CN107370733A - A kind of intelligent lock management method based on Rijndael and ECC Hybrid Encryptions - Google Patents

A kind of intelligent lock management method based on Rijndael and ECC Hybrid Encryptions Download PDF

Info

Publication number
CN107370733A
CN107370733A CN201710586190.3A CN201710586190A CN107370733A CN 107370733 A CN107370733 A CN 107370733A CN 201710586190 A CN201710586190 A CN 201710586190A CN 107370733 A CN107370733 A CN 107370733A
Authority
CN
China
Prior art keywords
data
user
key
information
ecc
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710586190.3A
Other languages
Chinese (zh)
Inventor
侯晓荣
向宇
樊建峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201710586190.3A priority Critical patent/CN107370733A/en
Publication of CN107370733A publication Critical patent/CN107370733A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0846Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme

Abstract

A kind of intelligent lock management method based on Rijndael and ECC Hybrid Encryptions of the disclosure of the invention, the present invention relates to the application of information ciphering method, particularly smart lock.The core of the present invention is Rijndael and ECC Hybrid Encryption algorithms.The system of the present invention carries out the interaction of data using the post interfaces based on Https.Rijndael is that symmetric encipherment algorithm has at a high speed, and the characteristics of efficiently and being easy to implement, but it has encryption key distribution and managerial defect.And ECC is rivest, shamir, adelman, have key distribution and manage it is simple, but the characteristics of speed is slow.Therefore transmission information is encrypted using symmetric encipherment algorithm Rijndael by the present invention, and the key used using rivest, shamir, adelman ECC digital signature and symmetric cryptography, which enters to advance, to be encrypted.Security of the data in network transmission is in turn ensure that so as to both complete digital signature.Security and efficiency can effectively be improved based on Rijndael and ECC mixed cipher systems.

Description

A kind of intelligent lock management method based on Rijndael and ECC Hybrid Encryptions
Technical field
The present invention relates to the application of information ciphering method, particularly smart lock.
Background technology
With the development of science and technology, society enters Internet era, people do not require nothing more than the high security of door lock, to its side Just property it is also proposed requirement, and smart lock is also slowly come into the sight of people.At present at home, smart lock is not spread to also respectively Each family of family, it is mainly used in the high-end places such as enterprise, research institute, high-grade hotel.Smart lock be it is a kind of by IC design, The lockset that computer network and the identification technology of various innovations are combined together, smart lock is being pacified compared with traditional mechanical lock Entirely, performance and user's identification management aspect have outstanding performance.After prism door is exposed, either government or enterprise All there is new heightened awareness to information security, therefore there is an urgent need to a kind of technology to ensure smart lock information confidentiality, complete in market Whole property and availability.
The content of the invention
The present invention realizes that has an information based on symmetric encipherment algorithm Rijndael and rivest, shamir, adelman ECC mixing The intelligent lock management method of safety assurance.The core of the system is exactly AES, except core encryption also mainly includes User management, key management, task management method.
The core of the present invention is Rijndael and ECC Hybrid Encryption algorithms.The system of the present invention is used based on Https's Post interfaces carry out the interaction of data.Rijndael is that symmetric encipherment algorithm has at a high speed, efficient with the spy being easy to implement Point, but encryption key distribution and managerial defect be present in it.And ECC is rivest, shamir, adelman, there is key distribution and manage letter The characteristics of single, but speed is slow.Therefore transmission information is encrypted using symmetric encipherment algorithm Rijndael by the present invention, The key used using rivest, shamir, adelman ECC digital signature and symmetric cryptography enters encryption of advancing.So as to both complete number Word signature in turn ensure that security of the data in network transmission.Can be had based on Rijndael and ECC mixed cipher systems The raising security and efficiency of effect.Thus the present invention is a kind of is based on Rijndael and ECC mixed encryption methods, and this method includes:
Step S1:Data ciphering method;
Step S1.1:The SHA256 that sender obtains the data for needing to transmit using hash function SHA256 unencryption is signed Name value, to verify that the data in transmission are not tampered with;
Step S1.2:The SHA256 signature values of unencryption are encrypted using ECC rivest, shamir, adelmans by sender, are added The private key of secret emissary is the private key PrivateKey1 in sender's ECC1 systems;
Step S1.3:The Datya of unencryption is encrypted using Rijndael symmetric encipherment algorithms by sender;
Step S1.4:The key Key that sender is used step S1.3 ciphering process is encrypted, asymmetric using ECC Key is encrypted AES, and it is the public key PublicKey1 in recipient's ECC2 systems to encrypt the private key used;
Obtaining us by step 1 needs the data transmitted, that is, Data after SHA256 signatures, encryption after encrypting plus Key after close;
Step S2:Data decryption method;
Step S2.1:The data that the Post that recipient receives Https is transmitted are signed to the SHA256 after encryption and used ECC is decrypted, and the key of decryption is sender's ECC1 public keys PublicKey1;
Step S2.2:Key after the encryption that the Post that recipient receives Https is transmitted is decrypted using ECC, solution Close key is recipient's ECC2 private keys PrivateKey2;
Step S2.3:Data after the encryption that the Post that recipient receives Https is transmitted is carried out using Rijndael Decryption, the key of decryption is that step S2.2 obtains Key;
Step S2.4:Data SHA256 digital signature is calculated using hash function SHA256 after S2.3 obtains Data, This digital signature and step S2.1 SHA256 signatures are contrasted;If both are equal, proof data are correct, by testing Card;If both are tampered unequal proof data, authentication failed.
It is a kind of to use the intelligent lock management method based on Rijndael and ECC mixed encryption methods, include the number of user terminal According to processing and background process application work order information;
The data processing step of wherein user terminal is:
The first step:From the background by user's login interface, the user's login account password transmitted by login management platform is received, Inquiry database user whether there is, and in the absence of account number cipher is then re-entered, exists, logins successfully, and then generation dynamic makes The effective period of time of board and dynamic token, then updating the data the dynamic token in storehouse user set and dynamic token has Imitate the period;
Second step:Editor user, api interface is edited by user from the background, receive the data message of management platform transmission, enter Row parsing, judges whether the dynamic token of user is effective, invalid, needs to log in the execution first step again, and the is performed if effectively Three steps;
3rd step:Judge whether operator has the authority of editor user, the 5th step performed if the authority for having editor user, The 4th step is performed if the authority of not editor user;
4th step:Judge whether user is modification personal information, if it is performs the 5th step, is lost if not then modification Lose, perform the 7th step;
5th step:Judge whether to edit ID, if then editor's failure, performs the 7th step, otherwise perform the 6th step;
6th step:The corresponding information of user is changed according to the parameter of upload, it is successfully modified, perform the 7th step;
7th step:Modification terminates;
The step of background process application work order information is:
The first step:Backstage logs in api interface by user, and it is close to receive the user's login account transmitted by login management platform Code, inquiry database user whether there is, in the absence of then needing to re-enter account number cipher, exist, login successfully, Ran Housheng Into the effective period of time of dynamic token and dynamic token, the dynamic token and dynamic in storehouse user set are then updated the data The effective period of time of token;
Second step:Backstage is received the information that operator uploads, data parsed, root by base station inquiry api interface According to the partial information of base station address, base station information set is searched for generally, returns to the base station address information of matching, for operation Person selects to need the complete base station address information filled in;
3rd step:Backstage receives the information for the application work order that operator uploads, and logarithm by applying for work order api interface According to being parsed;
4th step:Background program judges whether the dynamic token of operator is effective, and first can be re-executed if invalid Step, the 5th step is performed if effectively;
5th step:Background program judges whether user has application work order authority, the 6th step is performed if having permission, if not having Authority then applies for that work order fails, and performs the 11st step;
6th step:Background program judges whether it belongs to operator management to applying for that the base station of operation is checked Base station under authority, if the relevant information of base station is then added, including the address of base station, longitude and latitude, the administrative staff of base station The information such as name, ID, phone, affiliated unit, the ID of the corresponding lock in base station and encryption key, then perform the 7th step, otherwise Application failure, performs the 11st step;
7th step:Background program is checked electronic key information, judges that operator is its director, Yi Jiqi Use range, the relevant information of key, including the 8th step of use range of key etc. and then execution are filled in if by examination & verification, it is no Then application failure, perform the 11st step;
8th step:Background program verifies that the operation beginning and ending time is 10 in seconds to the form of activity duration Existing for the form of several timestamps, and the operation time started is more than or equal to current time, and the end time of operation, which is more than to wait, to be made The industry time started, by performing the 9th step after checking, otherwise application failure, carry out the 11st step;
9th step:Background program is verified to homework type, whether is seen to be empty, is not empty then the tenth step of execution, is Empty then application failure, performs 11 steps;
Tenth step:Background program verifies see whether be empty to operation reason, is not sky then addition examination & verification situation, work Single abnormal marking, operation abnormal marking, examination & approval abnormal marking, operation deadline, completion status and the related of work order ID are believed Breath, with reference to the information inside the design work order information set of chapter 3 database, work order ID current times generation timestamp takes rear ten Data, are preserved database by position, apply successfully, performing the 11st step, for empty then application failure, perform the 11st step;
11st step:Application terminates, and returns to operating result, the data lattice that its data format returns when being user's registration Formula.
Transmission information is encrypted using symmetric encipherment algorithm Rijndael by the present invention, uses rivest, shamir, adelman The key that ECC is used digital signature and symmetric cryptography enters encryption of advancing.Data are in turn ensure that so as to both complete digital signature Security in network transmission.Security and effect can effectively be improved based on Rijndael and ECC mixed cipher systems Rate.
Brief description of the drawings
Fig. 1 is sender's ciphering process provided in an embodiment of the present invention.
Fig. 2 is recipient's decrypting process provided in an embodiment of the present invention.
Fig. 3 is user's edit operation flow chart provided in an embodiment of the present invention.
Fig. 4 is background process application work order information flow provided in an embodiment of the present invention.
Embodiment
Referring to the drawings, the embodiment of the present invention is provided, for being carried out furtherly to the structure of the present invention It is bright, advantages and features of the invention could be allowed to be easier to be readily appreciated by one skilled in the art.It should be noted that this place is retouched The specific embodiment stated is intended merely to, for explaining the present invention, be not intended to limit the present invention.
Sender and recipient have the system of an ECC asymmetric encryption to ciphering process of the present invention in simple terms, in order to It is easy to describe, it is ECC1 to call sender's rivest, shamir, adelman system herein, and the rivest, shamir, adelman of recipient is reminded That is ECC2.In store ECC1 private key PrivateKey1, ECC2 public key PublicKey2 in sender's configuration file With the session key Key of symmetric encipherment algorithm.The in store ECC2 of recipient private key PrivateKey2 and ECC1 public key PublicKey1.Encryption substantially process is the SHA signatures that sender encrypts transmission content using PrivateKey1, is used simultaneously PublicKey2 encryption key Key, and Key is used to encrypt the content to be transmitted.So the data of transmission there are 3, respectively add SHA signatures after close, the transmission content after encryption, the session key Key after encryption.The process of recipient's decryption substantially uses PublicKey1 decryption SHA signatures, using PrivaeKey2 decrypted session key Key, then go decryption to add with the Key after decryption Close transmission data.Specific encryption flow is shown in Fig. 1, and specific flow of decrypting is shown in Fig. 2.
User management is divided into user's login, user's registration, deletes five parts such as user, editor user and inquiry user. (1) user logs on as background program and logs in api interface by user, receives the account (ID) of the user uploaded when user logs in With the parameter such as password, after crossing and being proved to be successful, 13 dynamic tokens are then generated in order to strengthen user information safety and are tested Code, and the term of validity of the dynamic token identifying code are demonstrate,proved, if user logs in for the first time is then stored directly in database user letter In breath set, dynamic token and its effective period of time that user gathers the inside are otherwise updated.(2) user's registration is that system is initial Acquiescence has several super keepes, can only add user by logging in management platform by super keepe, while be difference User type different authority is set.When the user of addition has the authority for adding new user, user's can adds Add new user, the parameter that adding new user needs to submit is name, ID, dynamic token, the login password of user, user The field such as phone, user type, the affiliated company of user.(3) inquiry user is the personnel for having inquiry employee's authority, can pass through pipe Platform inquires about the relevant information of employee, and inquiry employee needs the dynamic token of the parameter submitted by operator (accessToken) and employee to be checked relevant information.(4) editor user be user can by log in smart lock software or Person's management platform changes the information of itself, and high authority user can change low rights user by logging in management platform Relevant information.(5) low rights user can be deleted for the user of high authority by deleting user.Backstage is by deleting user API Interface, the information that operator uploads is received, data are parsed, and after making respective handling, return to result.
Key management module is divided into four parts such as addition key, inquiry key, editor's key, deletion key.Only possess The staff of operating right can be managed to key information.(1) key is added as from the background by adding key information Api interface, the operation self information uploaded and the information for adding new electron key are received, then data are parsed, sentenced Disconnected operator has a lack of competence, and whether the information of key is suitable.(2) key backstage is inquired about to connect by inquiring about key information API The data format of mouth, the information that reception operator uploads, its operating process and return result all inquires about user's respectively Operating process is similar with the data format for returning to result.(3) key backstage is edited by editing key information api interface, The data format of the information that reception operator uploads, its operating process and return result all distinguishes Edit Profile Operating process is similar with the data format for returning to result.(4) key is deleted to connect by deleting key information API for backstage The data format of mouth, the information that reception operator uploads, its operating process and return result is all respectively with deleting user The operating process of information is similar with the data format for returning to result.
Task management module is divided into application work order, obtains work order information, examination & verification work order, operation confirmation and operation note letter A few part compositions such as breath.(1) operator is received by logging in smart lock software upload by work order application api interface from the background Apply for the information of work order, the address of the base station comprising application operation, the operation beginning and ending time, the ID of electron key, job content, make The relevant informations such as the personal information of industry personnel, then the information of reception is parsed from the background.(2) obtain no matter work order information is It is keeper or engineer, is required for obtaining work order information, then work order is handled.Backstage is by capturing work order information Api interface, operator's upload information is received, after carrying out data parsing checking, inquired about inside database work order information set full The work order of sufficient condition, and work order information is marked and then work order information return will be inquired.(3) it is keeper to examine work order Work order is examined by examining work order interface, from the background by examine work order interface keeper upload to work order information Auditing result information, and to data parse, preserve database after handling it.(4) operation confirms as engineer and passes through work Industry completes interface to submit job result, the information that background program is uploaded by interface operator, after data parsing, Storehouse data are updated the data, it is similar with approval process.First judge the validity of dynamic token, sentence carrying out correlation to work order information It is disconnected, ensure and pass inside hardware if the work order information being updated if inside database, while the renewal of shutdown number The uniformity of door number.(5) engineer can have record to produce by smart lock software and electron key or lock interaction, backstage By operation note interface, the information that operator uploads is received, data parsing is carried out, preserves data to data storehouse.When upload Data are directly to open the door and are when changing key, need confirmation corresponding to the database to make if key is initial key Industry number is updated to initial number, and the data reference database of upload designs the information inside the enabling set of records ends of the inside.(6) obtain Take away door be recorded as keeper by log in management platform check enabling record, from the background by checking that interface feeds back related data To management platform.

Claims (2)

1. one kind is based on Rijndael and ECC mixed encryption methods, this method includes:
Step S1:Data ciphering method;
Step S1.1:The SHA256 that sender obtains the data for needing to transmit using hash function SHA256 unencryption signs Value, to verify that the data in transmission are not tampered with;
Step S1.2:The SHA256 signature values of unencryption are encrypted using ECC rivest, shamir, adelmans by sender, and encryption makes Private key is the private key PrivateKey1 in sender's ECC1 systems;
Step S1.3:The Datya of unencryption is encrypted using Rijndael symmetric encipherment algorithms by sender;
Step S1.4:The key Key that sender is used step S1.3 ciphering process is encrypted, using ECC asymmetric encryption Key is encrypted algorithm, and it is the public key PublicKey1 in recipient's ECC2 systems to encrypt the private key used;
Obtaining us by step 1 needs the data transmitted, that is, the Data after SHA256 signatures, encryption after encrypting, after encryption Key;
Step S2:Data decryption method;
Step S2.1:The data that the Post that recipient receives Https is transmitted sign to enter using ECC to the SHA256 after encryption Row decryption, the key of decryption is sender's ECC1 public keys PublicKey1;
Step S2.2:Key after the encryption that the Post that recipient receives Https is transmitted is decrypted using ECC, decryption Key is recipient's ECC2 private keys PrivateKey2;
Step S2.3:Data after the encryption that the Post that recipient receives Https is transmitted is decrypted using Rijndael, The key of decryption is that step S2.2 obtains Key;
Step S2.4:Data SHA256 digital signature is calculated using hash function SHA256 after S2.3 obtains Data, by this Individual digital signature and step S2.1 SHA256 signatures are contrasted;If both are equal, proof data are correct, pass through checking;Such as Both fruits are unequal to prove that data are tampered, authentication failed.
2. a kind of intelligent lock management method based on Rijndael and ECC mixed encryption methods using described in claim 1, bag Data processing and the background process application work order information of user terminal are included, the exchange data between user terminal and backstage are first encrypted Retransmit;
The data processing step of wherein user terminal is:
The first step:Backstage is received the user's login account password transmitted by login management platform, inquired about by user's login interface Database user whether there is, and in the absence of account number cipher is then re-entered, exists, logins successfully, then generate dynamic token with And the effective period of time of dynamic token, then update the data storehouse user set in dynamic token and dynamic token it is effective when Between section;
Second step:Editor user, api interface is edited by user from the background, receive the data message of management platform transmission, solved Analysis, judges whether the dynamic token of user is effective, invalid, needs to log in the execution first step again, and the 3rd is performed if effectively Step;
3rd step:Judge whether operator has the authority of editor user, the 5th step is performed if the authority for having editor user, if not having The authority for having editor user then performs the 4th step;
4th step:Judge whether user is modification personal information, if it is performs the 5th step, is failed if not then modification, Perform the 7th step;
5th step:Judge whether to edit ID, if then editor's failure, performs the 7th step, otherwise perform the 6th step;
6th step:The corresponding information of user is changed according to the parameter of upload, it is successfully modified, perform the 7th step;
7th step:Modification terminates;
The step of background process application work order information is:
The first step:Backstage logs in api interface by user, receives the user's login account password transmitted by login management platform, Inquiry database user whether there is, and in the absence of then needing to re-enter account number cipher, exists, logins successfully, and then generation is dynamic The effective period of time of state token and dynamic token, then update the data dynamic token and dynamic token in storehouse user set Effective period of time;
Second step:Backstage is received the information that operator uploads, data parsed, according to base by base station inquiry api interface The partial information of station address, base station information set is searched for generally, return to the base station address information of matching, selected for operator Select the complete base station address information for needing to fill in;
3rd step:Backstage receives the information for the application work order that operator uploads, and data are entered by applying for work order api interface Row parsing;
4th step:Background program judges whether the dynamic token of operator is effective, and the first step can be re-executed if invalid, if Effective then the 5th step of execution;
5th step:Background program judges whether user has application work order authority, the 6th step is performed if having permission, if without authority Then apply for work order failure, perform the 11st step;
6th step:Background program judges whether it belongs to the authority of operator management to applying for that the base station of operation is checked Under base station, if then add base station relevant information, including the address of base station, longitude and latitude, base station administrative staff name, The information such as ID, phone, affiliated unit, the ID of the corresponding lock in base station and encryption key, then perform the 7th step, otherwise application is lost Lose, perform the 11st step;
7th step:Background program is checked electronic key information, and it is its director to judge operator, and its use Scope, the relevant information of key, including the 8th step of use range of key etc. and then execution are filled in if by examination & verification, otherwise Shen It please fail, perform the 11st step;
8th step:Background program verifies to the form of activity duration, and the operation beginning and ending time is 10 digit in seconds Existing for the form of timestamp, and the operation time started is more than or equal to current time, and the end time of operation, which is more than, waits operation to open Begin the time, by performing the 9th step after checking, otherwise application failure, carry out the 11st step;
9th step:Background program verifies see whether be sky to homework type, is not empty then the tenth step of execution, for sky then Application failure, performs 11 steps;
Tenth step:Background program verifies see whether be sky to operation reason, not different for empty then addition examination & verification situation, work order Normal mark, operation abnormal marking, the relevant information for examining abnormal marking, operation deadline, completion status and work order ID, ginseng According to the information inside the design work order information set of chapter 3 database, work order ID current times generate after timestamp takes ten, Data preserve database, apply successfully, performing the 11st step, for empty then application failure, perform the 11st step;
11st step:Application terminates, and returns to operating result, the data format that its data format returns when being user's registration.
CN201710586190.3A 2017-07-18 2017-07-18 A kind of intelligent lock management method based on Rijndael and ECC Hybrid Encryptions Pending CN107370733A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710586190.3A CN107370733A (en) 2017-07-18 2017-07-18 A kind of intelligent lock management method based on Rijndael and ECC Hybrid Encryptions

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710586190.3A CN107370733A (en) 2017-07-18 2017-07-18 A kind of intelligent lock management method based on Rijndael and ECC Hybrid Encryptions

Publications (1)

Publication Number Publication Date
CN107370733A true CN107370733A (en) 2017-11-21

Family

ID=60308080

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710586190.3A Pending CN107370733A (en) 2017-07-18 2017-07-18 A kind of intelligent lock management method based on Rijndael and ECC Hybrid Encryptions

Country Status (1)

Country Link
CN (1) CN107370733A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111815816A (en) * 2020-06-22 2020-10-23 北京智辉空间科技有限责任公司 Electronic lock security system and key distribution method thereof
CN113487783A (en) * 2021-07-06 2021-10-08 西北工业大学 Method for realizing access control system control based on biological feature recognition function of smart phone
CN115037773A (en) * 2022-07-28 2022-09-09 中兴(温州)轨道通讯技术有限公司 Rail transit communication system with stable transmission
CN115344851A (en) * 2022-10-13 2022-11-15 海看网络科技(山东)股份有限公司 Method for realizing non-inductive refreshing of token based on dynamic proxy

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101064595A (en) * 2006-04-27 2007-10-31 联想(北京)有限公司 Computer network safe input authentication system and method
US20120033809A1 (en) * 2010-08-04 2012-02-09 Huang Lawrence P System for scrambling and methods for use therewith
CN103490894A (en) * 2013-09-09 2014-01-01 飞天诚信科技股份有限公司 Implementation method and device for determining lifecycle of intelligent key device
CN106603484A (en) * 2016-10-25 2017-04-26 雷飏 Virtual key method and apparatus using the same, background system, and user terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101064595A (en) * 2006-04-27 2007-10-31 联想(北京)有限公司 Computer network safe input authentication system and method
US20120033809A1 (en) * 2010-08-04 2012-02-09 Huang Lawrence P System for scrambling and methods for use therewith
CN103490894A (en) * 2013-09-09 2014-01-01 飞天诚信科技股份有限公司 Implementation method and device for determining lifecycle of intelligent key device
CN106603484A (en) * 2016-10-25 2017-04-26 雷飏 Virtual key method and apparatus using the same, background system, and user terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈启祥等: "《基于Rijndael和ECC算法的网络数据安全系统》", 《计算机工程》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111815816A (en) * 2020-06-22 2020-10-23 北京智辉空间科技有限责任公司 Electronic lock security system and key distribution method thereof
CN113487783A (en) * 2021-07-06 2021-10-08 西北工业大学 Method for realizing access control system control based on biological feature recognition function of smart phone
CN115037773A (en) * 2022-07-28 2022-09-09 中兴(温州)轨道通讯技术有限公司 Rail transit communication system with stable transmission
CN115344851A (en) * 2022-10-13 2022-11-15 海看网络科技(山东)股份有限公司 Method for realizing non-inductive refreshing of token based on dynamic proxy

Similar Documents

Publication Publication Date Title
US11799668B2 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
US7620824B2 (en) Data communicating apparatus, data communicating method, and program
CN102722931B (en) Voting system and voting method based on intelligent mobile communication devices
Küsters et al. sElect: a lightweight verifiable remote voting system
JP4788212B2 (en) Digital signature program and digital signature system
WO2018145127A1 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
CN110555029A (en) ticket management method and device based on block chain and storage medium
CN106104562A (en) Safety of secret data stores and recovery system and method
CN106341493A (en) Entity rights oriented digitalized electronic contract signing method
CN106060078B (en) User information encryption method, register method and verification method applied to cloud platform
CN107370733A (en) A kind of intelligent lock management method based on Rijndael and ECC Hybrid Encryptions
CN102484638A (en) Layered protection and validation of identity data delivered online via multiple intermediate clients
Li et al. Study on the third-party audit in cloud storage service
CN104574176A (en) USBKEY-based secure online tax declaration method
KR102357460B1 (en) Electronic voting system and method based on homogeneous cryptography
CN103905204A (en) Data transmission method and transmission system
CN106060073B (en) Channel key machinery of consultation
CN108022194A (en) Law-enforcing recorder and its data safety processing method, server and system
CN109474419A (en) A kind of living body portrait photo encryption and decryption method and encrypting and deciphering system
CN106961329A (en) A kind of solution for being directed to ADS B agreements confidentiality and integrality
Sujithra et al. ID based adaptive-key signcryption for data security in cloud environment
CN113761578A (en) Document true checking method based on block chain
CN102821110B (en) A kind of password method for retrieving for audio/video storage device
Setiawan et al. Design of secure electronic disposition applications by applying blowfish, SHA-512, and RSA digital signature algorithms to government institution
CN111832042B (en) Apartment student data safety management method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171121

RJ01 Rejection of invention patent application after publication