CN109801415A - A kind of method for unlocking of encryption lock and encryption lock based on elliptic curve encryption algorithm - Google Patents
A kind of method for unlocking of encryption lock and encryption lock based on elliptic curve encryption algorithm Download PDFInfo
- Publication number
- CN109801415A CN109801415A CN201811637259.1A CN201811637259A CN109801415A CN 109801415 A CN109801415 A CN 109801415A CN 201811637259 A CN201811637259 A CN 201811637259A CN 109801415 A CN109801415 A CN 109801415A
- Authority
- CN
- China
- Prior art keywords
- random number
- verification
- application software
- verification information
- user application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
This application discloses a kind of encryption lock based on elliptic curve encryption algorithm and the method for unlocking of encryption lock, random generator generates random number and random number is sent to user application software;User application software carries out ellipse curve signature using private key to random number, generates verification information;Information acquisition device acquires the verification information, and, verification information is sent to verification processing device;The public key and constant parameter of verification processing device acquisition elliptic curve encryption algorithm;Verification processing device verifies verification information according to the public key and constant parameter of elliptic curve encryption algorithm, obtains verification result;Verification processing device judges whether to unlock according to the verification result.Encryption lock in technical scheme, password authentification when being unlocked using the asymmetry of elliptic curve encryption, even if the information stored in lock is all cracked, but third party is if it is not known that the encryption key that user application software uses, also unlocking operation can not be carried out, to guarantee the safety of coded lock.
Description
Technical field
This application involves field of computer technology more particularly to a kind of encryption locks and encryption lock based on elliptic curve encryption algorithm
Method for unlocking.
Background technique
The design of lock is in order to guarantee the safety of personal effects and information, and form is also by most traditional key unlocking, development
Unlock to current keyboard input password unlocking and fingerprint etc..
While more and more password unlockings and fingerprint unlock and gradually replace key unlocking, password unlocking and fingerprint are opened
There is also some security risks for the mode of lock.For example, for traditional mechanical lock, as long as having cracked the mechanical knot of lock
Structure, so that it may it unlocks, and for coded lock and fingerprint, the cipher mode of coded lock and Fingerprint Lock is typically based on itself
What the key of storage carried out, if the key secret of encryption is not strong, once the information for locking itself is decrypted, Key Exposure, that
Whether coded lock and Fingerprint Lock can be easily turned on.Therefore, it is hidden all to there is safety in either any lock
Suffer from, especially encryption lock, once Key Exposure, unlocks easy.
So how to be further ensured that the safety of encryption lock, become those skilled in the art's urgent problem to be solved.
Summary of the invention
This application provides a kind of encryption lock based on elliptic curve encryption algorithm and the method for unlocking of encryption lock, to guarantee to encrypt
The safety of lock.
On the one hand, this application provides a kind of encryption locks based on elliptic curve encryption algorithm, comprising:
Algorithm information memory, for saving the public key and constant parameter of elliptic curve encryption algorithm;
Random generator, for generating random number and the random number being sent to user application software;
User application software generates verification information, institute for carrying out ellipse curve signature using private key to the random number
Stating verification information includes the signature and the random number;
Information acquisition device, for acquiring the verification information, and, the verification information is sent to verification processing device;
Verification processing device, for the public key and constant parameter according to the elliptic curve encryption algorithm, to the verification information into
Row verifying.
With reference to first aspect, the user application software is also used to:
Obtain the preset time that encryption lock updates;
Judge whether system time reaches the requirement of the preset time;
If system time reaches the requirement of the preset time, new random number is generated;
The new random number is sent to user application software.
With reference to first aspect, the user application software is also used to:
Obtain voice signal and/or optical signal;
Judge whether the voice signal and/or the optical signal are the signals for meeting more new demand;
If whether the voice signal and/or the optical signal are the signals for meeting more new demand, generate it is new with
Machine number;
The new random number is sent to user application software.
With reference to first aspect, further includes: public, private key pair matcher is used for:
The public key and the private key are matched, public, private key pair is formed;
The public key is stored in the algorithm information memory respectively, the private key is stored in user application software;
Judge public, private key to whether needing to update;
If new public key is stored in the algorithm information memory by the public, private key to needing to update, will be new
Private key deposit user application software in.
With reference to first aspect, the verification processing device is also used to:
According to the public key and constant parameter of the elliptic curve encryption algorithm, the signature in the verification information is decrypted,
Obtain ciphertext data;
Judge whether the ciphertext data and the random number in the verification information are identical;
If the ciphertext data is identical as the random number, the verification information is proved to be successful;
If the ciphertext data is different from the random number, the verification information authentication failed.
It with reference to first aspect, further include display;
The display, for show the random number that the random generator generates, the corresponding two dimensional code of the random number,
The verification information and the corresponding two dimensional code of the verification information.
With reference to first aspect, the information acquisition device by way of scanning the two-dimensional code or obtains keyboard input data
Mode obtains verification information.
Second aspect, present invention also provides a kind of method for unlocking of encryption lock based on elliptic curve encryption algorithm, comprising:
Random generator generates random number and the random number is sent to user application software;
User application software carries out ellipse curve signature using private key to the random number, generates verification information, described to test
Card information includes the signature and the random number;
Information acquisition device acquires the verification information, and, the verification information is sent to verification processing device;
The public key and constant parameter of verification processing device acquisition elliptic curve encryption algorithm;
Verification processing device tests the verification information according to the public key and constant parameter of the elliptic curve encryption algorithm
Card obtains verification result;
Verification processing device judges whether to unlock according to the verification result.
In conjunction with second aspect, the random generator generates random number and the random number is sent to user application software
The step of include:
Obtain the preset time that encryption lock updates;
Judge whether system time reaches the requirement of the preset time;
If system time reaches the requirement of the preset time, new random number is generated;
The new random number is sent to user application software.
In conjunction with second aspect, the random generator generates random number and the random number is sent to user application software
The step of include:
Obtain voice signal and/or optical signal;
Judge whether the voice signal and/or the optical signal are the signals for meeting more new demand;
If whether the voice signal and/or the optical signal are the signals for meeting more new demand, generate it is new with
Machine number;
The new random number is sent to user application software.
In conjunction with second aspect, further includes: match the public key and the private key, form public, private key pair;
The public key is stored in the algorithm information memory respectively, the private key is stored in user application software;
Judge public, private key to whether needing to update;
If new public key is stored in the algorithm information memory by the public, private key to needing to update, will be new
Private key deposit user application software in.
In conjunction with second aspect, the verification processing device is tested according to the public key and constant parameter of elliptic curve encryption algorithm described
Demonstrate,proving the step of information is verified, obtains verification result includes:
According to the public key and constant parameter of the elliptic curve encryption algorithm, the signature in the verification information is decrypted,
Obtain ciphertext data;
Judge whether the ciphertext data and the random number in the verification information are identical;
If the ciphertext data is identical as the random number, the verification information is proved to be successful;
If the ciphertext data is different from the random number, the verification information authentication failed.
In conjunction with second aspect, further includes: show random number, the random number corresponding two that the random generator generates
Tie up code, the verification information and the corresponding two dimensional code of the verification information.
In conjunction with second aspect, the mode that the information acquisition device acquires the verification information includes: by scanning the two-dimensional code
Or obtain keyboard input data.
From the above technical scheme, this application provides a kind of encryption lock based on elliptic curve encryption algorithm and encryption locks
Method for unlocking, random generator generate random number and random number are sent to user application software;User application software is to random
Number carries out ellipse curve signature using private key, generates verification information;Information acquisition device acquires the verification information, and, it will test
Card information is sent to verification processing device;The public key and constant parameter of verification processing device acquisition elliptic curve encryption algorithm;Verification processing
Device verifies verification information according to the public key and constant parameter of elliptic curve encryption algorithm, obtains verification result;Verification processing device
According to the verification result, judge whether to unlock.Encryption lock in technical scheme utilizes the asymmetry of elliptic curve encryption
Password authentification when being unlocked, even if the information stored in lock is all cracked, but third party is if it is not known that user answers
The encryption key used with software can not also carry out unlocking operation, to guarantee the safety of coded lock.
Detailed description of the invention
In order to illustrate more clearly of the technical solution of the application, attached drawing needed in case study on implementation will be made below
Simply introduce, it should be apparent that, for those of ordinary skills, in the premise of not making the creative labor property
Under, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is the structural block diagram of the first embodiment of the encryption lock provided by the present application based on elliptic curve encryption algorithm;
Fig. 2 is a kind of flow chart of the method for unlocking of the encryption lock based on elliptic curve encryption algorithm provided by the present application;
Fig. 3 is the flow chart of step 101 in method for unlocking provided by the present application;
Fig. 4 is another flow chart of step 101 in method for unlocking provided by the present application;
Fig. 5 is the flow chart of the method for unlocking of another encryption lock based on elliptic curve encryption algorithm provided by the present application;
Fig. 6 is the flow chart of step 105 in method for unlocking provided by the present application.
Specific embodiment
In order to make those skilled in the art better understand the technical solutions in the application, below in conjunction with attached drawing, it is right
Technical solution in the embodiment of the present application is clearly and completely described.
Referring to Fig. 1, this application provides the first embodiments of the encryption lock based on elliptic curve encryption algorithm, comprising:
Algorithm information memory 11, for saving the public key and constant parameter of elliptic curve encryption algorithm.Elliptic curve encryption algorithm
It is a kind of asymmetrical Encryption Algorithm, is encrypted using private key, be decrypted using public key, compared to other Encryption Algorithm,
The key of use is smaller, provides and other Encryption Algorithm are same or safety guarantee of greater degree.Elliptic curve encryption algorithm
Public key and constant parameter determine the manner of decryption of Encryption Algorithm.There is no storages for encrypting in algorithm information memory 11
Private key, the terminal or software client that private key is only used by user save, so that the private key and public key of encryption and decryption point
Storage is opened, once the leaking data of memory 11, third party can not also obtain the private key of encryption, verification information cannot be copied,
And then can not unlock, guarantee the safety of encryption lock.
It is worth noting that the algorithm information memory 11 in the application can be general power down non-volatile memory body,
Such as ROM (Read Only Memory, read-only memory), FLASH (flash memory), ferroelectricity memory bank etc..
Random generator 12, for generating random number and the random number being sent to user application software.Random number is
The ciphering process of user provides encryption initial data, is also used as identifying object, when the data and original random data decrypted
Unanimously, the private key for illustrating encryption is corresponding relationship with the public key of decryption, and what is be used for is verified, and can be unlocked
Operation.Specifically, random number be randomly generated device 11 be the string number being randomly generated, letter, character or its combination, at random
Between number is there is no any associated, is some data having no bearing on.
User application software 13, for, using private key progress ellipse curve signature, generating verification information to the random number,
The verification information includes the signature and the random number.User application software can be understood as our usually used APP
(Application, application program), when user needs to carry out unlocking operation, APP is obtained at random from random generator 12
Number, then random number is subjected to ellipse curve signature encryption using the private key in APP, the ellipse curve signature algorithm base in the application
In elliptic curve, which is defined by secp256k1 standard.Verification information includes encrypted signing messages and encryption
Preceding original random number.
Information acquisition device 14, for acquiring the verification information, and, the verification information is sent to verification processing
Device;Information acquisition device 14 plays the role of data relay, on the one hand, when the data format of verification information does not meet verification processing device
When 15 requirement, verification information can be carried out the processing of data format by information acquisition device 14, make satisfactory lattice
Formula is sent to verification processing device 15;On the other hand, information acquisition device 14 can also play the role of human-computer interaction, can will collect
Random number or verification information show.
Verification processing device 15, for the public key and constant parameter according to the elliptic curve encryption algorithm, to the verification information
It is verified.From the foregoing it can be that including random number and encrypted digital signature, 15 benefit of verification processing device in verification information
Digital signature is decrypted with public key and constant parameter, the data that decryption obtains are compared with random number, if the two is identical,
It is then proved to be successful, user requests the requirement unlocked to be allowed to, and can carry out unlocking operation.
As it can be seen that the encryption lock in the application first embodiment, using in elliptic curve encryption algorithm public key and private key to random
Number is encrypted and decrypted, and the private key of encryption and the public key of decryption are stored respectively, and private key is avoided to reveal, when public key is revealed
When, the confidentiality of private key is also had no effect on, can be further ensured that the safety of encryption lock.
In addition, some processor chips are per se with random generator, if using this place in the embodiment of the present application
Device is managed, then random generator need not be installed separately again.
Further, the encryption lock based on elliptic curve encryption algorithm that the application second embodiment provides, in first embodiment
On the basis of, the user application software 13 is also used to: obtaining the preset time that encryption lock updates;Judge whether system time arrives
Up to the requirement of the preset time;If system time reaches the requirement of the preset time, new random number is generated;By institute
It states new random number and is sent to user application software.
The application is also further ensured that the safety of random number on the basis of guaranteeing private key safety, when random number makes
After using for a period of time, just there is the risk for being stolen and cracking, therefore, be also provided in the encryption lock in the application preset
Time is controlled with the generation to new random number.Preset time can be the time that random number uses, and be also possible to encrypt
Random number is all referred to as system time using the real-time time of time and display in this application by the real-time time of lock display,
Judge whether system time reaches the concrete condition of the requirement of preset time and include:
When system time is that random number uses the time, whether judge random number is more than preset time using the time, such as
Fruit is more than that then random generator 12 needs to generate new random number, and updates the random number in user application software 13.Example
Such as, preset time is 1 hour, when random number from generate time so far already exceed 1 it is small when, then need user to apply
Software 13 notifies random generator 12 to generate new random number;
When system time is the real-time time of display, preset time can be a certain moment of preset every day, or
Person is a certain moment in each week, when real-time time becomes " a certain moment ", then random generator 12 need to generate it is new with
Machine number, and the random number in user application software 13 is updated, for example, preset time is daily " 16:00 ", when encryption lock
When real-time time is recorded as " 16:00 ", user application software 13 then notifies random generator 12 to generate new random number.
Therefore, the scheme in the application second embodiment has carried out further instruction to the update of random number, has guaranteed
On the basis of private key safety, the safety of random number is in turn ensured.
Further, the encryption lock based on elliptic curve encryption algorithm that the application 3rd embodiment provides, in first embodiment
On the basis of, the user application software 13 is also used to: obtaining voice signal and/or optical signal;Judge the voice signal and/
Or whether the optical signal is the signal for meeting more new demand;If whether the voice signal and/or the optical signal are symbols
The signal for closing more new demand, then generate new random number;The new random number is sent to user application software.
Likewise, the application 3rd embodiment while guaranteeing that private key is safe, provides another update random number
The opportunity of method, update determines according to the voice signal or optical signal of acquisition.By way of voice signal, user can be to
User application software 13 inputs verbal instructions, such as " updating random number " etc., and then user application software 13 passes through speech recognition
The particular content of voice signal is identified, is compared with preset more new information, if same or similar degree is in threshold
It is worth between range, then user application software 13 notifies random generator 12 to generate new random number;By way of optical signal, use
Family can be blocked to the equipment progress light for installing user application software 13 or user application software 13 is to ring locating for equipment
Border carries out light detection, spends when the light intensity signal detected is same or similar compared with preset more new information in threshold range
Within, then user application software 13 notifies random generator 12 to generate new random number.
Further, the encryption lock based on elliptic curve encryption algorithm that the application fourth embodiment provides, in first embodiment
On the basis of, further includes: public, private key pair matcher is used for: the public key and the private key being matched, public, private key pair is formed;
The public key is stored in the algorithm information memory respectively, the private key is stored in user application software;Judge public key
Whether private key is to needing to update;If new public key is stored in the algorithm information and deposited by the public, private key to needing to update
It, will be in new private key deposit user application software in reservoir.
The fourth embodiment of the application is on the basis of ensure that private key storage security, it is ensured that public key and private key
Relevance can also have the risk cracked that is easy to be stolen when the overlong time that public key and private key use, therefore, public key and private
Key also will be replaced regularly, guarantee the safety of private key.In addition, in order to guarantee the same elliptic curve encryption algorithm it is accurate encryption with
Decryption, public key and private key needs are accurately corresponding, and no matter private key, which has occurred with public key because of which kind of reason, does not correspond to situation, then
The data of private key encryption can not all be come out by public key decryptions, and entire encryption lock also will appear the case where not being available.Therefore, this Shen
Public, private key pair matcher please be additionally provided in embodiment, the public key in an elliptic curve encryption algorithm is associated together with private key,
When public key updates, private key can also update together, and when private key updates, public key can also update together, guarantee public key and private key one
One is corresponding.
Further, the encryption lock based on elliptic curve encryption algorithm that the 5th embodiment of the application provides, in first embodiment
On the basis of, the verification processing device 15 is also used to: according to the public key and constant parameter of the elliptic curve encryption algorithm, being tested described
Signature in card information is decrypted, and obtains ciphertext data;Judge the random number in the ciphertext data and the verification information
It is whether identical;If the ciphertext data is identical as the random number, the verification information is proved to be successful;If the decryption
Data are different from the random number, then the verification information authentication failed.
Further, the encryption lock based on elliptic curve encryption algorithm that the application sixth embodiment provides, in combination with above-mentioned
The content of one embodiment, then including display;The display, for show random number that the random generator generates,
The corresponding two dimensional code of the random number, the verification information and the corresponding two dimensional code of the verification information.
The all constituents of encryption lock can be existed simultaneously in a mobile terminal or client in the embodiment of the present application
In end;Can also only have user application software 13 and be present in mobile terminal perhaps in client by mobile terminal or client
Control the open and close of encryption lock.When only user application software 13 is present in mobile terminal or client, at random
The random number that generator 12 generates may be displayed on display, is scanned and is obtained by user application software 13, user application software
13 verification informations generated also may be displayed on display, is scanned and is obtained by information acquisition device 14.Further, random number with
The display mode of verification information can be data itself, be also possible to the two dimensional code of data generation, and two dimensional code is used to scan, data
Itself it can be directly inputted in the component of response;Similarly, information acquisition device 14 can by way of scanning the two-dimensional code or
The mode for obtaining keyboard input data obtains verification information.
As it can be seen from the above scheme this application provides a kind of encryption locks based on elliptic curve encryption algorithm.Present techniques side
Encryption lock in case, password authentification when being unlocked using the asymmetry of elliptic curve encryption, even if the information stored in lock is complete
Portion is cracked, but third party be if it is not known that the encryption key that user application software uses, can not also carry out unlocking operation, from
And guarantee the safety of coded lock.
Referring to fig. 2, the embodiment of the present application also provides a kind of method for unlocking of encryption lock based on elliptic curve encryption algorithm, packets
It includes:
Step 101, random generator generates random number and the random number is sent to user application software.
Step 102, user application software carries out ellipse curve signature using private key to the random number, generates verifying letter
Breath, the verification information include the signature and the random number;
Step 103, information acquisition device acquires the verification information, and, the verification information is sent to verification processing
Device;
Step 104, verification processing device obtains the public key and constant parameter of elliptic curve encryption algorithm;The public affairs of elliptic curve encryption algorithm
Key and constant parameter are stored in algorithm information memory, and also there is no storages for encryption in algorithm information memory
Private key, the terminal or software client that private key is only used by user save, so that the private key and public key of encryption and decryption separate
Storage, once the leaking data of memory 11, third party can not also obtain the private key of encryption, cannot copy verification information, into
And can not unlock, guarantee the safety of encryption lock.
Step 105, verification processing device is according to the public key and constant parameter of the elliptic curve encryption algorithm, to the verification information
It is verified, obtains verification result;
Step 106, verification processing device judges whether to unlock according to the verification result.
As it can be seen that the encryption lock method for unlocking in the embodiment of the present application, the random number utilization that user obtains individually is stored
Whether private key is encrypted, and verification information is generated, recycle the verification information of the public key verifications user individually stored correct, verifying
By can then carry out unlocking operation, the method for unlocking in the application also can be avoided private key leakage, when public key leakage, also not
The confidentiality for influencing private key, can be further ensured that the safety of encryption lock.
The specific structure of encryption lock in method for unlocking provided herein is the same as the encryption lock in above-mentioned each embodiment
Structure it is identical.
Further, referring to Fig. 3, the random generator generates random number and the random number is sent to user's application
The step of software includes:
Step 201, the preset time that encryption lock updates is obtained;
Step 202, judge whether system time reaches the requirement of the preset time;
Step 203, if system time reaches the requirement of the preset time, new random number is generated;
Step 204, the new random number is sent to user application software.
Further, referring to fig. 4, the random generator generates random number and the random number is sent to user's application
The step of software includes:
Step 301, voice signal and/or optical signal are obtained;
Step 302, judge whether the voice signal and/or the optical signal are the signals for meeting more new demand;
Step 303, it if whether the voice signal and/or the optical signal are the signals for meeting more new demand, gives birth to
The random number of Cheng Xin;
Step 304, the new random number is sent to user application software.
Further, referring to Fig. 5, the method for unlocking of the encryption lock based on elliptic curve encryption algorithm further include:
Step 401, the public key and the private key are matched, forms public, private key pair;
Step 402, the public key is stored in the algorithm information memory respectively, by private key deposit user's application
In software;
Step 403, judge public, private key to whether needing to update;
Step 404, if the public, private key is stored in the algorithm information memory to needing to update, by new public key
In, it will be in new private key deposit user application software.
Further, referring to Fig. 6, the verification processing device is according to the public key and constant parameter of elliptic curve encryption algorithm, to institute
Verification information is stated to be verified, obtain verification result the step of include:
Step 501, according to the public key and constant parameter of the elliptic curve encryption algorithm, to the signature in the verification information into
Row decryption, obtains ciphertext data;
Step 502, judge whether the ciphertext data and the random number in the verification information are identical;
Step 503, if the ciphertext data is identical as the random number, the verification information is proved to be successful;
Step 504, if the ciphertext data is different from the random number, the verification information authentication failed.
Further, the method for unlocking of the encryption lock based on elliptic curve encryption algorithm further include: the display random life
It grows up to be a useful person random number, the corresponding two dimensional code of the random number, the verification information and the corresponding two dimension of the verification information of generation
Code.
Further, the information acquisition device acquire the mode of the verification information include: by scanning the two-dimensional code or
Obtain keyboard input data.
From the above technical scheme, this application provides a kind of encryption lock based on elliptic curve encryption algorithm and encryption locks
Method for unlocking, random generator generate random number and random number are sent to user application software;User application software is to random
Number carries out ellipse curve signature using private key, generates verification information;Information acquisition device acquires the verification information, and, it will test
Card information is sent to verification processing device;The public key and constant parameter of verification processing device acquisition elliptic curve encryption algorithm;Verification processing
Device verifies verification information according to the public key and constant parameter of elliptic curve encryption algorithm, obtains verification result;Verification processing device
According to the verification result, judge whether to unlock.Encryption lock in technical scheme utilizes the asymmetry of elliptic curve encryption
Password authentification when being unlocked, even if the information stored in lock is all cracked, but third party is if it is not known that user answers
The encryption key used with software can not also carry out unlocking operation, to guarantee the safety of coded lock.
The application can be used in numerous general or special purpose computing system environments or configuration.Such as: personal computer, service
Device computer, handheld device or portable device, laptop device, multicomputer system, microprocessor-based system, top set
Box, programmable consumer-elcetronics devices, network PC, minicomputer, mainframe computer, including any of the above system or equipment
Distributed computing environment etc..
The application can describe in the general context of computer-executable instructions executed by a computer, such as program
Module.Generally, program module includes routines performing specific tasks or implementing specific abstract data types, programs, objects, group
Part, data structure etc..The application can also be practiced in a distributed computing environment, in these distributed computing environments, by
Task is executed by the connected remote processing devices of communication network.In a distributed computing environment, program module can be with
In the local and remote computer storage media including storage equipment.
Those skilled in the art will readily occur to its of the application after considering specification and practicing application disclosed herein
Its embodiment.This application is intended to cover any variations, uses, or adaptations of the application, these modifications, purposes or
Person's adaptive change follows the general principle of the application and including the undocumented common knowledge in the art of the application
Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the application are by following
Claim is pointed out.
It should be understood that the application is not limited to the precise structure that has been described above and shown in the drawings, and
And various modifications and changes may be made without departing from the scope thereof.Scope of the present application is only limited by the accompanying claims.
Claims (12)
1. a kind of encryption lock based on elliptic curve encryption algorithm characterized by comprising
Algorithm information memory, for saving the public key and constant parameter of elliptic curve encryption algorithm;
Random generator, for generating random number and the random number being sent to user application software;
User application software, for carrying out ellipse curve signature using private key to the random number, generation verification information is described to test
Card information includes the signature and the random number;
Information acquisition device, for acquiring the verification information, and, the verification information is sent to verification processing device;
Verification processing device tests the verification information for the public key and constant parameter according to the elliptic curve encryption algorithm
Card.
2. encryption lock according to claim 1, which is characterized in that the user application software is also used to:
Obtain the preset time that encryption lock updates;
Judge whether system time reaches the requirement of the preset time;
If system time reaches the requirement of the preset time, new random number is generated;
The new random number is sent to user application software.
3. encryption lock according to claim 1, which is characterized in that the user application software is also used to:
Obtain voice signal and/or optical signal;
Judge whether the voice signal and/or the optical signal are the signals for meeting more new demand;
If whether the voice signal and/or the optical signal are the signals for meeting more new demand, new random number is generated;
The new random number is sent to user application software.
4. encryption lock according to claim 1, which is characterized in that further include public, private key pair matcher, be used for:
The public key and the private key are matched, public, private key pair is formed;
The public key is stored in the algorithm information memory respectively, the private key is stored in user application software;
Judge public, private key to whether needing to update;
If new public key is stored in the algorithm information memory, to needing to update by new private by the public, private key
Key is stored in user application software.
5. encryption lock according to claim 1, which is characterized in that the verification processing device is also used to:
According to the public key and constant parameter of the elliptic curve encryption algorithm, the signature in the verification information is decrypted, is obtained
Ciphertext data;
Judge whether the ciphertext data and the random number in the verification information are identical;
If the ciphertext data is identical as the random number, the verification information is proved to be successful;
If the ciphertext data is different from the random number, the verification information authentication failed.
6. encryption lock according to claim 1-5, which is characterized in that further include display;
The display, for showing the random number that the random generator generates, the corresponding two dimensional code of the random number, described
Verification information and the corresponding two dimensional code of the verification information.
7. encryption lock according to claim 6, which is characterized in that the information acquisition device is by way of scanning the two-dimensional code
Or the mode of acquisition keyboard input data obtains verification information.
8. a kind of method for unlocking of the encryption lock based on elliptic curve encryption algorithm characterized by comprising
Random generator generates random number and the random number is sent to user application software;
User application software carries out ellipse curve signature using private key to the random number, generates verification information, the verifying letter
Breath includes the signature and the random number;
Information acquisition device acquires the verification information, and, the verification information is sent to verification processing device;
The public key and constant parameter of verification processing device acquisition elliptic curve encryption algorithm;
Verification processing device is verified the verification information, is obtained according to the public key and constant parameter of the elliptic curve encryption algorithm
Obtain verification result;
Verification processing device judges whether to unlock according to the verification result.
9. method for unlocking according to claim 8, which is characterized in that the random generator generates random number and will be described
Random number is sent to the step of user application software and includes:
Obtain the preset time that encryption lock updates;
Judge whether system time reaches the requirement of the preset time;
If system time reaches the requirement of the preset time, new random number is generated;
The new random number is sent to user application software.
10. method for unlocking according to claim 8, which is characterized in that the random generator generates random number and by institute
Stating the step of random number is sent to user application software includes:
Obtain voice signal and/or optical signal;
Judge whether the voice signal and/or the optical signal are the signals for meeting more new demand;
If whether the voice signal and/or the optical signal are the signals for meeting more new demand, new random number is generated;
The new random number is sent to user application software.
11. method for unlocking according to claim 8, which is characterized in that further include:
The public key and the private key are matched, public, private key pair is formed;
The public key is stored in the algorithm information memory respectively, the private key is stored in user application software;
Judge public, private key to whether needing to update;
If new public key is stored in the algorithm information memory, to needing to update by new private by the public, private key
Key is stored in user application software.
12. method for unlocking according to claim 8, which is characterized in that the verification processing device is according to elliptic curve encryption algorithm
Public key and constant parameter, the verification information is verified, obtain verification result the step of include:
According to the public key and constant parameter of the elliptic curve encryption algorithm, the signature in the verification information is decrypted, is obtained
Ciphertext data;
Judge whether the ciphertext data and the random number in the verification information are identical;
If the ciphertext data is identical as the random number, the verification information is proved to be successful;
If the ciphertext data is different from the random number, the verification information authentication failed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811637259.1A CN109801415A (en) | 2018-12-29 | 2018-12-29 | A kind of method for unlocking of encryption lock and encryption lock based on elliptic curve encryption algorithm |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811637259.1A CN109801415A (en) | 2018-12-29 | 2018-12-29 | A kind of method for unlocking of encryption lock and encryption lock based on elliptic curve encryption algorithm |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109801415A true CN109801415A (en) | 2019-05-24 |
Family
ID=66558263
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811637259.1A Pending CN109801415A (en) | 2018-12-29 | 2018-12-29 | A kind of method for unlocking of encryption lock and encryption lock based on elliptic curve encryption algorithm |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109801415A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111767532A (en) * | 2020-06-12 | 2020-10-13 | 上海橙群微电子有限公司 | Programmer authentication method and authentication system |
CN112102524A (en) * | 2019-06-18 | 2020-12-18 | 杭州萤石软件有限公司 | Unlocking method and unlocking system |
CN112565213A (en) * | 2020-11-25 | 2021-03-26 | 青岛海尔科技有限公司 | Authentication method and device, storage medium, and electronic device |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101872399A (en) * | 2010-07-01 | 2010-10-27 | 武汉理工大学 | Dynamic digital copyright protection method based on dual identity authentication |
CN103678174A (en) * | 2012-09-11 | 2014-03-26 | 联想(北京)有限公司 | Data safety method, storage device and data safety system |
EP2720199A1 (en) * | 2012-10-11 | 2014-04-16 | Openways Sas | Secured method for controlling the opening of locking devices by means of messages using symmetric encryption |
CN205068524U (en) * | 2015-09-01 | 2016-03-02 | 上海工程技术大学 | Intelligent gate inhibition system |
CN108460876A (en) * | 2018-03-20 | 2018-08-28 | 中电科(天津)网络信息安全有限公司 | A kind of time sync-type Quick Response Code guard method and system |
CN108696476A (en) * | 2017-04-06 | 2018-10-23 | 上海航迹数据信息科技有限公司 | Security strategy configurable Automobile key system and its implementation |
-
2018
- 2018-12-29 CN CN201811637259.1A patent/CN109801415A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101872399A (en) * | 2010-07-01 | 2010-10-27 | 武汉理工大学 | Dynamic digital copyright protection method based on dual identity authentication |
CN103678174A (en) * | 2012-09-11 | 2014-03-26 | 联想(北京)有限公司 | Data safety method, storage device and data safety system |
EP2720199A1 (en) * | 2012-10-11 | 2014-04-16 | Openways Sas | Secured method for controlling the opening of locking devices by means of messages using symmetric encryption |
CN205068524U (en) * | 2015-09-01 | 2016-03-02 | 上海工程技术大学 | Intelligent gate inhibition system |
CN108696476A (en) * | 2017-04-06 | 2018-10-23 | 上海航迹数据信息科技有限公司 | Security strategy configurable Automobile key system and its implementation |
CN108460876A (en) * | 2018-03-20 | 2018-08-28 | 中电科(天津)网络信息安全有限公司 | A kind of time sync-type Quick Response Code guard method and system |
Non-Patent Citations (1)
Title |
---|
张仕斌: "《应用密码学》", 31 January 2017, 西安电子科技大学出版社 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112102524A (en) * | 2019-06-18 | 2020-12-18 | 杭州萤石软件有限公司 | Unlocking method and unlocking system |
CN111767532A (en) * | 2020-06-12 | 2020-10-13 | 上海橙群微电子有限公司 | Programmer authentication method and authentication system |
CN112565213A (en) * | 2020-11-25 | 2021-03-26 | 青岛海尔科技有限公司 | Authentication method and device, storage medium, and electronic device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3721578B1 (en) | Methods and systems for recovering data using dynamic passwords | |
AU2018246993B2 (en) | Systems and methods for providing digital identity records to verify identities of users | |
US9900309B2 (en) | Methods for using digital seals for non-repudiation of attestations | |
US20180173871A1 (en) | Systems and Methods for Registering and Acquiring E-Credentials using Proof-of-Existence and Digital Seals | |
CN103440444B (en) | The signing method of electronic contract | |
CN108881253B (en) | Block chain real name participation method and system | |
WO2017032263A1 (en) | Identity authentication method and apparatus | |
CN108833114A (en) | A kind of decentralization identity authorization system and method based on block chain | |
JP5287550B2 (en) | Biometric authentication system, biometric authentication method, biometric authentication device, biometric information processing device, biometric authentication program, and biometric information processing program | |
US11258591B2 (en) | Cryptographic key management based on identity information | |
US20140337635A1 (en) | Biometric verification with improved privacy and network performance in client-server networks | |
Gasti et al. | Secure, fast, and energy-efficient outsourced authentication for smartphones | |
CN108229188A (en) | It is a kind of to be signed documents with tagged keys and verification method | |
CN109801415A (en) | A kind of method for unlocking of encryption lock and encryption lock based on elliptic curve encryption algorithm | |
CN109741063A (en) | Digital signature method and device based on block chain | |
CN108989346A (en) | The effective identity trustship agility of third party based on account concealment authenticates access module | |
CN110175441A (en) | Data managing method, device, equipment and storage medium based on bio-identification | |
CN109660353A (en) | A kind of application program installation method and device | |
US20190028456A1 (en) | System and method for injecting a tag into a computing resource | |
US20230050280A1 (en) | Computer-implemented user identity verification method | |
KR100908100B1 (en) | Encrypted image data with matryoshka structure and, system and method for mutual synchronization certificating using the same | |
TWI724681B (en) | Managing cryptographic keys based on identity information | |
CN106100851A (en) | Password management system, intelligent wristwatch and cipher management method thereof | |
CN108540447A (en) | A kind of certification authentication method and system based on block chain | |
Cavoukian et al. | Keynote paper: Biometric encryption: Technology for strong authentication, security and privacy |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190524 |
|
RJ01 | Rejection of invention patent application after publication |