison finishes; If password matching failure gets into interim password matching branch.Wherein interim password matching branch realizes being exactly emphasis of the present invention.
The password method for retrieving of the realization that the present invention set forth, it comprises the coding of encryption key, the decoding of encryption key, the generation of interim password, the step of the comparison of interim password, modification administrator's password.The present invention is an example with numeral (network) DVR, and its equipment has local display menu login and two kinds of forms of webpage login.Default administrator user name admin.
One, the coding step of encryption key (equipment end realization):
1) creates the passage that forgets Password that the user logins the authentication interactive interface:, increase a text hyperlink [forgetting Password] at the login interactive interface.Click can get into the information of forgetting Password and obtain the interface,
2) obtain encryption key: use the Base64 AES, random code and date are encrypted cipher mode Base64 (Rand+Date); Use random code, can make each encrypted result different, Base64 is a reversible AES; But obtain the date, need obtain random code earlier.
For example, the equipment end program obtains 3 random codes through the backstage computing; Like [129]; With current date be: [2012-08-29], encrypt random code and date with Base64, the encrypted result that obtains (encryption key) is: [129] [MjAxMi0wOC0xMjktMjA=].
3) user sends to customer service with encryption key and product ID:
The user passes through mail with random code and encrypted result information, note, and perhaps liaison mode sends to the contact staff of enterprise.As with step 2) in encryption key
[129] [MjAxMi0wOC0xMjktMjA=] and product ID like [V3060-16CH-2712], are issued customer service.
4) wait for the interim password that host computer calculates.
Two, the decoding step of encryption key (host computer realization)
1) input information: create two user's condition entry edit boxes, be used for importing encryption key and product ID respectively.
2) the enabling decryption of encrypted key obtains time value: according to the encryption key that the user provides, decipher with Base64, obtain the character string that plaintext date and random code are mixed, like [2012-08-129-29].Three bit digital promptly are random code [129] in the character string, reject the date [2012-08-29] that random code obtains equipment.After the secret key decryption, obtain time value expressly thus, be accurate to the sky.
3) whether judgement time is correct, like correct entering step 3; If incorrect then execution in step two again.
Three, the generation step (host computer realization) of interim password
1) generation of interim password: when generating a temporary password, need to bind product ID, use the md5 encryption algorithm; System data and Equipment Serial Number are encrypted together, cipher mode MD5 (Date+SN), obtain 16 byte encrypted result after; Get wherein 6 bytes; To 10 modulo operations, obtain the character string that Serial No. is formed, promptly interim password.MD5 is a kind of irreversible AES.
Deciphering obtains according to step 2 equipment date [2012-08-29] and product ID [V3060-16CH-2712]; Carrying out the MD5 yardage calculates; Get preceding 8 results (abandoning back 8 bit data), obtain the character string result [4734dae14bf2ea69] of 16 systems, get every byte and carry out 10 modular arithmetic; Obtain interim password, like [12855245].
2) interim password is issued the user of equipment end.Two buttons the time value deciphering of execution in step two and the generation password of step 3 are respectively wherein arranged on the interface of host computer, and two output box interim password results of being used for the output time value respectively and generating as a result.
Four, the comparison step (equipment end realization) of interim password
1) user obtains the interim password (like result [12855245]) of host computer through customer service, and interim password is input to the equipment end system.
2) sequence number and the date of equipment end system fetch equipment obtain [V3060-16CH-2712] and [2012-08-29] respectively, according to these two information; Carry out and step 3 1) identical MD5 calculating; Get preceding 8 results, obtain the character string result [4734dae14bf2ea69] of 16 systems equally, get every byte and carry out 10 modular arithmetic; Obtain identical interim password [12855245]
3) step 5 is then carried out in interim password matching success, if the unsuccessful step 1 of then getting back to.
Five, revise administrator's password step (equipment end realization)
The user is after the password matching success, and entrance management person's new password is provided with the interface at once, directly inputs new password preservation and withdraws from, and new password is provided with completion.Land for the second time and can use new password login system.
Can know that by instantiation what the user touched from the beginning to the end all is the information after encrypting, can't make amendment ageing, and in this instance; Be 1 day effective time, if time encrypting and decrypting process is made an amendment slightly, and can be with making into effective time 1 hour; 2 hours, perhaps 5 hours, perhaps 2 days.The mode that software is realized has high flexibility, fully need be to the modification of hardware, therefore, can be very easily in systems development process each stage increase this function.
Certainly, there is multiple enforcement in the password method for retrieving that the present invention is based on DVR, and for example: can adjust random number, perhaps interim password effective time, perhaps MD5 result of calculation is got other computing and obtained password string or the like.In addition, the password method for retrieving not only can be used for the audio frequency and video memory device among the present invention, can also be used for other electronic equipment.Only otherwise deviate under the situation of the present invention's spirit and essence, those of ordinary skill in the art can make appropriate change, distortion and optimization according to the demand of oneself, but these application all belong to the protection range of the appended claim of the present invention.

Claims (10)

1. a password method for retrieving is characterized in that, this method is to login the authentication interactive interface through the user; Increase the passage that forgets Password, can obtain an encrypted secret key through this passage, the user is dealt into customer service with this key; After identity is checked in customer service; Generate an effectively interim password in the time that limits with secret key decryption and with AES, the user is according to this interim password, and login system is revised new password in the effective time.
2. method according to claim 1 is characterized in that, said method comprising the steps of: 1, the coding step of encryption key; 2, the decoding step of encryption key; 3, the generation step of interim password; 4, the comparison step of interim password; 5, revise the administrator's password step.
3. method according to claim 2 is characterized in that, step 1 comprises following concrete step:
1) creates the passage that forgets Password that the user logins the authentication interactive interface:, increase the text hyperlink entering information of forgetting Password and obtain the interface at the login interactive interface;
2) random code and date are encrypted, obtain encryption key;
3) user sends to customer service with encryption key and product ID;
4) wait for the interim password that host computer calculates.
4. method according to claim 3 is characterized in that, said step 2) in what adopt is the Base64 AES, with random code and date encryption.
5. method according to claim 2 is characterized in that, step 2 comprises following concrete steps:
1) input information: create two user's condition entry edit boxes, be used for importing encryption key and product ID respectively;
2) the enabling decryption of encrypted key obtains time value: according to the encryption key that the user provides, decipher with Base64, after the secret key decryption, the time value that obtains is accurate to the sky thus;
3) whether judgement time is correct, like correct entering step 3; If incorrect then execution in step 2 again.
6. method according to claim 2 is characterized in that, step 3 comprises following concrete steps:
1) generation of interim password; When generating a temporary password, need to bind product ID, use the md5 encryption algorithm; System data and Equipment Serial Number are encrypted together, and cipher mode is MD5 (Date+SN), obtain 16 byte encrypted result after; Get wherein 6 bytes; To 10 modulo operations, obtain the character string that Serial No. is formed, promptly interim password;
2) interim password is issued the user of equipment end.
7. method according to claim 2 is characterized in that, step 4 comprises following concrete steps:
1) user obtains the interim password of host computer through customer service, and interim password is input to the equipment end system;
2) sequence number and the date of equipment end system fetch equipment, according to these two information, carry out MD5 and calculate, get preceding 8 results, obtain the character string result of 16 systems equally, get every byte and carry out 10 modular arithmetic, obtain identical interim password;
3) interim password matching success then carry out step 5, if the unsuccessful step 1 of then getting back to.
8. method according to claim 2 is characterized in that, step 5 specifically is the user after the password matching success, and entrance management person's new password is provided with the interface at once, directly inputs new password and preserves and withdraw from, and new password is provided with completion; Land for the second time and can use new password login system.
9. method according to claim 2 is characterized in that, step 1 wherein, and 4,5th, realize in equipment end; Step 2, the 3rd, on host computer, realize.
10. according to the described method of one of claim 1-9, it is characterized in that said method is used for the audio frequency and video memory device.
CN201210325890.4A 2012-09-06 2012-09-06 A kind of password method for retrieving for audio/video storage device Expired - Fee Related CN102821110B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210325890.4A CN102821110B (en) 2012-09-06 2012-09-06 A kind of password method for retrieving for audio/video storage device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210325890.4A CN102821110B (en) 2012-09-06 2012-09-06 A kind of password method for retrieving for audio/video storage device

Publications (2)

Publication Number Publication Date
CN102821110A true CN102821110A (en) 2012-12-12
CN102821110B CN102821110B (en) 2016-02-24

Family

ID=47304967

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210325890.4A Expired - Fee Related CN102821110B (en) 2012-09-06 2012-09-06 A kind of password method for retrieving for audio/video storage device

Country Status (1)

Country Link
CN (1) CN102821110B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107203351A (en) * 2016-03-18 2017-09-26 富士施乐株式会社 Message processing device and information processing method
CN109413449A (en) * 2018-11-08 2019-03-01 高斯贝尔数码科技股份有限公司 A kind of video-encryption decryption method and system
CN111049643A (en) * 2018-10-12 2020-04-21 浙江宇视科技有限公司 Method and system for quickly acquiring temporary password
CN112347458A (en) * 2019-08-06 2021-02-09 杭州海康威视数字技术股份有限公司 Password resetting method and device, terminal equipment and server
CN113556797A (en) * 2021-06-29 2021-10-26 深圳市闪联信息技术有限公司 Method and system for quickly establishing connection between mobile equipment and large-screen equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1855810A (en) * 2005-04-26 2006-11-01 上海盛大网络发展有限公司 Dynamic code verificating system, method and use
CN101047503A (en) * 2006-03-30 2007-10-03 腾讯科技(深圳)有限公司 Method and system for fetching cipher
CN101369893A (en) * 2008-10-06 2009-02-18 中国移动通信集团设计院有限公司 Method for local area network access authentication of casual user
CN101465735A (en) * 2008-12-19 2009-06-24 北京大学 Network user identification verification method, server and client terminal
CN102168509A (en) * 2011-03-23 2011-08-31 袁磊 Dynamic password lock system capable of changing password with date

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1855810A (en) * 2005-04-26 2006-11-01 上海盛大网络发展有限公司 Dynamic code verificating system, method and use
CN101047503A (en) * 2006-03-30 2007-10-03 腾讯科技(深圳)有限公司 Method and system for fetching cipher
CN101369893A (en) * 2008-10-06 2009-02-18 中国移动通信集团设计院有限公司 Method for local area network access authentication of casual user
CN101465735A (en) * 2008-12-19 2009-06-24 北京大学 Network user identification verification method, server and client terminal
CN102168509A (en) * 2011-03-23 2011-08-31 袁磊 Dynamic password lock system capable of changing password with date

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ONLY_GUEST: "新浪微博修改任意用户密码", 《HTTP://WWW.WOOYUN.ORG/BUGS/WOOYUN-2010-09452?1253》, 11 July 2012 (2012-07-11) *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107203351A (en) * 2016-03-18 2017-09-26 富士施乐株式会社 Message processing device and information processing method
CN111049643A (en) * 2018-10-12 2020-04-21 浙江宇视科技有限公司 Method and system for quickly acquiring temporary password
CN109413449A (en) * 2018-11-08 2019-03-01 高斯贝尔数码科技股份有限公司 A kind of video-encryption decryption method and system
CN109413449B (en) * 2018-11-08 2021-02-05 高斯贝尔数码科技股份有限公司 Video encryption and decryption method and system
CN112347458A (en) * 2019-08-06 2021-02-09 杭州海康威视数字技术股份有限公司 Password resetting method and device, terminal equipment and server
CN113556797A (en) * 2021-06-29 2021-10-26 深圳市闪联信息技术有限公司 Method and system for quickly establishing connection between mobile equipment and large-screen equipment

Also Published As

Publication number Publication date
CN102821110B (en) 2016-02-24

Similar Documents

Publication Publication Date Title
JP6941146B2 (en) Data security service
JP7045837B2 (en) Federated key management
CN108076057B (en) Data security system and method based on block chain
CN110324143A (en) Data transmission method, electronic equipment and storage medium
US10284372B2 (en) Method and system for secure management of computer applications
EP2957063B1 (en) Policy enforcement with associated data
JP6430968B2 (en) Delayed data access
US8850206B2 (en) Client-server system with security for untrusted server
US20150188901A1 (en) Method and system for securing communication
US11372993B2 (en) Automatic key rotation
US8494154B2 (en) Cryptographic ignition key system
EP3155754A1 (en) Methods, systems and computer program product for providing encryption on a plurality of devices
CN110932859B (en) User information processing method, device and equipment and readable storage medium
US8848922B1 (en) Distributed encryption key management
CN102325026A (en) Account password secure encryption system
US9641328B1 (en) Generation of public-private key pairs
CN102821110B (en) A kind of password method for retrieving for audio/video storage device
CN106156345B (en) Item file deposits card method, deposits card equipment and terminal device
Peng et al. Comments on “identity-based distributed provable data possession in multicloud storage”
CN110232570A (en) A kind of information monitoring method and device
CN111027047B (en) Application sensitive information management and control method and device, electronic equipment and storage medium
Vanitha et al. Data sharing: Efficient distributed accountability in cloud using third party auditor
WO2024088145A1 (en) Data processing method and apparatus, and program product, computer device and storage medium
CN110263553B (en) Database access control method and device based on public key verification and electronic equipment
US20240072998A1 (en) Stateless system to restore access

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160224

Termination date: 20210906

CF01 Termination of patent right due to non-payment of annual fee