CN114614982A - Intelligent measurement password application system and application method thereof - Google Patents

Intelligent measurement password application system and application method thereof Download PDF

Info

Publication number
CN114614982A
CN114614982A CN202210174443.7A CN202210174443A CN114614982A CN 114614982 A CN114614982 A CN 114614982A CN 202210174443 A CN202210174443 A CN 202210174443A CN 114614982 A CN114614982 A CN 114614982A
Authority
CN
China
Prior art keywords
password
file
central processing
processing unit
signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210174443.7A
Other languages
Chinese (zh)
Inventor
黄浩
付佳佳
周安
杨云帆
郭为斌
汤怿
邓建锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Power Grid Co Ltd
Electric Power Dispatch Control Center of Guangdong Power Grid Co Ltd
Original Assignee
Guangdong Power Grid Co Ltd
Electric Power Dispatch Control Center of Guangdong Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Power Grid Co Ltd, Electric Power Dispatch Control Center of Guangdong Power Grid Co Ltd filed Critical Guangdong Power Grid Co Ltd
Priority to CN202210174443.7A priority Critical patent/CN114614982A/en
Publication of CN114614982A publication Critical patent/CN114614982A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key

Abstract

The application relates to an intelligent measurement password application system and an application method thereof, wherein the system comprises a client and a central processing unit; the client is used for sending the file to be stored to the central processing unit, the central processing unit is used for encrypting and storing the file to be stored and obtaining a corresponding decryption secret key, and the central processing unit is also used for scrambling and integrating the decryption secret key to obtain a password corresponding to the secret key recombination; the password is used for recombining the key to decrypt the file. The decryption secret key after the file is encrypted and stored is scrambled, and then the scrambled secret key and the scrambled password are recombined to obtain the password corresponding to the key recombination, so that the secret key for storing the file is set as the password, the password is scrambled and recombined, the password is guaranteed not to be broken by people, and the password safety is improved.

Description

Intelligent measurement password application system and application method thereof
Technical Field
The present application relates to the field of measurement password encryption application technologies, and in particular, to an intelligent measurement password application system and an application method thereof.
Background
The key, i.e. the key, generally refers to various encryption technologies applied in production and life, and can effectively supervise personal data and enterprise secrets, and the key management refers to actions of managing the key, such as encryption, decryption, and the like. The intelligent measuring password is formed by disorganizing and recombining the password, so that the diversity of the password can be ensured, and the password cannot be cracked.
The traditional secret key storage password is usually set by a user, and the password is easy to crack, so that a file or an account number is stolen, and the defect of low password security exists.
Disclosure of Invention
Accordingly, there is a need to provide an intelligent measurement password application system and an application method thereof, which can improve the security of the password.
An intelligent measurement password application system comprises a client and a central processing unit; the client is used for sending a file to be stored to the central processing unit, the central processing unit is used for encrypting and storing the file to be stored and obtaining a corresponding decryption key, and the central processing unit is also used for scrambling and integrating the decryption key to obtain a password recombined by a corresponding key; the password is used for recombining the key to decrypt the file.
In one embodiment, the central processing unit is further configured to, when receiving file reading information sent by the client, obtain a password of a corresponding stored file according to the file reading information.
In one embodiment, the central processing unit obtains a storage location corresponding to the storage file according to the file reading information, and obtains a password corresponding to the storage file according to the storage location.
In one embodiment, the application system further comprises a signal transmitter and a signal receiver, wherein the signal transmitter is connected with the client, and the signal receiver is connected with the central processing unit.
In one embodiment, the signal receiver is used for displaying the received password when the signal is judged not to be intercepted.
In one embodiment, the signal receiver is further configured to reject the signal wave when the signal is intercepted, and upload rejection information to the central processing unit.
In one embodiment, the signal receiver is further configured to determine whether the received signal is fluctuating.
An application method of an intelligent measurement password application system is realized based on the intelligent measurement password application system, and the method comprises the following steps:
the client sends the file to be stored to the central processing unit;
the central processing unit encrypts and stores the file to be stored and obtains a corresponding decryption key;
the central processing unit scrambles and integrates the decryption secret key to obtain a password corresponding to the secret key recombination; the password is used for recombining the secret key to decrypt the file.
In one embodiment, the method further comprises: and when receiving the file reading information sent by the client, the central processing unit acquires the password of the corresponding stored file according to the file reading information.
In one embodiment, the obtaining a password corresponding to a stored file according to the file reading information includes: and acquiring a storage position corresponding to the storage file according to the file reading information, and acquiring a password corresponding to the storage file according to the storage position.
According to the intelligent measurement password application system and the application method thereof, after the central processing unit encrypts and stores the file to be stored and obtains the corresponding decryption secret key, the decryption secret key is scrambled and integrated to obtain the password with the corresponding secret key recombination, and the password is used as the recombination secret key to decrypt the file. The decryption secret key after the file is encrypted and stored is scrambled, and then the scrambled secret key and the scrambled password are recombined to obtain the password corresponding to the key recombination, so that the secret key for storing the file is set as the password, the password is scrambled and recombined, the password is guaranteed not to be broken by people, and the password safety is improved.
Drawings
FIG. 1 is a schematic diagram of an embodiment of an intelligent metrology cryptographic application;
FIG. 2 is a schematic diagram of a signal receiver according to an embodiment;
FIG. 3 is a flowchart illustrating an application method of the smart metering password application system according to an embodiment.
Description of reference numerals: 1. a client; 2. a central processing unit; 21. an information storage unit; 22. saving the file unit; 23. an encryption system; 24. a key scrambling system; 25. a password reorganization system; 26. extracting a file unit; 27. a password login unit; 28. a password transmitting unit; 3. a signal transmitter; 4. a signal receiver; 41. an anti-interception module; 42. a cryptographic receiver; 43. a password display; 44. a signal wave observation unit; 45. a rejection signal wave unit; 46. and a rejected information uploading unit.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein in the description of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application.
It will be understood that when an element is referred to as being "connected" to another element, it can be directly connected to the other element or be connected to the other element through intervening elements. The "connection" in the following embodiments is to be understood as "electrical connection", "communication connection", and the like if the connected circuits, modules, units, and the like have transmission of electrical signals or data therebetween.
As used herein, the singular forms "a", "an" and "the" may include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises/comprising," "includes" or "including," etc., specify the presence of stated features, integers, steps, operations, components, parts, or combinations thereof, but do not preclude the presence or addition of one or more other features, integers, steps, operations, components, parts, or combinations thereof. Also, the terminology used in this specification includes any and all combinations of the associated listed items.
In one embodiment, as shown in fig. 1, an intelligent measurement password application system is provided, which includes a client 1 and a central processor 2; the client 1 is used for sending a file to be stored to the central processing unit 2, and the central processing unit 2 is used for encrypting and storing the file to be stored and obtaining a corresponding decryption key, and is also used for scrambling and integrating the decryption key to obtain a password recombined by a corresponding key; the password is used for recombining the key to decrypt the file.
The client 1 is a device for connecting to a network, and may be a desktop computer, a notebook, or a wearable device. After connecting with the network equipment, the client 1 puts the files to be accessed into the central processor 2 of the website. Specifically, as shown in fig. 1, the central processing unit 2 includes an information storage unit 21, a file saving unit 22, an encryption system 23, a key scrambling system 24, and a password restructuring system 25. The file saving unit 22 saves the file in the storage space of the central processing unit 2, and the encryption system 23 encrypts and saves the saved file. In order to ensure the security of the file stored in the website, the user uses the client 1 to log in the website or software, and stores the important file into the website or software, the website or software encrypts the file by the central processing unit 2, the information storage unit 21 in the central processing unit 2 stores the file into the storage space of the central processing unit 2 by the file storage unit 22, and the encryption system 23 encrypts the file after storage to obtain the key for recombination. The key scrambling system 24 scrambles the obtained key at regular time, and the password restructuring system 25 restructures the scrambled key with the password, so that the password is continuously updated according to the key.
According to the intelligent measurement password application system, the decryption secret keys after the files are encrypted and stored are scrambled, and then the scrambled secret key passwords are recombined to obtain the passwords corresponding to the secret key recombination, so that the secret key for storing the files is set as the password, the passwords are scrambled and recombined, the password is guaranteed not to be broken by people, and the password security is improved.
In one embodiment, the central processing unit 2 is further configured to, when receiving file reading information sent by the client 1, obtain a password corresponding to the stored file according to the file reading information. The central processing unit 2 obtains the storage position of the corresponding storage file according to the file reading information, and obtains the password of the corresponding storage file according to the storage position.
In one embodiment, the application system further comprises a signal transmitter 3 and a signal receiver 4, wherein the signal transmitter 3 is connected with the client 1, and the signal receiver 4 is connected with the central processing unit 2. Specifically, the central processor 2 further includes an extraction file unit 26, a password login unit 27, and a password transmission 28. When a file needs to be taken out, the information storage unit 21 opens the file storage position through the file extraction unit 26, acquires a password through the password login unit 27, sends the password recombined by the password recombination system 25 to the client 1 through the password sending unit 28, sends the password from the signal transmitter 3 to the signal receiver 4 through the client 1, recombines the key through the password displayed on the signal receiver 4 by the central processing unit 2, and decrypts and opens the file.
In one embodiment, the signal receiver 4 is configured to display the received password when the signal is determined not to be intercepted. Specifically, as shown in fig. 2, the signal receiver 4 includes an interception prevention module 41, a password receiver 42, and a password display 43. The anti-interception module 41 analyzes the received signal to see whether the signal is intercepted, and when the signal is determined not to be intercepted, the password receiver 42 receives the password and displays the password through the password display 43.
In one embodiment, the signal receiver is further configured to determine whether the received signal is fluctuating. Specifically, the anti-interception module 41 further includes a signal wave observation unit 44, and the anti-interception module 41 observes whether the transmitted signal fluctuates through the signal wave observation unit 44.
Further, in one embodiment, the signal receiver 4 is further configured to reject the signal wave when the signal is intercepted, and upload the rejection information to the central processing unit. Specifically, the anti-interception module 41 further includes a rejection signal wave unit 45 and a rejection information uploading unit 46, and when the signal wave observation unit 44 finds that the signal wave fluctuates, it is determined that the signal is intercepted, and the rejection signal wave unit 45 rejects the received signal wave, and the rejection information uploading unit 46 sends the reason and the problem of rejection to the central processing unit 2.
In order to ensure that information cannot be stolen by others in the signal receiving process, in the receiving process of the signal receiver 4, the signal wave observation unit 44 in the anti-interception module 41 observes the received signal waves, when the possibility of stealing is detected, the rejection signal wave unit 45 rejects the received signals to the signal receiver 4, the passwords cannot be displayed on the signal receiver 43, the rejection information uploading unit 46 transmits the problems back to the central processing unit 2 from the signal receiver 4, the central processing unit 2 retransmits new passwords to the client 1, and when the anti-interception module 41 does not detect that the information is intercepted, the password receiver 42 displays the new passwords through the password display 43. After the password display 43 displays the new password, the central processing unit 2 recombines the key with the displayed password and decrypts and opens the file.
In an embodiment, an application method of the smart metering password application system is further provided, which is implemented based on the smart metering password application system, and the method includes: the client sends the file to be stored to the central processing unit; the central processing unit encrypts and stores the file to be stored and obtains a corresponding decryption key; the central processing unit scrambles and integrates the decryption secret key to obtain a password corresponding to the secret key recombination; the password is used for recombining the key to decrypt the file.
In one embodiment, the method further comprises: and when receiving the file reading information sent by the client, the central processing unit acquires the password of the corresponding stored file according to the file reading information. Wherein, the password of the corresponding storage file is obtained according to the file reading information, including: and acquiring the storage position of the corresponding storage file according to the file reading information, and acquiring the password of the corresponding storage file according to the storage position.
According to the application method of the intelligent measurement password application system, the decryption secret keys after the files are encrypted and stored are scrambled, and then the scrambled secret key passwords are recombined to obtain the passwords corresponding to the secret key recombination, so that the secret key of the stored files is set as the password, the passwords are scrambled and recombined, the password is guaranteed not to be broken by people, and the password security is improved.
In order to better understand the above smart metering password application system and the application method thereof, the following detailed description is made with reference to specific embodiments.
The existing secret key storage password is usually set by a user, the password is easy to crack, so that a file or an account number is stolen, if a method for updating the password in a random mode is used, signals are easy to intercept in the password transmission process, and the password is possible to be stolen. Based on the above, the application provides an intelligent measurement password application system based on key management and an application method thereof, which can effectively solve the problems that in the prior art, passwords for storing the keys are too simple and are easy to be stolen, signals for transmitting the passwords are easy to be intercepted in the transmission process, and a user does not observe the passwords during the interception process, so that files are stolen.
Specifically, as shown in fig. 1, an intelligent measurement password application system based on key management includes a client 1 and a central processing unit 2, and the central processing unit 2 and the client 1 are connected in a bidirectional manner, where:
the client 1 is a device for connecting a network, and after the device is connected with the network, a file to be accessed is placed in a central processing unit 2 of a website, and the output end of the client 1 is connected with a signal transmitter 3. The output end of the signal transmitter 3 is connected with the signal receiver 4, the central processing unit 2 comprises an information storage unit 21, the output end of the information storage unit 21 is connected with a file storage unit 22, and the file storage unit 22 stores files in a storage space in the central processing unit 2. The output end of the file storage unit 22 is connected with an encryption system 23, and the encryption system 23 encrypts and stores the stored file.
As shown in fig. 1, the output end of the encryption system 23 is connected to a key scrambling system 24, and the output end of the key scrambling system 24 is connected to a cipher recombining system 25. The output end of the information storage unit 21 is connected with an extraction file unit 26, the output end of the extraction file unit 26 is connected with a password registration unit 27, and the output end of the password registration unit 27 is connected with a password transmission unit 28. The password sending unit 28 and the password reorganizing system 25 are connected in a bidirectional mode, and when the encrypted file needs to be taken out, the password reorganizing system 25 sends the latest updated password to the signal receiver 4 from the signal transmitter 3 through the password sending unit 28.
In this embodiment, in order to ensure that the files are stored in the website more safely, the user logs in the website or the software by using the client 1, stores the important files in the website or the software, the website or the software encrypts the files by the central processing unit 2, the information storage unit 21 in the central processing unit 2 stores the files in the storage space of the central processing unit 2 by the file storage unit 22, and the encryption system 23 encrypts the files after storage to obtain the key for recombination. The key scrambling system 24 scrambles the obtained key at regular time, and the password restructuring system 25 restructures the scrambled key by the password, so that the password is continuously updated according to the key.
When a file needs to be taken out, the information storage unit 21 opens the file storage position through the file extraction unit 26, acquires the password through the password login unit 27, sends the password recombined by the password recombination system 25 to the signal receiver 4 from the signal transmitter 3 through the password sending unit 28, recombines the key through the password displayed on the signal receiver 4, and decrypts and opens the file.
Further, as shown in fig. 2, the output end of the signal receiver 4 is connected to an anti-interception module 41, and the anti-interception module 41 analyzes the received signal to check whether the signal is intercepted. The output end of the interception preventing module 41 is connected with a password receiver 42, and when the signal is determined not to be intercepted, the password receiver 42 receives the password and displays the password through a password display 43.
The output end of the interception preventing module 41 is connected to a signal wave observing unit 44, and the interception preventing module 41 observes whether the transmitted signal fluctuates through the signal wave observing unit 44. The output end of the signal wave observation unit 44 is connected with a rejection signal wave unit 45, the signal wave observation unit 44 finds that the signal wave is intercepted, and the signal wave is rejected and received through the rejection signal wave unit 45. The output end of the rejection signal wave 45 is connected with a rejection information uploading unit 46, and the rejection signal wave unit 45 sends the reason and the problem of the rejection to the central processing unit 2.
In this embodiment, in order to ensure that information is not stolen by others in the signal receiving process, the signal wave observation unit 44 in the interception preventing module 41 in the receiving process of the signal receiver 4 observes the received signal wave, when it is detected that the stealing is possible, the rejection signal wave unit 45 rejects the received signal to the signal receiver 4, the password is not displayed on the signal receiver 4, the rejection information uploading unit 46 transmits the problem from the signal receiver 4 back to the central processing unit 2, the central processing unit 2 retransmits a new password, and when the interception preventing module 41 does not detect that the information is intercepted, the password receiver 42 displays the new password through the password display 43.
As shown in fig. 3, a method for applying smart metering passwords based on key management includes:
and S1, logging in the related website or the storage software, and dragging the important files needing to be stored into the related website or the storage software.
S2, the system compresses and encrypts the stored file and obtains the corresponding decryption key.
S3, the system breaks up the keys continuously and integrates the passwords capable of recombining the corresponding keys.
And S4, sending the recombined new password code to the receiver.
S5, during the receiving process of the signal receiver, it will be detected whether the password transmission process is intercepted.
And S6, refusing to receive the new password after the interception is successful, and informing the system to resend the new password.
S7, when the new password is not intercepted, the password is displayed through the display.
And S8, the file can be viewed or taken out by inputting the password.
In order to ensure that files are stored in a website more safely, a user logs in the website or software by using the client 1, important files are stored in the website or software, the website or software is encrypted by the central processing unit 2, the information storage unit 21 in the central processing unit 2 stores the files in the storage space of the central processing unit 2 through the file storage unit 22, and the encryption system 23 encrypts the files after storage to obtain a key for recombination. The key scrambling system 24 scrambles the obtained key at regular time, and the password restructuring system 25 restructures the scrambled key by the password, so that the password is continuously updated according to the key. When a file needs to be taken out, the information storage unit 21 opens the file storage position through the file extraction unit 26, acquires the password through the password login unit 27, then transmits the password reconstructed by the password reconstruction system 25 from the signal transmitter 3 to the signal receiver 4 through the password transmission unit 28, reconstructs the key through the password displayed on the signal receiver 4, and decrypts and opens the file.
In order to ensure that information cannot be stolen by others in the signal receiving process, the signal wave observation unit 44 in the anti-interception module 41 in the receiving process of the signal receiver 4 observes the received signal waves, when the possibility of stealing is detected, the rejection signal wave unit 45 rejects the received signals to the signal receiver 4, the passwords cannot be displayed on the signal receiver 4, the rejection information uploading unit 46 transmits the problems back to the central processing unit 2 from the signal receiver 4, the central processing unit 2 retransmits new passwords, and when the anti-interception module 41 does not detect that the information is intercepted, the password receiver 42 displays the new passwords through the password display 43.
Compared with the prior art, the technical scheme provided by the application has the following beneficial effects:
1. the application realizes bidirectional connection between a central processing unit and a client by increasing the design of secret key management and password measurement, the output end of the client is connected with a signal transmitter, the output end of the signal transmitter is connected with a signal receiver, the central processing unit comprises an information storage unit, the output end of the information storage unit is connected with a file storage unit, the output end of the file storage unit is connected with an encryption system, the output end of the encryption system is connected with a secret key scrambling system, the output end of the secret key scrambling system is connected with a password recombination system, the output end of the information storage unit is connected with a file extraction unit, the output end of the file extraction unit is connected with a password login unit, the output end of the password login unit is connected with a password sending unit, and the bidirectional connection between the password sending unit and the password recombination system is realized, so that the secret key of the file to be stored is set as a password, and the password is disorderly and recombined at regular time, so that the password is not broken by people, and the security of the password is improved.
2. This application is through the design that increases password signal transmission, output through signal receiver is connected with prevents the interception module, the output of preventing the interception module is connected with password receiver, the output of preventing the interception module is connected with signal wave observation unit, signal wave observation unit's output is connected with rejection signal wave unit, the output of rejection signal wave unit is connected with rejection information and uploads the unit, the reason and the problem that rejection signal wave unit will reject are sent to central processing unit, thereby reach signal receiver and can detect whether intercepted received signal, realized whether the password is intercepted and change new password, the password of having avoided the receiver to receive is that to be intercepted by the people and looked over excessively, lead to the password outflow, make file or account number stolen problem.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. An intelligent measurement password application system is characterized by comprising a client and a central processing unit; the client is used for sending a file to be stored to the central processing unit, the central processing unit is used for encrypting and storing the file to be stored and obtaining a corresponding decryption key, and the central processing unit is also used for scrambling and integrating the decryption key to obtain a password recombined by a corresponding key; the password is used for recombining the key to decrypt the file.
2. The system according to claim 1, wherein the cpu is further configured to obtain the password corresponding to the stored file according to the file reading information when receiving the file reading information sent by the client.
3. The system of claim 2, wherein the cpu obtains a storage location corresponding to the storage file according to the file reading information, and obtains a password corresponding to the storage file according to the storage location.
4. The smart metering password application system of claim 1, further comprising a signal transmitter and a signal receiver, wherein the signal transmitter is connected to the client and the signal receiver is connected to the central processing unit.
5. The system of claim 4, wherein the signal receiver is configured to display the received password when the signal is determined not to be intercepted.
6. The smart metering password application system of claim 5, wherein the signal receiver is further configured to reject the signal wave when the signal is intercepted, and to upload the rejected signal to the CPU.
7. The smart metering password application system of claim 4, wherein the signal receiver is further configured to determine whether the received signal fluctuates.
8. An application method of an intelligent measurement password application system, which is implemented based on the intelligent measurement password application system of any one of claims 1 to 6, the method comprising:
the client sends the file to be stored to the central processing unit;
the central processing unit encrypts and stores the file to be stored and obtains a corresponding decryption key;
the central processing unit scrambles and integrates the decryption secret key to obtain a password corresponding to the secret key recombination; the password is used for recombining the secret key to decrypt the file.
9. The method of claim 8, further comprising:
and when receiving the file reading information sent by the client, the central processing unit acquires the password of the corresponding stored file according to the file reading information.
10. The method according to claim 9, wherein the obtaining the password of the corresponding stored file according to the file reading information includes: and acquiring a storage position corresponding to the storage file according to the file reading information, and acquiring a password corresponding to the storage file according to the storage position.
CN202210174443.7A 2022-02-24 2022-02-24 Intelligent measurement password application system and application method thereof Pending CN114614982A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210174443.7A CN114614982A (en) 2022-02-24 2022-02-24 Intelligent measurement password application system and application method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210174443.7A CN114614982A (en) 2022-02-24 2022-02-24 Intelligent measurement password application system and application method thereof

Publications (1)

Publication Number Publication Date
CN114614982A true CN114614982A (en) 2022-06-10

Family

ID=81858494

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210174443.7A Pending CN114614982A (en) 2022-02-24 2022-02-24 Intelligent measurement password application system and application method thereof

Country Status (1)

Country Link
CN (1) CN114614982A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101355630A (en) * 2007-07-26 2009-01-28 佳能株式会社 Data processing apparatus, data processing system, and control method therefor
US20090208004A1 (en) * 2005-01-28 2009-08-20 Oak Information System Corportation File Encrypting/Decrypting Method, Apparatus, Program, And Computer-Readable Recording Medium Storing The Program
CN108574567A (en) * 2018-03-19 2018-09-25 西安邮电大学 Private file protection and cryptographic-key management system and method, the information processing terminal
CN109995785A (en) * 2019-04-04 2019-07-09 长春大学 File security unlocking method in local area network based on quantum cryptography
CN112311865A (en) * 2020-10-23 2021-02-02 苏州浪潮智能科技有限公司 File encryption transmission method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090208004A1 (en) * 2005-01-28 2009-08-20 Oak Information System Corportation File Encrypting/Decrypting Method, Apparatus, Program, And Computer-Readable Recording Medium Storing The Program
CN101355630A (en) * 2007-07-26 2009-01-28 佳能株式会社 Data processing apparatus, data processing system, and control method therefor
CN108574567A (en) * 2018-03-19 2018-09-25 西安邮电大学 Private file protection and cryptographic-key management system and method, the information processing terminal
CN109995785A (en) * 2019-04-04 2019-07-09 长春大学 File security unlocking method in local area network based on quantum cryptography
CN112311865A (en) * 2020-10-23 2021-02-02 苏州浪潮智能科技有限公司 File encryption transmission method and device

Similar Documents

Publication Publication Date Title
CN102685093B (en) A kind of identity authorization system based on mobile terminal and method
CN103748829B (en) Use the authentication method and device of the disposal password comprising biometric image information
CN106603577A (en) E-mail encryption method and system
CN104618115A (en) Identity card information obtaining method and system
CN105184935A (en) Bluetooth intelligent lock system capable of sharing passwords by WeChat
CN111294203B (en) Information transmission method
CN105635131B (en) Transmit data method, device and server
CN105554741A (en) Communication information transmission method and system, and apparatus
CN105959648B (en) A kind of encryption method, device and video monitoring system
CN111431896A (en) Data sharing method and system
CN108401494B (en) Method and system for transmitting data
CN111178874B (en) Transaction method and system based on blockchain cold wallet
CN102227106B (en) Method and system for intelligent secret key equipment to communicate with computer
DE112013000017T5 (en) The communication transmission method and system
CN115776413B (en) Iris encryption-based data transmission method and system
CN114614982A (en) Intelligent measurement password application system and application method thereof
CN109639688B (en) Internet of things safety protection system and protection method thereof
CN115118751B (en) Blockchain-based supervision system, method, equipment and medium
FR2769446A1 (en) Identification and authentication system for users of data network
CN112446982A (en) Method, device, computer readable medium and equipment for controlling intelligent lock
Zhang et al. Cloud shredder: Removing the laptop on-road data disclosure threat in the cloud computing era
CN106972928B (en) Bastion machine private key management method, device and system
CN110149210A (en) A kind of data transmission method and device
CN109450631A (en) Key generation device and management system, data processing equipment, data transacting system
CN112769764A (en) Metering data transmission key storage method of instrument and transmission method and device thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination