CN109801415A - A kind of method for unlocking of encryption lock and encryption lock based on elliptic curve encryption algorithm - Google Patents

A kind of method for unlocking of encryption lock and encryption lock based on elliptic curve encryption algorithm Download PDF

Info

Publication number
CN109801415A
CN109801415A CN201811637259.1A CN201811637259A CN109801415A CN 109801415 A CN109801415 A CN 109801415A CN 201811637259 A CN201811637259 A CN 201811637259A CN 109801415 A CN109801415 A CN 109801415A
Authority
CN
China
Prior art keywords
random number
verification
application software
verification information
user application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811637259.1A
Other languages
Chinese (zh)
Inventor
洪远洋
黄何
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HAINAN XINRUAN SOFTWARE Co Ltd
Original Assignee
HAINAN XINRUAN SOFTWARE Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HAINAN XINRUAN SOFTWARE Co Ltd filed Critical HAINAN XINRUAN SOFTWARE Co Ltd
Priority to CN201811637259.1A priority Critical patent/CN109801415A/en
Publication of CN109801415A publication Critical patent/CN109801415A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

This application discloses a kind of encryption lock based on elliptic curve encryption algorithm and the method for unlocking of encryption lock, random generator generates random number and random number is sent to user application software;User application software carries out ellipse curve signature using private key to random number, generates verification information;Information acquisition device acquires the verification information, and, verification information is sent to verification processing device;The public key and constant parameter of verification processing device acquisition elliptic curve encryption algorithm;Verification processing device verifies verification information according to the public key and constant parameter of elliptic curve encryption algorithm, obtains verification result;Verification processing device judges whether to unlock according to the verification result.Encryption lock in technical scheme, password authentification when being unlocked using the asymmetry of elliptic curve encryption, even if the information stored in lock is all cracked, but third party is if it is not known that the encryption key that user application software uses, also unlocking operation can not be carried out, to guarantee the safety of coded lock.

Description

A kind of method for unlocking of encryption lock and encryption lock based on elliptic curve encryption algorithm
Technical field
This application involves field of computer technology more particularly to a kind of encryption locks and encryption lock based on elliptic curve encryption algorithm Method for unlocking.
Background technique
The design of lock is in order to guarantee the safety of personal effects and information, and form is also by most traditional key unlocking, development Unlock to current keyboard input password unlocking and fingerprint etc..
While more and more password unlockings and fingerprint unlock and gradually replace key unlocking, password unlocking and fingerprint are opened There is also some security risks for the mode of lock.For example, for traditional mechanical lock, as long as having cracked the mechanical knot of lock Structure, so that it may it unlocks, and for coded lock and fingerprint, the cipher mode of coded lock and Fingerprint Lock is typically based on itself What the key of storage carried out, if the key secret of encryption is not strong, once the information for locking itself is decrypted, Key Exposure, that Whether coded lock and Fingerprint Lock can be easily turned on.Therefore, it is hidden all to there is safety in either any lock Suffer from, especially encryption lock, once Key Exposure, unlocks easy.
So how to be further ensured that the safety of encryption lock, become those skilled in the art's urgent problem to be solved.
Summary of the invention
This application provides a kind of encryption lock based on elliptic curve encryption algorithm and the method for unlocking of encryption lock, to guarantee to encrypt The safety of lock.
On the one hand, this application provides a kind of encryption locks based on elliptic curve encryption algorithm, comprising:
Algorithm information memory, for saving the public key and constant parameter of elliptic curve encryption algorithm;
Random generator, for generating random number and the random number being sent to user application software;
User application software generates verification information, institute for carrying out ellipse curve signature using private key to the random number Stating verification information includes the signature and the random number;
Information acquisition device, for acquiring the verification information, and, the verification information is sent to verification processing device;
Verification processing device, for the public key and constant parameter according to the elliptic curve encryption algorithm, to the verification information into Row verifying.
With reference to first aspect, the user application software is also used to:
Obtain the preset time that encryption lock updates;
Judge whether system time reaches the requirement of the preset time;
If system time reaches the requirement of the preset time, new random number is generated;
The new random number is sent to user application software.
With reference to first aspect, the user application software is also used to:
Obtain voice signal and/or optical signal;
Judge whether the voice signal and/or the optical signal are the signals for meeting more new demand;
If whether the voice signal and/or the optical signal are the signals for meeting more new demand, generate it is new with Machine number;
The new random number is sent to user application software.
With reference to first aspect, further includes: public, private key pair matcher is used for:
The public key and the private key are matched, public, private key pair is formed;
The public key is stored in the algorithm information memory respectively, the private key is stored in user application software;
Judge public, private key to whether needing to update;
If new public key is stored in the algorithm information memory by the public, private key to needing to update, will be new Private key deposit user application software in.
With reference to first aspect, the verification processing device is also used to:
According to the public key and constant parameter of the elliptic curve encryption algorithm, the signature in the verification information is decrypted, Obtain ciphertext data;
Judge whether the ciphertext data and the random number in the verification information are identical;
If the ciphertext data is identical as the random number, the verification information is proved to be successful;
If the ciphertext data is different from the random number, the verification information authentication failed.
It with reference to first aspect, further include display;
The display, for show the random number that the random generator generates, the corresponding two dimensional code of the random number, The verification information and the corresponding two dimensional code of the verification information.
With reference to first aspect, the information acquisition device by way of scanning the two-dimensional code or obtains keyboard input data Mode obtains verification information.
Second aspect, present invention also provides a kind of method for unlocking of encryption lock based on elliptic curve encryption algorithm, comprising:
Random generator generates random number and the random number is sent to user application software;
User application software carries out ellipse curve signature using private key to the random number, generates verification information, described to test Card information includes the signature and the random number;
Information acquisition device acquires the verification information, and, the verification information is sent to verification processing device;
The public key and constant parameter of verification processing device acquisition elliptic curve encryption algorithm;
Verification processing device tests the verification information according to the public key and constant parameter of the elliptic curve encryption algorithm Card obtains verification result;
Verification processing device judges whether to unlock according to the verification result.
In conjunction with second aspect, the random generator generates random number and the random number is sent to user application software The step of include:
Obtain the preset time that encryption lock updates;
Judge whether system time reaches the requirement of the preset time;
If system time reaches the requirement of the preset time, new random number is generated;
The new random number is sent to user application software.
In conjunction with second aspect, the random generator generates random number and the random number is sent to user application software The step of include:
Obtain voice signal and/or optical signal;
Judge whether the voice signal and/or the optical signal are the signals for meeting more new demand;
If whether the voice signal and/or the optical signal are the signals for meeting more new demand, generate it is new with Machine number;
The new random number is sent to user application software.
In conjunction with second aspect, further includes: match the public key and the private key, form public, private key pair;
The public key is stored in the algorithm information memory respectively, the private key is stored in user application software;
Judge public, private key to whether needing to update;
If new public key is stored in the algorithm information memory by the public, private key to needing to update, will be new Private key deposit user application software in.
In conjunction with second aspect, the verification processing device is tested according to the public key and constant parameter of elliptic curve encryption algorithm described Demonstrate,proving the step of information is verified, obtains verification result includes:
According to the public key and constant parameter of the elliptic curve encryption algorithm, the signature in the verification information is decrypted, Obtain ciphertext data;
Judge whether the ciphertext data and the random number in the verification information are identical;
If the ciphertext data is identical as the random number, the verification information is proved to be successful;
If the ciphertext data is different from the random number, the verification information authentication failed.
In conjunction with second aspect, further includes: show random number, the random number corresponding two that the random generator generates Tie up code, the verification information and the corresponding two dimensional code of the verification information.
In conjunction with second aspect, the mode that the information acquisition device acquires the verification information includes: by scanning the two-dimensional code Or obtain keyboard input data.
From the above technical scheme, this application provides a kind of encryption lock based on elliptic curve encryption algorithm and encryption locks Method for unlocking, random generator generate random number and random number are sent to user application software;User application software is to random Number carries out ellipse curve signature using private key, generates verification information;Information acquisition device acquires the verification information, and, it will test Card information is sent to verification processing device;The public key and constant parameter of verification processing device acquisition elliptic curve encryption algorithm;Verification processing Device verifies verification information according to the public key and constant parameter of elliptic curve encryption algorithm, obtains verification result;Verification processing device According to the verification result, judge whether to unlock.Encryption lock in technical scheme utilizes the asymmetry of elliptic curve encryption Password authentification when being unlocked, even if the information stored in lock is all cracked, but third party is if it is not known that user answers The encryption key used with software can not also carry out unlocking operation, to guarantee the safety of coded lock.
Detailed description of the invention
In order to illustrate more clearly of the technical solution of the application, attached drawing needed in case study on implementation will be made below Simply introduce, it should be apparent that, for those of ordinary skills, in the premise of not making the creative labor property Under, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is the structural block diagram of the first embodiment of the encryption lock provided by the present application based on elliptic curve encryption algorithm;
Fig. 2 is a kind of flow chart of the method for unlocking of the encryption lock based on elliptic curve encryption algorithm provided by the present application;
Fig. 3 is the flow chart of step 101 in method for unlocking provided by the present application;
Fig. 4 is another flow chart of step 101 in method for unlocking provided by the present application;
Fig. 5 is the flow chart of the method for unlocking of another encryption lock based on elliptic curve encryption algorithm provided by the present application;
Fig. 6 is the flow chart of step 105 in method for unlocking provided by the present application.
Specific embodiment
In order to make those skilled in the art better understand the technical solutions in the application, below in conjunction with attached drawing, it is right Technical solution in the embodiment of the present application is clearly and completely described.
Referring to Fig. 1, this application provides the first embodiments of the encryption lock based on elliptic curve encryption algorithm, comprising:
Algorithm information memory 11, for saving the public key and constant parameter of elliptic curve encryption algorithm.Elliptic curve encryption algorithm It is a kind of asymmetrical Encryption Algorithm, is encrypted using private key, be decrypted using public key, compared to other Encryption Algorithm, The key of use is smaller, provides and other Encryption Algorithm are same or safety guarantee of greater degree.Elliptic curve encryption algorithm Public key and constant parameter determine the manner of decryption of Encryption Algorithm.There is no storages for encrypting in algorithm information memory 11 Private key, the terminal or software client that private key is only used by user save, so that the private key and public key of encryption and decryption point Storage is opened, once the leaking data of memory 11, third party can not also obtain the private key of encryption, verification information cannot be copied, And then can not unlock, guarantee the safety of encryption lock.
It is worth noting that the algorithm information memory 11 in the application can be general power down non-volatile memory body, Such as ROM (Read Only Memory, read-only memory), FLASH (flash memory), ferroelectricity memory bank etc..
Random generator 12, for generating random number and the random number being sent to user application software.Random number is The ciphering process of user provides encryption initial data, is also used as identifying object, when the data and original random data decrypted Unanimously, the private key for illustrating encryption is corresponding relationship with the public key of decryption, and what is be used for is verified, and can be unlocked Operation.Specifically, random number be randomly generated device 11 be the string number being randomly generated, letter, character or its combination, at random Between number is there is no any associated, is some data having no bearing on.
User application software 13, for, using private key progress ellipse curve signature, generating verification information to the random number, The verification information includes the signature and the random number.User application software can be understood as our usually used APP (Application, application program), when user needs to carry out unlocking operation, APP is obtained at random from random generator 12 Number, then random number is subjected to ellipse curve signature encryption using the private key in APP, the ellipse curve signature algorithm base in the application In elliptic curve, which is defined by secp256k1 standard.Verification information includes encrypted signing messages and encryption Preceding original random number.
Information acquisition device 14, for acquiring the verification information, and, the verification information is sent to verification processing Device;Information acquisition device 14 plays the role of data relay, on the one hand, when the data format of verification information does not meet verification processing device When 15 requirement, verification information can be carried out the processing of data format by information acquisition device 14, make satisfactory lattice Formula is sent to verification processing device 15;On the other hand, information acquisition device 14 can also play the role of human-computer interaction, can will collect Random number or verification information show.
Verification processing device 15, for the public key and constant parameter according to the elliptic curve encryption algorithm, to the verification information It is verified.From the foregoing it can be that including random number and encrypted digital signature, 15 benefit of verification processing device in verification information Digital signature is decrypted with public key and constant parameter, the data that decryption obtains are compared with random number, if the two is identical, It is then proved to be successful, user requests the requirement unlocked to be allowed to, and can carry out unlocking operation.
As it can be seen that the encryption lock in the application first embodiment, using in elliptic curve encryption algorithm public key and private key to random Number is encrypted and decrypted, and the private key of encryption and the public key of decryption are stored respectively, and private key is avoided to reveal, when public key is revealed When, the confidentiality of private key is also had no effect on, can be further ensured that the safety of encryption lock.
In addition, some processor chips are per se with random generator, if using this place in the embodiment of the present application Device is managed, then random generator need not be installed separately again.
Further, the encryption lock based on elliptic curve encryption algorithm that the application second embodiment provides, in first embodiment On the basis of, the user application software 13 is also used to: obtaining the preset time that encryption lock updates;Judge whether system time arrives Up to the requirement of the preset time;If system time reaches the requirement of the preset time, new random number is generated;By institute It states new random number and is sent to user application software.
The application is also further ensured that the safety of random number on the basis of guaranteeing private key safety, when random number makes After using for a period of time, just there is the risk for being stolen and cracking, therefore, be also provided in the encryption lock in the application preset Time is controlled with the generation to new random number.Preset time can be the time that random number uses, and be also possible to encrypt Random number is all referred to as system time using the real-time time of time and display in this application by the real-time time of lock display, Judge whether system time reaches the concrete condition of the requirement of preset time and include:
When system time is that random number uses the time, whether judge random number is more than preset time using the time, such as Fruit is more than that then random generator 12 needs to generate new random number, and updates the random number in user application software 13.Example Such as, preset time is 1 hour, when random number from generate time so far already exceed 1 it is small when, then need user to apply Software 13 notifies random generator 12 to generate new random number;
When system time is the real-time time of display, preset time can be a certain moment of preset every day, or Person is a certain moment in each week, when real-time time becomes " a certain moment ", then random generator 12 need to generate it is new with Machine number, and the random number in user application software 13 is updated, for example, preset time is daily " 16:00 ", when encryption lock When real-time time is recorded as " 16:00 ", user application software 13 then notifies random generator 12 to generate new random number.
Therefore, the scheme in the application second embodiment has carried out further instruction to the update of random number, has guaranteed On the basis of private key safety, the safety of random number is in turn ensured.
Further, the encryption lock based on elliptic curve encryption algorithm that the application 3rd embodiment provides, in first embodiment On the basis of, the user application software 13 is also used to: obtaining voice signal and/or optical signal;Judge the voice signal and/ Or whether the optical signal is the signal for meeting more new demand;If whether the voice signal and/or the optical signal are symbols The signal for closing more new demand, then generate new random number;The new random number is sent to user application software.
Likewise, the application 3rd embodiment while guaranteeing that private key is safe, provides another update random number The opportunity of method, update determines according to the voice signal or optical signal of acquisition.By way of voice signal, user can be to User application software 13 inputs verbal instructions, such as " updating random number " etc., and then user application software 13 passes through speech recognition The particular content of voice signal is identified, is compared with preset more new information, if same or similar degree is in threshold It is worth between range, then user application software 13 notifies random generator 12 to generate new random number;By way of optical signal, use Family can be blocked to the equipment progress light for installing user application software 13 or user application software 13 is to ring locating for equipment Border carries out light detection, spends when the light intensity signal detected is same or similar compared with preset more new information in threshold range Within, then user application software 13 notifies random generator 12 to generate new random number.
Further, the encryption lock based on elliptic curve encryption algorithm that the application fourth embodiment provides, in first embodiment On the basis of, further includes: public, private key pair matcher is used for: the public key and the private key being matched, public, private key pair is formed; The public key is stored in the algorithm information memory respectively, the private key is stored in user application software;Judge public key Whether private key is to needing to update;If new public key is stored in the algorithm information and deposited by the public, private key to needing to update It, will be in new private key deposit user application software in reservoir.
The fourth embodiment of the application is on the basis of ensure that private key storage security, it is ensured that public key and private key Relevance can also have the risk cracked that is easy to be stolen when the overlong time that public key and private key use, therefore, public key and private Key also will be replaced regularly, guarantee the safety of private key.In addition, in order to guarantee the same elliptic curve encryption algorithm it is accurate encryption with Decryption, public key and private key needs are accurately corresponding, and no matter private key, which has occurred with public key because of which kind of reason, does not correspond to situation, then The data of private key encryption can not all be come out by public key decryptions, and entire encryption lock also will appear the case where not being available.Therefore, this Shen Public, private key pair matcher please be additionally provided in embodiment, the public key in an elliptic curve encryption algorithm is associated together with private key, When public key updates, private key can also update together, and when private key updates, public key can also update together, guarantee public key and private key one One is corresponding.
Further, the encryption lock based on elliptic curve encryption algorithm that the 5th embodiment of the application provides, in first embodiment On the basis of, the verification processing device 15 is also used to: according to the public key and constant parameter of the elliptic curve encryption algorithm, being tested described Signature in card information is decrypted, and obtains ciphertext data;Judge the random number in the ciphertext data and the verification information It is whether identical;If the ciphertext data is identical as the random number, the verification information is proved to be successful;If the decryption Data are different from the random number, then the verification information authentication failed.
Further, the encryption lock based on elliptic curve encryption algorithm that the application sixth embodiment provides, in combination with above-mentioned The content of one embodiment, then including display;The display, for show random number that the random generator generates, The corresponding two dimensional code of the random number, the verification information and the corresponding two dimensional code of the verification information.
The all constituents of encryption lock can be existed simultaneously in a mobile terminal or client in the embodiment of the present application In end;Can also only have user application software 13 and be present in mobile terminal perhaps in client by mobile terminal or client Control the open and close of encryption lock.When only user application software 13 is present in mobile terminal or client, at random The random number that generator 12 generates may be displayed on display, is scanned and is obtained by user application software 13, user application software 13 verification informations generated also may be displayed on display, is scanned and is obtained by information acquisition device 14.Further, random number with The display mode of verification information can be data itself, be also possible to the two dimensional code of data generation, and two dimensional code is used to scan, data Itself it can be directly inputted in the component of response;Similarly, information acquisition device 14 can by way of scanning the two-dimensional code or The mode for obtaining keyboard input data obtains verification information.
As it can be seen from the above scheme this application provides a kind of encryption locks based on elliptic curve encryption algorithm.Present techniques side Encryption lock in case, password authentification when being unlocked using the asymmetry of elliptic curve encryption, even if the information stored in lock is complete Portion is cracked, but third party be if it is not known that the encryption key that user application software uses, can not also carry out unlocking operation, from And guarantee the safety of coded lock.
Referring to fig. 2, the embodiment of the present application also provides a kind of method for unlocking of encryption lock based on elliptic curve encryption algorithm, packets It includes:
Step 101, random generator generates random number and the random number is sent to user application software.
Step 102, user application software carries out ellipse curve signature using private key to the random number, generates verifying letter Breath, the verification information include the signature and the random number;
Step 103, information acquisition device acquires the verification information, and, the verification information is sent to verification processing Device;
Step 104, verification processing device obtains the public key and constant parameter of elliptic curve encryption algorithm;The public affairs of elliptic curve encryption algorithm Key and constant parameter are stored in algorithm information memory, and also there is no storages for encryption in algorithm information memory Private key, the terminal or software client that private key is only used by user save, so that the private key and public key of encryption and decryption separate Storage, once the leaking data of memory 11, third party can not also obtain the private key of encryption, cannot copy verification information, into And can not unlock, guarantee the safety of encryption lock.
Step 105, verification processing device is according to the public key and constant parameter of the elliptic curve encryption algorithm, to the verification information It is verified, obtains verification result;
Step 106, verification processing device judges whether to unlock according to the verification result.
As it can be seen that the encryption lock method for unlocking in the embodiment of the present application, the random number utilization that user obtains individually is stored Whether private key is encrypted, and verification information is generated, recycle the verification information of the public key verifications user individually stored correct, verifying By can then carry out unlocking operation, the method for unlocking in the application also can be avoided private key leakage, when public key leakage, also not The confidentiality for influencing private key, can be further ensured that the safety of encryption lock.
The specific structure of encryption lock in method for unlocking provided herein is the same as the encryption lock in above-mentioned each embodiment Structure it is identical.
Further, referring to Fig. 3, the random generator generates random number and the random number is sent to user's application The step of software includes:
Step 201, the preset time that encryption lock updates is obtained;
Step 202, judge whether system time reaches the requirement of the preset time;
Step 203, if system time reaches the requirement of the preset time, new random number is generated;
Step 204, the new random number is sent to user application software.
Further, referring to fig. 4, the random generator generates random number and the random number is sent to user's application The step of software includes:
Step 301, voice signal and/or optical signal are obtained;
Step 302, judge whether the voice signal and/or the optical signal are the signals for meeting more new demand;
Step 303, it if whether the voice signal and/or the optical signal are the signals for meeting more new demand, gives birth to The random number of Cheng Xin;
Step 304, the new random number is sent to user application software.
Further, referring to Fig. 5, the method for unlocking of the encryption lock based on elliptic curve encryption algorithm further include:
Step 401, the public key and the private key are matched, forms public, private key pair;
Step 402, the public key is stored in the algorithm information memory respectively, by private key deposit user's application In software;
Step 403, judge public, private key to whether needing to update;
Step 404, if the public, private key is stored in the algorithm information memory to needing to update, by new public key In, it will be in new private key deposit user application software.
Further, referring to Fig. 6, the verification processing device is according to the public key and constant parameter of elliptic curve encryption algorithm, to institute Verification information is stated to be verified, obtain verification result the step of include:
Step 501, according to the public key and constant parameter of the elliptic curve encryption algorithm, to the signature in the verification information into Row decryption, obtains ciphertext data;
Step 502, judge whether the ciphertext data and the random number in the verification information are identical;
Step 503, if the ciphertext data is identical as the random number, the verification information is proved to be successful;
Step 504, if the ciphertext data is different from the random number, the verification information authentication failed.
Further, the method for unlocking of the encryption lock based on elliptic curve encryption algorithm further include: the display random life It grows up to be a useful person random number, the corresponding two dimensional code of the random number, the verification information and the corresponding two dimension of the verification information of generation Code.
Further, the information acquisition device acquire the mode of the verification information include: by scanning the two-dimensional code or Obtain keyboard input data.
From the above technical scheme, this application provides a kind of encryption lock based on elliptic curve encryption algorithm and encryption locks Method for unlocking, random generator generate random number and random number are sent to user application software;User application software is to random Number carries out ellipse curve signature using private key, generates verification information;Information acquisition device acquires the verification information, and, it will test Card information is sent to verification processing device;The public key and constant parameter of verification processing device acquisition elliptic curve encryption algorithm;Verification processing Device verifies verification information according to the public key and constant parameter of elliptic curve encryption algorithm, obtains verification result;Verification processing device According to the verification result, judge whether to unlock.Encryption lock in technical scheme utilizes the asymmetry of elliptic curve encryption Password authentification when being unlocked, even if the information stored in lock is all cracked, but third party is if it is not known that user answers The encryption key used with software can not also carry out unlocking operation, to guarantee the safety of coded lock.
The application can be used in numerous general or special purpose computing system environments or configuration.Such as: personal computer, service Device computer, handheld device or portable device, laptop device, multicomputer system, microprocessor-based system, top set Box, programmable consumer-elcetronics devices, network PC, minicomputer, mainframe computer, including any of the above system or equipment Distributed computing environment etc..
The application can describe in the general context of computer-executable instructions executed by a computer, such as program Module.Generally, program module includes routines performing specific tasks or implementing specific abstract data types, programs, objects, group Part, data structure etc..The application can also be practiced in a distributed computing environment, in these distributed computing environments, by Task is executed by the connected remote processing devices of communication network.In a distributed computing environment, program module can be with In the local and remote computer storage media including storage equipment.
Those skilled in the art will readily occur to its of the application after considering specification and practicing application disclosed herein Its embodiment.This application is intended to cover any variations, uses, or adaptations of the application, these modifications, purposes or Person's adaptive change follows the general principle of the application and including the undocumented common knowledge in the art of the application Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the application are by following Claim is pointed out.
It should be understood that the application is not limited to the precise structure that has been described above and shown in the drawings, and And various modifications and changes may be made without departing from the scope thereof.Scope of the present application is only limited by the accompanying claims.

Claims (12)

1. a kind of encryption lock based on elliptic curve encryption algorithm characterized by comprising
Algorithm information memory, for saving the public key and constant parameter of elliptic curve encryption algorithm;
Random generator, for generating random number and the random number being sent to user application software;
User application software, for carrying out ellipse curve signature using private key to the random number, generation verification information is described to test Card information includes the signature and the random number;
Information acquisition device, for acquiring the verification information, and, the verification information is sent to verification processing device;
Verification processing device tests the verification information for the public key and constant parameter according to the elliptic curve encryption algorithm Card.
2. encryption lock according to claim 1, which is characterized in that the user application software is also used to:
Obtain the preset time that encryption lock updates;
Judge whether system time reaches the requirement of the preset time;
If system time reaches the requirement of the preset time, new random number is generated;
The new random number is sent to user application software.
3. encryption lock according to claim 1, which is characterized in that the user application software is also used to:
Obtain voice signal and/or optical signal;
Judge whether the voice signal and/or the optical signal are the signals for meeting more new demand;
If whether the voice signal and/or the optical signal are the signals for meeting more new demand, new random number is generated;
The new random number is sent to user application software.
4. encryption lock according to claim 1, which is characterized in that further include public, private key pair matcher, be used for:
The public key and the private key are matched, public, private key pair is formed;
The public key is stored in the algorithm information memory respectively, the private key is stored in user application software;
Judge public, private key to whether needing to update;
If new public key is stored in the algorithm information memory, to needing to update by new private by the public, private key Key is stored in user application software.
5. encryption lock according to claim 1, which is characterized in that the verification processing device is also used to:
According to the public key and constant parameter of the elliptic curve encryption algorithm, the signature in the verification information is decrypted, is obtained Ciphertext data;
Judge whether the ciphertext data and the random number in the verification information are identical;
If the ciphertext data is identical as the random number, the verification information is proved to be successful;
If the ciphertext data is different from the random number, the verification information authentication failed.
6. encryption lock according to claim 1-5, which is characterized in that further include display;
The display, for showing the random number that the random generator generates, the corresponding two dimensional code of the random number, described Verification information and the corresponding two dimensional code of the verification information.
7. encryption lock according to claim 6, which is characterized in that the information acquisition device is by way of scanning the two-dimensional code Or the mode of acquisition keyboard input data obtains verification information.
8. a kind of method for unlocking of the encryption lock based on elliptic curve encryption algorithm characterized by comprising
Random generator generates random number and the random number is sent to user application software;
User application software carries out ellipse curve signature using private key to the random number, generates verification information, the verifying letter Breath includes the signature and the random number;
Information acquisition device acquires the verification information, and, the verification information is sent to verification processing device;
The public key and constant parameter of verification processing device acquisition elliptic curve encryption algorithm;
Verification processing device is verified the verification information, is obtained according to the public key and constant parameter of the elliptic curve encryption algorithm Obtain verification result;
Verification processing device judges whether to unlock according to the verification result.
9. method for unlocking according to claim 8, which is characterized in that the random generator generates random number and will be described Random number is sent to the step of user application software and includes:
Obtain the preset time that encryption lock updates;
Judge whether system time reaches the requirement of the preset time;
If system time reaches the requirement of the preset time, new random number is generated;
The new random number is sent to user application software.
10. method for unlocking according to claim 8, which is characterized in that the random generator generates random number and by institute Stating the step of random number is sent to user application software includes:
Obtain voice signal and/or optical signal;
Judge whether the voice signal and/or the optical signal are the signals for meeting more new demand;
If whether the voice signal and/or the optical signal are the signals for meeting more new demand, new random number is generated;
The new random number is sent to user application software.
11. method for unlocking according to claim 8, which is characterized in that further include:
The public key and the private key are matched, public, private key pair is formed;
The public key is stored in the algorithm information memory respectively, the private key is stored in user application software;
Judge public, private key to whether needing to update;
If new public key is stored in the algorithm information memory, to needing to update by new private by the public, private key Key is stored in user application software.
12. method for unlocking according to claim 8, which is characterized in that the verification processing device is according to elliptic curve encryption algorithm Public key and constant parameter, the verification information is verified, obtain verification result the step of include:
According to the public key and constant parameter of the elliptic curve encryption algorithm, the signature in the verification information is decrypted, is obtained Ciphertext data;
Judge whether the ciphertext data and the random number in the verification information are identical;
If the ciphertext data is identical as the random number, the verification information is proved to be successful;
If the ciphertext data is different from the random number, the verification information authentication failed.
CN201811637259.1A 2018-12-29 2018-12-29 A kind of method for unlocking of encryption lock and encryption lock based on elliptic curve encryption algorithm Pending CN109801415A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811637259.1A CN109801415A (en) 2018-12-29 2018-12-29 A kind of method for unlocking of encryption lock and encryption lock based on elliptic curve encryption algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811637259.1A CN109801415A (en) 2018-12-29 2018-12-29 A kind of method for unlocking of encryption lock and encryption lock based on elliptic curve encryption algorithm

Publications (1)

Publication Number Publication Date
CN109801415A true CN109801415A (en) 2019-05-24

Family

ID=66558263

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811637259.1A Pending CN109801415A (en) 2018-12-29 2018-12-29 A kind of method for unlocking of encryption lock and encryption lock based on elliptic curve encryption algorithm

Country Status (1)

Country Link
CN (1) CN109801415A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111767532A (en) * 2020-06-12 2020-10-13 上海橙群微电子有限公司 Programmer authentication method and authentication system
CN112102524A (en) * 2019-06-18 2020-12-18 杭州萤石软件有限公司 Unlocking method and unlocking system
CN112565213A (en) * 2020-11-25 2021-03-26 青岛海尔科技有限公司 Authentication method and device, storage medium, and electronic device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101872399A (en) * 2010-07-01 2010-10-27 武汉理工大学 Dynamic digital copyright protection method based on dual identity authentication
CN103678174A (en) * 2012-09-11 2014-03-26 联想(北京)有限公司 Data safety method, storage device and data safety system
EP2720199A1 (en) * 2012-10-11 2014-04-16 Openways Sas Secured method for controlling the opening of locking devices by means of messages using symmetric encryption
CN205068524U (en) * 2015-09-01 2016-03-02 上海工程技术大学 Intelligent gate inhibition system
CN108460876A (en) * 2018-03-20 2018-08-28 中电科(天津)网络信息安全有限公司 A kind of time sync-type Quick Response Code guard method and system
CN108696476A (en) * 2017-04-06 2018-10-23 上海航迹数据信息科技有限公司 Security strategy configurable Automobile key system and its implementation

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101872399A (en) * 2010-07-01 2010-10-27 武汉理工大学 Dynamic digital copyright protection method based on dual identity authentication
CN103678174A (en) * 2012-09-11 2014-03-26 联想(北京)有限公司 Data safety method, storage device and data safety system
EP2720199A1 (en) * 2012-10-11 2014-04-16 Openways Sas Secured method for controlling the opening of locking devices by means of messages using symmetric encryption
CN205068524U (en) * 2015-09-01 2016-03-02 上海工程技术大学 Intelligent gate inhibition system
CN108696476A (en) * 2017-04-06 2018-10-23 上海航迹数据信息科技有限公司 Security strategy configurable Automobile key system and its implementation
CN108460876A (en) * 2018-03-20 2018-08-28 中电科(天津)网络信息安全有限公司 A kind of time sync-type Quick Response Code guard method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张仕斌: "《应用密码学》", 31 January 2017, 西安电子科技大学出版社 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112102524A (en) * 2019-06-18 2020-12-18 杭州萤石软件有限公司 Unlocking method and unlocking system
CN111767532A (en) * 2020-06-12 2020-10-13 上海橙群微电子有限公司 Programmer authentication method and authentication system
CN112565213A (en) * 2020-11-25 2021-03-26 青岛海尔科技有限公司 Authentication method and device, storage medium, and electronic device

Similar Documents

Publication Publication Date Title
EP3721578B1 (en) Methods and systems for recovering data using dynamic passwords
AU2018246993B2 (en) Systems and methods for providing digital identity records to verify identities of users
US9900309B2 (en) Methods for using digital seals for non-repudiation of attestations
US20180173871A1 (en) Systems and Methods for Registering and Acquiring E-Credentials using Proof-of-Existence and Digital Seals
CN103440444B (en) The signing method of electronic contract
CN108881253B (en) Block chain real name participation method and system
WO2017032263A1 (en) Identity authentication method and apparatus
CN108833114A (en) A kind of decentralization identity authorization system and method based on block chain
JP5287550B2 (en) Biometric authentication system, biometric authentication method, biometric authentication device, biometric information processing device, biometric authentication program, and biometric information processing program
US11258591B2 (en) Cryptographic key management based on identity information
US20140337635A1 (en) Biometric verification with improved privacy and network performance in client-server networks
Gasti et al. Secure, fast, and energy-efficient outsourced authentication for smartphones
CN108229188A (en) It is a kind of to be signed documents with tagged keys and verification method
CN109801415A (en) A kind of method for unlocking of encryption lock and encryption lock based on elliptic curve encryption algorithm
CN109741063A (en) Digital signature method and device based on block chain
CN108989346A (en) The effective identity trustship agility of third party based on account concealment authenticates access module
CN110175441A (en) Data managing method, device, equipment and storage medium based on bio-identification
CN109660353A (en) A kind of application program installation method and device
US20190028456A1 (en) System and method for injecting a tag into a computing resource
US20230050280A1 (en) Computer-implemented user identity verification method
KR100908100B1 (en) Encrypted image data with matryoshka structure and, system and method for mutual synchronization certificating using the same
TWI724681B (en) Managing cryptographic keys based on identity information
CN106100851A (en) Password management system, intelligent wristwatch and cipher management method thereof
CN108540447A (en) A kind of certification authentication method and system based on block chain
Cavoukian et al. Keynote paper: Biometric encryption: Technology for strong authentication, security and privacy

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190524

RJ01 Rejection of invention patent application after publication