CN105337733A - Two-dimensional code locking control method based on combination of synchronous-asynchronous secret key verification - Google Patents

Two-dimensional code locking control method based on combination of synchronous-asynchronous secret key verification Download PDF

Info

Publication number
CN105337733A
CN105337733A CN201510829453.XA CN201510829453A CN105337733A CN 105337733 A CN105337733 A CN 105337733A CN 201510829453 A CN201510829453 A CN 201510829453A CN 105337733 A CN105337733 A CN 105337733A
Authority
CN
China
Prior art keywords
asynchronous
lock
crypto
control equipment
lock control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510829453.XA
Other languages
Chinese (zh)
Other versions
CN105337733B (en
Inventor
黄权
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Synodata Security Technology Co Ltd
Original Assignee
Hangzhou Synodata Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Synodata Security Technology Co Ltd filed Critical Hangzhou Synodata Security Technology Co Ltd
Priority to CN201510829453.XA priority Critical patent/CN105337733B/en
Publication of CN105337733A publication Critical patent/CN105337733A/en
Application granted granted Critical
Publication of CN105337733B publication Critical patent/CN105337733B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention relates to a two-dimensional code locking control method based on combination of synchronous-asynchronous secret key verification. The two-dimensional code locking control method based on the combination of synchronous-asynchronous secret key verification comprises locking control equipment and unlocking equipment. Two-dimensional code locking control steps are as follows: the unlocking equipment is initialized, a public and private secret key pair Pub and Pri, a synchronous password A2 and an asynchronous password B2 are randomly produced, the private key Pri and the synchronous password A2 are stored, the public key Pub, the synchronous password A2 and the asynchronous password B2 are transmitted to the locking control equipment to be stored for replacing the original public key Pub, a synchronous secrete key A1 and an asynchronous password B1; during unlocking, the unlocking equipment randomly produces the asynchronous password B2, encryption is carried out on the synchronous password B2 and the synchronous password A2 with the private key Pri, so as to generate two-dimensional code picture data, and the two-dimensional code picture data is transmitted to the locking control equipment; and the locking control equipment is decrypted by adopting the public key Pub, the synchronous password A2 and the asynchronous password B2 transmitted by the unlocking equipment are acquired, the synchronous password and the asynchronous password are verified, when A2 is equal to A1 and B2 is not equal to B1, verification is successful, equipment is successfully unlocked, and B2 and B1 are replaced.

Description

A kind ofly veritify the two-dimensional code lock control method combined based on synchronous asynchronous key
Technical field
The present invention relates to and a kind ofly veritify the two-dimensional code lock control method combined based on synchronous asynchronous key.
Background technology
Along with the fast development of the Internet, cloud computing, technology of Internet of things, the intelligent terminal application extensions such as mobile phone are increasing, Great War is paid under the line of particularly nearest Alipay, micro-letter, the fast culture application habit of public users to mobile phone barcode scanning, all things on earth is interconnected in addition will inevitably require that each intelligence or non intelligent object have an ID that can carry out identification, and the low-cost advantage of two-dimension code label can impel and become one of fine selection scheme.Along with the market-oriented demand driving of mobile payment, industrial products identification, Quick Response Code recognition performance and product cost are also being continued to optimize.Quick Response Code can carry out the transmission of larger data easily as the carrier that photooptical data transmits between two autonomous devices, as long as can be applied in completely in the higher lock control kind equipment system of requirement of shelter in conjunction with some Technology On Data Encryptions accordingly.As long as add two dimension code reading module from now on electronic lock controlled kind equipment, the mobile terminal devices such as the smart mobile phone of band SE habitually can be used to carry out brush screen certification and to unblank.
Dynamic puzzle-lock scheme based on time match: unlocking cipher generates equipment and generates based on OTP algorithm the dynamic password KeyA that unblanks according to the synchronization criterion time, then manually dynamic password KeyA is transferred to lock control equipment and compares by the mode such as key-press input, wireless communication transmission, Quick Response Code identification, lock control equipment generates based on identical OTP algorithm the dynamic password KeyB that unblanks according to the synchronization criterion time equally and compares with the dynamic password KeyA received, namely success is unblanked, and unsuccessfully namely prompting is unblanked unsuccessfully.
There is following shortcoming in such scheme:
1. the lock control equipment of off line need add a RTC clock module more accurately, for synchronously generating the fiducial time of dynamic password institute foundation;
2.RTC clock module can bring the extra increase of hardware cost;
3.RTC clock module must live line work constantly, causes lock control equipment cannot all power-off when non operating state, can increase extra power consumption consumption to Whole Equipment;
4. must there is the clock of RTC clock module in a synchronous off-line lock control fiducial time equipment and unlocking cipher equipment foundation, how no matter RTC clock module be precisely certain to produce deviation with fiducial time, cause the scheme that must need to consider the adjustment of time reference periodic synchronization, increase the inconvenience of applicating maintenance.
Summary of the invention
The invention provides a kind of with low cost, transformation is convenient, high safety, easy to operately simply veritify based on synchronous asynchronous key the two-dimensional code lock control method combined.
The technical solution used in the present invention is:
A kind ofly veritify the two-dimensional code lock control method combined based on synchronous asynchronous key, comprise lock control equipment and Lock-Picking Devices, first safe unit and Quick Response Code decoder module are installed in described lock control equipment, be provided with the second safe unit in described Lock-Picking Devices, the Quick Response Code lock control step of described Lock-Picking Devices and lock control equipment is as follows:
(1) initialization Lock-Picking Devices, public and private key double secret key Pub and Pri of random generation Lock-Picking Devices, Synchronizing Passwords A2, asynchronous crypto B2, private key Pri, Synchronizing Passwords A2 are stored in the second safe unit, and PKI Pub, Synchronizing Passwords A2, asynchronous crypto B2 are generated the configuration of two-dimension code image wait to lock control equipment;
(2) trigger lock control equipment and enter Lock-Picking Devices match settings pattern, the Quick Response Code decoder module of lock control equipment is allowed to scan the two-dimension code image that generates in step (1) of Lock-Picking Devices, and by parse from two-dimension code image PKI Pub, Synchronizing Passwords A2, asynchronous crypto B2 PKI Pub, the synchronisation key A1 of equipment of itself end, asynchronous crypto B1 replaced respectively and safe storage in the first safe unit, complete mating of Lock-Picking Devices and lock control equipment;
(3) when needing to unblank, second safe unit of Lock-Picking Devices produces asynchronous crypto B2 at random, the asynchronous crypto B2 of current generation and the Synchronizing Passwords A2 private key Pri be stored in the second safe unit are encrypted and generate two-dimension code image data in the second safe unit, and coding generation Quick Response Code password picture is shown on the display screen that carries;
(4) the Quick Response Code password picture of the middle encryption generated of the Quick Response Code decoder module scanning step (3) of lock control equipment, with being stored in the two-dimension code image decrypt data to encryption of PKI Pub in the first safe unit time initial, obtain the initial data of Synchronizing Passwords A2 that Lock-Picking Devices will transmit and asynchronous crypto B2;
(5) initial data of the Synchronizing Passwords A2 obtained in step (4) and asynchronous crypto B2 and the Synchronizing Passwords A1 stored in the inner and asynchronous crypto B1 are veritified by the first safe unit of lock control equipment respectively, when the asynchronous crypto B2 of Synchronizing Passwords A1 and Lock-Picking Devices end that the Synchronizing Passwords A2 of Lock-Picking Devices end equals lock control equipment end is not equal to the asynchronous crypto B1 of lock control equipment end, veritification is passed through, equipment is unblanked successfully, and the asynchronous crypto B2 obtained is replaced the original asynchronous crypto B1 in lock control equipment and stores backed off after random flow process, otherwise veritify and do not pass through, prompting is unblanked directly to exit flow process after failure.
Further, in step (5), hypothesis asynchronous crypto is an ascending order counting rule, when the asynchronous crypto B2 of Synchronizing Passwords A1 and Lock-Picking Devices end that the Synchronizing Passwords A2 of Lock-Picking Devices end equals lock control equipment end is greater than the asynchronous crypto B1 of lock control equipment end, veritification is passed through, equipment is unblanked successfully, and the asynchronous crypto B2 obtained is replaced the original asynchronous crypto B1 in lock control equipment and stores backed off after random flow process, otherwise veritification is not passed through, prompting is unblanked directly to exit flow process after failure.
Beneficial effect of the present invention:
1, the synchronous asynchronous key that forward and reverse thinking is derived veritifies mode, ensures the not reproducible usability of Quick Response Code password picture and expired ineffectivity;
2, lock control system equipment adopts safe unit to be security kernel, the high security ensure that password produces, running, store;
3, based on the Multiple Combination authentication mechanism of asymmetric cryptographic algorithm certification, synchronisation key certification, asynchronous key authentication, ensure Quick Response Code password picture anti-ly to crack, anti-counterfeiting, even if when lock control equipment end does not adopt safe unit, Synchronizing Passwords and asynchronous crypto are stolen and crack, as long as the Lock-Picking Devices private key Pri of Lock-Picking Devices end is not exported, also can ensure that Quick Response Code password picture illegally can not be forged application;
4, Lock-Picking Devices are expanded conveniently, the mode that the conventional mobile device such as mobile phone, PAD can be adopted to increase the external safe TF card based on SE can realize the fail safe the same with special Lock-Picking Devices, without the need to additionally carrying special Lock-Picking Devices under the application habit of routine, and application safety, convenience, succinct.
Accompanying drawing explanation
Fig. 1 is system block diagram of the present invention.
Fig. 2 is the structured flowchart unblanking to judge data of lock control equipment of the present invention.
Fig. 3 is the structured flowchart unblanking to export data of Lock-Picking Devices of the present invention.
Fig. 4 is the structured flowchart of two-dimension code image data of the present invention.
Embodiment
Below in conjunction with specific embodiment, the present invention is further described, but does not limit the invention to these embodiments.One skilled in the art would recognize that all alternatives, improvement project and the equivalents that present invention encompasses and may comprise in Claims scope.
With reference to Fig. 1-4, a kind ofly veritify the two-dimensional code lock control method combined based on synchronous asynchronous key, comprise a lock control equipment 1 and Lock-Picking Devices 2, first safe unit 11 and Quick Response Code decoder module 12 are installed in described lock control equipment 1, be provided with the second safe unit 21 in described Lock-Picking Devices 2, described Lock-Picking Devices 2 are as follows with the Quick Response Code lock control step of lock control equipment 1:
(1) initialization Lock-Picking Devices 2, public and private key double secret key Pub and Pri of random generation Lock-Picking Devices 2, Synchronizing Passwords A2, asynchronous crypto B2, private key Pri, Synchronizing Passwords A2 are stored in the second safe unit, and PKI Pub, Synchronizing Passwords A2, asynchronous crypto B2 are generated the configuration of two-dimension code image wait to lock control equipment 1;
(2) trigger lock control equipment 1 and enter Lock-Picking Devices match settings pattern, the two-dimension code image allowing the Quick Response Code decoder module 12 of lock control equipment 1 scan Lock-Picking Devices 2 to generate in step (1), and by parse from two-dimension code image PKI Pub, Synchronizing Passwords A2, asynchronous crypto B2 PKI Pub, the synchronisation key A1 of equipment of itself end, asynchronous crypto B1 replaced respectively and safe storage in the first safe unit 11, complete mating of Lock-Picking Devices 2 and lock control equipment 1;
(3) when needing to unblank, second safe unit 21 of Lock-Picking Devices 2 produces asynchronous crypto B2 at random, the asynchronous crypto B2 of current generation and the Synchronizing Passwords A2 private key Pri be stored in the second safe unit 21 are encrypted and generate two-dimension code image data 5 in the second safe unit 21, and coding generation Quick Response Code password picture is shown on the display screen that carries;
(4) the Quick Response Code password picture of the middle encryption generated of Quick Response Code decoder module 12 scanning step (3) of lock control equipment 1, be decrypted with being stored in the two-dimension code image data 5 of PKI Pub to encryption in the first safe unit 11 time initial, the initial data of the Synchronizing Passwords A2 that acquisition Lock-Picking Devices 2 will transmit and asynchronous crypto B2;
(5) initial data of the Synchronizing Passwords A2 obtained in step (4) and asynchronous crypto B2 and the Synchronizing Passwords A1 stored in the inner and asynchronous crypto B1 are veritified by the first safe unit 11 of lock control equipment 1 respectively, when the asynchronous crypto B2 of Synchronizing Passwords A1 and Lock-Picking Devices end that the Synchronizing Passwords A2 of Lock-Picking Devices end equals lock control equipment end is not equal to the asynchronous crypto B1 of lock control equipment end, veritification is passed through, equipment is unblanked successfully, and the asynchronous crypto B2 obtained is replaced the original asynchronous crypto B1 in lock control equipment and stores backed off after random flow process, otherwise veritify and do not pass through, prompting is unblanked directly to exit flow process after failure.
In the present embodiment step (5), hypothesis asynchronous crypto B2 is an ascending order counting rule, when the asynchronous crypto B2 of Synchronizing Passwords A1 and Lock-Picking Devices 2 end that the Synchronizing Passwords A2 of Lock-Picking Devices 2 end equals lock control equipment 1 end is greater than the asynchronous crypto B1 of lock control equipment 1 end, veritification is passed through, equipment is unblanked successfully, and the asynchronous crypto B2 obtained is replaced the original asynchronous crypto B1 in lock control equipment 1 and stores backed off after random flow process, otherwise veritify and do not pass through, prompting is unblanked directly to exit flow process after failure.
The present embodiment lock control equipment 1 comprises the first safe unit 11 and Quick Response Code decoder module 12, for obtained two-dimension code image of decoding, operate from the lock control of line correlation, can be the metal lock control devices of entity, also can be virtual software locks keyholed back plate grooming tool (as: system lock, software locks etc.); What the first safe unit 11 stored for safe storage lock control equipment 1 unblanks to judge data 3 and is decrypted the PKI Pub of the two-dimensional code data asymmetric arithmetic (RSA/ECC/SM2 etc.) of input, execution unlock data judges, the Related product of core that can be SE chip, safe TF card etc. with SE be, when lock control equipment is not high especially and responsive especially again to cost to security requirement, this part can not do requirement, but even if do not require at least or the level of security of original equipment can be arrived; Quick Response Code decoder module 12 is for acquisition two-dimension code image of taking pictures, and be that digital data transfer is decrypted to the first safe unit 11 and unlocking cipher judges by picture decode, hardware can be the first safe unit 11 realizes with Quick Response Code decoder module 12 Split assembled, also can be by supporting that the secure element chip that Quick Response Code is decoded realizes as unique kernel control chip when requiring high safety;
Second safe unit 21 of the present embodiment Lock-Picking Devices 2, for generation of the two-dimension code image key of unblanking, can be the dedicated handheld device of embedded safe unit, mobile phone (can the external safe TF card based on SE), PDA, PAD etc.; Second safe unit 21 is for safe storage, the output data 4 of unblanking producing Lock-Picking Devices, and the private key Pri of this data asymmetric arithmetic (as: RSA, ECC, SM2 etc.) is encrypted, the Related product of core that can be SE chip, safe TF card etc. with SE be.
What the present embodiment lock control equipment 1 stored unblanks to judge that data 3 are produced by user's initialization when mating Lock-Picking Devices 2, comprise Synchronizing Passwords A1, asynchronous crypto B1, these three kinds of critical datas of Lock-Picking Devices PKI Pub, be stored in the first safe unit 11, to ensure the fail safe of critical data, Synchronizing Passwords A1 is produced by Lock-Picking Devices 2 at random and passes to lock control equipment 1 end when user's initialization, identical with the Synchronizing Passwords A2 of Lock-Picking Devices 2 end, and simultaneously match during for unblanking is veritified, asynchronous crypto B1 is produced at random by Lock-Picking Devices 2, it is previous that lock control equipment 1 stores the asynchronous crypto B2(transmitted by Lock-Picking Devices 2 when successfully unblanking last time), for veritifying with the asynchronous crypto B2 of current transmission, the asynchronous crypto B1 stored by lock control equipment 1 end under normal circumstances should be the asynchronous crypto B2 of previous Lock-Picking Devices 2 end, could calculate veritification in absence of such a match pass through so only have, Lock-Picking Devices PKI Pub is produced by Lock-Picking Devices 2 at random and passes to lock control equipment 1 end when user's initialization, mate with Lock-Picking Devices 2 private key Pri, by with asymmetric arithmetic (as: RSA, ECC, SM2 etc.) the data that are encrypted of private key Pri only have and could be deciphered by this PKI Pub, effectively can ensure that the legitimate authentication of dual lock equipment is (when large transfer of data due to RSA while the confidentiality ensureing transmission data, ECC, the encoding-decoding efficiency of the asymmetric arithmetics such as SM2 is lower so generally can adopt AES, DES, the symmetry algorithms such as SM1 carry out data encrypting and deciphering, but each transfer of data of this application scenarios is less, so just adopt asymmetric arithmetic directly to realize encryption and authentication function).
The output data 4 of unblanking of the present embodiment Lock-Picking Devices 2 comprise Synchronizing Passwords A2, asynchronous crypto B2, these three kinds of critical datas of Lock-Picking Devices private key Pri, are stored in the second safe unit 21, to ensure the fail safe of critical data, Synchronizing Passwords A2 is produced by Lock-Picking Devices 2 at random and passes to lock control equipment 1 end when user's initialization, and simultaneously match during for unblanking is veritified, asynchronous crypto B2 to be produced by certain trend counting rule by Lock-Picking Devices 2 and (supposes currently to be described as ascending order counting rule, certainly other counting rules are not got rid of), lock control equipment 1 stores the asynchronous crypto B2 transmitted by Lock-Picking Devices 2 when successfully unblanking last time, for veritifying with the asynchronous crypto B2 of current transmission, by the asynchronous crypto B2 that the asynchronous crypto B1 that lock control equipment 1 end stores under normal circumstances should be previous Lock-Picking Devices end, so only have when lock control equipment asynchronous crypto B1 is less than Lock-Picking Devices asynchronous crypto B2 (B1 < B2), lock control equipment just can be judged as that veritification is passed through, on the one hand for ensureing that the Quick Response Code password picture of each transmission exists significant change, on the one hand for ensureing that the expired Quick Response Code password picture that Lock-Picking Devices had previously produced is not used by continuation, ensure that legal Quick Response Code password picture can only be only used once simultaneously, effectively prevent Quick Response Code password picture from being reused by after sectional drawing, Lock-Picking Devices private key Pri by Lock-Picking Devices 2 when user's initialization and Lock-Picking Devices PKI Pub produce at random simultaneously, be stored in the second safe unit 21 of Lock-Picking Devices 2, can not be exported, for being encrypted Quick Response Code password picture data, realize the safe transmission of data and the legitimate authentication of equipment.
The present embodiment two-dimension code image data 5 mainly comprise Synchronizing Passwords A2 and asynchronous crypto B2 two parts content, be encrypted with device private Pri before production two-dimension code image, with the legitimate authentication of the safe transmission and equipment that ensure data, can effectively prevent the parsing of Synchronizing Passwords and asynchronous crypto from cracking, as long as even if be not exported at lock control equipment 1 end Synchronizing Passwords and the asynchronous crypto Lock-Picking Devices private key Pri cracking Lock-Picking Devices 2 end that is stolen, this part also can ensure that Quick Response Code password picture illegally can not be forged application; Synchronizing Passwords A2 must equal the legal coupling certification that synchrodata A1 can be used for ensureing password in addition; Asynchronous crypto B2 must be greater than asynchronous crypto B1(and suppose under ascending order counting rule), then can on the one hand for ensureing that the Quick Response Code password picture of each transmission exists significant change, on the one hand for ensureing that the expired Quick Response Code password picture that Lock-Picking Devices had previously produced is not used by continuation, ensure that legal Quick Response Code password picture can only be only used once simultaneously, effectively prevent Quick Response Code password picture from being reused by after sectional drawing.

Claims (2)

1. veritify the two-dimensional code lock control method combined based on synchronous asynchronous key for one kind, comprise lock control equipment and Lock-Picking Devices, first safe unit and Quick Response Code decoder module are installed in described lock control equipment, be provided with the second safe unit in described Lock-Picking Devices, the Quick Response Code lock control step of described Lock-Picking Devices and lock control equipment is as follows:
(1) initialization Lock-Picking Devices, public and private key double secret key Pub and Pri of random generation Lock-Picking Devices, Synchronizing Passwords A2, asynchronous crypto B2, private key Pri, Synchronizing Passwords A2 are stored in the second safe unit, and PKI Pub, Synchronizing Passwords A2, asynchronous crypto B2 are generated the configuration of two-dimension code image wait to lock control equipment;
(2) trigger lock control equipment and enter Lock-Picking Devices match settings pattern, the Quick Response Code decoder module of lock control equipment is allowed to scan the two-dimension code image that generates in step (1) of Lock-Picking Devices, and by parse from two-dimension code image PKI Pub, Synchronizing Passwords A2, asynchronous crypto B2 PKI Pub, the synchronisation key A1 of equipment of itself end, asynchronous crypto B1 replaced respectively and safe storage in the first safe unit, complete mating of Lock-Picking Devices and lock control equipment;
(3) when needing to unblank, second safe unit of Lock-Picking Devices produces asynchronous crypto B2 at random, the asynchronous crypto B2 of current generation and the Synchronizing Passwords A2 private key Pri be stored in the second safe unit are encrypted and generate two-dimension code image data in the second safe unit, and coding generation Quick Response Code password picture is shown on the display screen that carries;
(4) the Quick Response Code password picture of the middle encryption generated of the Quick Response Code decoder module scanning step (3) of lock control equipment, with being stored in the two-dimension code image decrypt data to encryption of PKI Pub in the first safe unit time initial, obtain the initial data of Synchronizing Passwords A2 that Lock-Picking Devices will transmit and asynchronous crypto B2;
(5) initial data of the Synchronizing Passwords A2 obtained in step (4) and asynchronous crypto B2 and the Synchronizing Passwords A1 stored in the inner and asynchronous crypto B1 are veritified by the first safe unit of lock control equipment respectively, when the asynchronous crypto B2 of Synchronizing Passwords A1 and Lock-Picking Devices end that the Synchronizing Passwords A2 of Lock-Picking Devices end equals lock control equipment end is not equal to the asynchronous crypto B1 of lock control equipment end, veritification is passed through, equipment is unblanked successfully, and the asynchronous crypto B2 obtained is replaced the original asynchronous crypto B1 in lock control equipment and stores backed off after random flow process, otherwise veritify and do not pass through, prompting is unblanked directly to exit flow process after failure.
2. two-dimensional code lock control method according to claim 1, it is characterized in that: in step (5), hypothesis asynchronous crypto is an ascending order counting rule, when the asynchronous crypto B2 of Synchronizing Passwords A1 and Lock-Picking Devices end that the Synchronizing Passwords A2 of Lock-Picking Devices end equals lock control equipment end is greater than the asynchronous crypto B1 of lock control equipment end, veritification is passed through, equipment is unblanked successfully, and the asynchronous crypto B2 obtained is replaced the original asynchronous crypto B1 in lock control equipment and stores backed off after random flow process, otherwise veritify and do not pass through, prompting is unblanked directly to exit flow process after failure.
CN201510829453.XA 2015-11-25 2015-11-25 It is a kind of that the Quick Response Code locking method being combined is veritified based on synchronous asynchronous key Active CN105337733B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510829453.XA CN105337733B (en) 2015-11-25 2015-11-25 It is a kind of that the Quick Response Code locking method being combined is veritified based on synchronous asynchronous key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510829453.XA CN105337733B (en) 2015-11-25 2015-11-25 It is a kind of that the Quick Response Code locking method being combined is veritified based on synchronous asynchronous key

Publications (2)

Publication Number Publication Date
CN105337733A true CN105337733A (en) 2016-02-17
CN105337733B CN105337733B (en) 2018-04-13

Family

ID=55288054

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510829453.XA Active CN105337733B (en) 2015-11-25 2015-11-25 It is a kind of that the Quick Response Code locking method being combined is veritified based on synchronous asynchronous key

Country Status (1)

Country Link
CN (1) CN105337733B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105871874A (en) * 2016-04-27 2016-08-17 武汉市国扬科技有限公司 Mobile Internet virtual key authorizing system and hardware door lock control method thereof
CN106097515A (en) * 2016-06-23 2016-11-09 武汉市国扬科技有限公司 A kind of smart lock virtual lock core replacing options
CN106652129A (en) * 2016-11-29 2017-05-10 宁波飞拓电器有限公司 Door control system design method based on mobile phone APP (application)
CN106952370A (en) * 2017-03-16 2017-07-14 武汉世纪金桥安全技术有限公司 A kind of blue-tooth intelligence locks secret key composite authentication system
CN106971442A (en) * 2017-05-03 2017-07-21 河南传通电子科技有限公司 A kind of safe and intelligent lock system
CN107920097A (en) * 2016-10-09 2018-04-17 中国移动通信有限公司研究院 A kind of method and device of unlock
CN111047750A (en) * 2018-10-12 2020-04-21 杭州海康威视数字技术股份有限公司 Method, device and system for controlling offline access control device
CN113240836A (en) * 2021-05-18 2021-08-10 新疆爱华盈通信息技术有限公司 Bluetooth lock connection method adopting two-dimensional code and related configuration system
CN115359595A (en) * 2022-07-15 2022-11-18 广东城启科技有限公司 Guangdong residential code access control method based on two-dimensional code as carrier

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102571325A (en) * 2012-02-13 2012-07-11 闵浩 Coded lock controller realizing method for concurrent working of real-time random safety password authentication and pre-releasing safety password authentication
CN103530924A (en) * 2013-10-25 2014-01-22 北京金储自动化技术有限公司 Dynamic password lock system and method for self-help network management
CN103914901A (en) * 2014-03-27 2014-07-09 惠州Tcl移动通信有限公司 Unlocking method and unlocking system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102571325A (en) * 2012-02-13 2012-07-11 闵浩 Coded lock controller realizing method for concurrent working of real-time random safety password authentication and pre-releasing safety password authentication
CN103530924A (en) * 2013-10-25 2014-01-22 北京金储自动化技术有限公司 Dynamic password lock system and method for self-help network management
CN103914901A (en) * 2014-03-27 2014-07-09 惠州Tcl移动通信有限公司 Unlocking method and unlocking system

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105871874A (en) * 2016-04-27 2016-08-17 武汉市国扬科技有限公司 Mobile Internet virtual key authorizing system and hardware door lock control method thereof
CN106097515A (en) * 2016-06-23 2016-11-09 武汉市国扬科技有限公司 A kind of smart lock virtual lock core replacing options
CN107920097A (en) * 2016-10-09 2018-04-17 中国移动通信有限公司研究院 A kind of method and device of unlock
CN107920097B (en) * 2016-10-09 2020-04-14 中国移动通信有限公司研究院 Unlocking method and device
CN106652129A (en) * 2016-11-29 2017-05-10 宁波飞拓电器有限公司 Door control system design method based on mobile phone APP (application)
CN106952370A (en) * 2017-03-16 2017-07-14 武汉世纪金桥安全技术有限公司 A kind of blue-tooth intelligence locks secret key composite authentication system
CN106971442A (en) * 2017-05-03 2017-07-21 河南传通电子科技有限公司 A kind of safe and intelligent lock system
CN106971442B (en) * 2017-05-03 2018-05-25 河南传通电子科技有限公司 A kind of safe and intelligent lock system
CN111047750A (en) * 2018-10-12 2020-04-21 杭州海康威视数字技术股份有限公司 Method, device and system for controlling offline access control device
CN113240836A (en) * 2021-05-18 2021-08-10 新疆爱华盈通信息技术有限公司 Bluetooth lock connection method adopting two-dimensional code and related configuration system
CN115359595A (en) * 2022-07-15 2022-11-18 广东城启科技有限公司 Guangdong residential code access control method based on two-dimensional code as carrier

Also Published As

Publication number Publication date
CN105337733B (en) 2018-04-13

Similar Documents

Publication Publication Date Title
CN105337733A (en) Two-dimensional code locking control method based on combination of synchronous-asynchronous secret key verification
Song Advanced smart card based password authentication protocol
US8239679B2 (en) Authentication method, client, server and system
US8121294B2 (en) System and method for a derivation function for key per page
TWI489847B (en) Data encryption method, data verification method and electronic apparatus
KR101874721B1 (en) Identity authentication system, apparatus, and method, and identity authentication request apparatus
CN110969431B (en) Secure hosting method, device and system for private key of blockchain digital coin
JP3917679B2 (en) High bandwidth cryptographic system with low bandwidth cryptographic module
CN102664898A (en) Fingerprint identification-based encrypted transmission method, fingerprint identification-based encrypted transmission device and fingerprint identification-based encrypted transmission system
CN103124269A (en) Bidirectional identity authentication method based on dynamic password and biologic features under cloud environment
CN102236773A (en) Radio frequency identification (RFID) encryption verification system and method
CN102880836A (en) Security device
CN101005361A (en) Server and software protection method and system
CN101719205A (en) Digital copyright management method and system
WO2017016447A1 (en) Two-dimensional code mask encryption and decryption method and system
EP3752940B1 (en) Updating biometric template protection keys
CN102594551B (en) Method for reliable statistics of privacy data on radio frequency identification (RFID) tag
CN105450419A (en) Method, device and system
CN105281902A (en) Web system safety login method based on mobile terminal
KR20130037607A (en) Authentication process using of one time password
Zhou et al. Implementation of cryptographic algorithm in dynamic QR code payment system and its performance
KR20100031354A (en) Tag security processing method using one time password
CN104715537A (en) Encryption and decryption method based on digital tags
CN102118311B (en) Data transmission method
RU2004131500A (en) CALL-BASED AUTHENTICATION NOT REQUIRING KNOWLEDGE KNOWLEDGE SECURITY AUTHENTICATION KNOWLEDGE

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant