CN107370733A - A kind of intelligent lock management method based on Rijndael and ECC Hybrid Encryptions - Google Patents
A kind of intelligent lock management method based on Rijndael and ECC Hybrid Encryptions Download PDFInfo
- Publication number
- CN107370733A CN107370733A CN201710586190.3A CN201710586190A CN107370733A CN 107370733 A CN107370733 A CN 107370733A CN 201710586190 A CN201710586190 A CN 201710586190A CN 107370733 A CN107370733 A CN 107370733A
- Authority
- CN
- China
- Prior art keywords
- data
- user
- key
- information
- ecc
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0846—Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3249—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
A kind of intelligent lock management method based on Rijndael and ECC Hybrid Encryptions of the disclosure of the invention, the present invention relates to the application of information ciphering method, particularly smart lock.The core of the present invention is Rijndael and ECC Hybrid Encryption algorithms.The system of the present invention carries out the interaction of data using the post interfaces based on Https.Rijndael is that symmetric encipherment algorithm has at a high speed, and the characteristics of efficiently and being easy to implement, but it has encryption key distribution and managerial defect.And ECC is rivest, shamir, adelman, have key distribution and manage it is simple, but the characteristics of speed is slow.Therefore transmission information is encrypted using symmetric encipherment algorithm Rijndael by the present invention, and the key used using rivest, shamir, adelman ECC digital signature and symmetric cryptography, which enters to advance, to be encrypted.Security of the data in network transmission is in turn ensure that so as to both complete digital signature.Security and efficiency can effectively be improved based on Rijndael and ECC mixed cipher systems.
Description
Technical field
The present invention relates to the application of information ciphering method, particularly smart lock.
Background technology
With the development of science and technology, society enters Internet era, people do not require nothing more than the high security of door lock, to its side
Just property it is also proposed requirement, and smart lock is also slowly come into the sight of people.At present at home, smart lock is not spread to also respectively
Each family of family, it is mainly used in the high-end places such as enterprise, research institute, high-grade hotel.Smart lock be it is a kind of by IC design,
The lockset that computer network and the identification technology of various innovations are combined together, smart lock is being pacified compared with traditional mechanical lock
Entirely, performance and user's identification management aspect have outstanding performance.After prism door is exposed, either government or enterprise
All there is new heightened awareness to information security, therefore there is an urgent need to a kind of technology to ensure smart lock information confidentiality, complete in market
Whole property and availability.
The content of the invention
The present invention realizes that has an information based on symmetric encipherment algorithm Rijndael and rivest, shamir, adelman ECC mixing
The intelligent lock management method of safety assurance.The core of the system is exactly AES, except core encryption also mainly includes
User management, key management, task management method.
The core of the present invention is Rijndael and ECC Hybrid Encryption algorithms.The system of the present invention is used based on Https's
Post interfaces carry out the interaction of data.Rijndael is that symmetric encipherment algorithm has at a high speed, efficient with the spy being easy to implement
Point, but encryption key distribution and managerial defect be present in it.And ECC is rivest, shamir, adelman, there is key distribution and manage letter
The characteristics of single, but speed is slow.Therefore transmission information is encrypted using symmetric encipherment algorithm Rijndael by the present invention,
The key used using rivest, shamir, adelman ECC digital signature and symmetric cryptography enters encryption of advancing.So as to both complete number
Word signature in turn ensure that security of the data in network transmission.Can be had based on Rijndael and ECC mixed cipher systems
The raising security and efficiency of effect.Thus the present invention is a kind of is based on Rijndael and ECC mixed encryption methods, and this method includes:
Step S1:Data ciphering method;
Step S1.1:The SHA256 that sender obtains the data for needing to transmit using hash function SHA256 unencryption is signed
Name value, to verify that the data in transmission are not tampered with;
Step S1.2:The SHA256 signature values of unencryption are encrypted using ECC rivest, shamir, adelmans by sender, are added
The private key of secret emissary is the private key PrivateKey1 in sender's ECC1 systems;
Step S1.3:The Datya of unencryption is encrypted using Rijndael symmetric encipherment algorithms by sender;
Step S1.4:The key Key that sender is used step S1.3 ciphering process is encrypted, asymmetric using ECC
Key is encrypted AES, and it is the public key PublicKey1 in recipient's ECC2 systems to encrypt the private key used;
Obtaining us by step 1 needs the data transmitted, that is, Data after SHA256 signatures, encryption after encrypting plus
Key after close;
Step S2:Data decryption method;
Step S2.1:The data that the Post that recipient receives Https is transmitted are signed to the SHA256 after encryption and used
ECC is decrypted, and the key of decryption is sender's ECC1 public keys PublicKey1;
Step S2.2:Key after the encryption that the Post that recipient receives Https is transmitted is decrypted using ECC, solution
Close key is recipient's ECC2 private keys PrivateKey2;
Step S2.3:Data after the encryption that the Post that recipient receives Https is transmitted is carried out using Rijndael
Decryption, the key of decryption is that step S2.2 obtains Key;
Step S2.4:Data SHA256 digital signature is calculated using hash function SHA256 after S2.3 obtains Data,
This digital signature and step S2.1 SHA256 signatures are contrasted;If both are equal, proof data are correct, by testing
Card;If both are tampered unequal proof data, authentication failed.
It is a kind of to use the intelligent lock management method based on Rijndael and ECC mixed encryption methods, include the number of user terminal
According to processing and background process application work order information;
The data processing step of wherein user terminal is:
The first step:From the background by user's login interface, the user's login account password transmitted by login management platform is received,
Inquiry database user whether there is, and in the absence of account number cipher is then re-entered, exists, logins successfully, and then generation dynamic makes
The effective period of time of board and dynamic token, then updating the data the dynamic token in storehouse user set and dynamic token has
Imitate the period;
Second step:Editor user, api interface is edited by user from the background, receive the data message of management platform transmission, enter
Row parsing, judges whether the dynamic token of user is effective, invalid, needs to log in the execution first step again, and the is performed if effectively
Three steps;
3rd step:Judge whether operator has the authority of editor user, the 5th step performed if the authority for having editor user,
The 4th step is performed if the authority of not editor user;
4th step:Judge whether user is modification personal information, if it is performs the 5th step, is lost if not then modification
Lose, perform the 7th step;
5th step:Judge whether to edit ID, if then editor's failure, performs the 7th step, otherwise perform the 6th step;
6th step:The corresponding information of user is changed according to the parameter of upload, it is successfully modified, perform the 7th step;
7th step:Modification terminates;
The step of background process application work order information is:
The first step:Backstage logs in api interface by user, and it is close to receive the user's login account transmitted by login management platform
Code, inquiry database user whether there is, in the absence of then needing to re-enter account number cipher, exist, login successfully, Ran Housheng
Into the effective period of time of dynamic token and dynamic token, the dynamic token and dynamic in storehouse user set are then updated the data
The effective period of time of token;
Second step:Backstage is received the information that operator uploads, data parsed, root by base station inquiry api interface
According to the partial information of base station address, base station information set is searched for generally, returns to the base station address information of matching, for operation
Person selects to need the complete base station address information filled in;
3rd step:Backstage receives the information for the application work order that operator uploads, and logarithm by applying for work order api interface
According to being parsed;
4th step:Background program judges whether the dynamic token of operator is effective, and first can be re-executed if invalid
Step, the 5th step is performed if effectively;
5th step:Background program judges whether user has application work order authority, the 6th step is performed if having permission, if not having
Authority then applies for that work order fails, and performs the 11st step;
6th step:Background program judges whether it belongs to operator management to applying for that the base station of operation is checked
Base station under authority, if the relevant information of base station is then added, including the address of base station, longitude and latitude, the administrative staff of base station
The information such as name, ID, phone, affiliated unit, the ID of the corresponding lock in base station and encryption key, then perform the 7th step, otherwise
Application failure, performs the 11st step;
7th step:Background program is checked electronic key information, judges that operator is its director, Yi Jiqi
Use range, the relevant information of key, including the 8th step of use range of key etc. and then execution are filled in if by examination & verification, it is no
Then application failure, perform the 11st step;
8th step:Background program verifies that the operation beginning and ending time is 10 in seconds to the form of activity duration
Existing for the form of several timestamps, and the operation time started is more than or equal to current time, and the end time of operation, which is more than to wait, to be made
The industry time started, by performing the 9th step after checking, otherwise application failure, carry out the 11st step;
9th step:Background program is verified to homework type, whether is seen to be empty, is not empty then the tenth step of execution, is
Empty then application failure, performs 11 steps;
Tenth step:Background program verifies see whether be empty to operation reason, is not sky then addition examination & verification situation, work
Single abnormal marking, operation abnormal marking, examination & approval abnormal marking, operation deadline, completion status and the related of work order ID are believed
Breath, with reference to the information inside the design work order information set of chapter 3 database, work order ID current times generation timestamp takes rear ten
Data, are preserved database by position, apply successfully, performing the 11st step, for empty then application failure, perform the 11st step;
11st step:Application terminates, and returns to operating result, the data lattice that its data format returns when being user's registration
Formula.
Transmission information is encrypted using symmetric encipherment algorithm Rijndael by the present invention, uses rivest, shamir, adelman
The key that ECC is used digital signature and symmetric cryptography enters encryption of advancing.Data are in turn ensure that so as to both complete digital signature
Security in network transmission.Security and effect can effectively be improved based on Rijndael and ECC mixed cipher systems
Rate.
Brief description of the drawings
Fig. 1 is sender's ciphering process provided in an embodiment of the present invention.
Fig. 2 is recipient's decrypting process provided in an embodiment of the present invention.
Fig. 3 is user's edit operation flow chart provided in an embodiment of the present invention.
Fig. 4 is background process application work order information flow provided in an embodiment of the present invention.
Embodiment
Referring to the drawings, the embodiment of the present invention is provided, for being carried out furtherly to the structure of the present invention
It is bright, advantages and features of the invention could be allowed to be easier to be readily appreciated by one skilled in the art.It should be noted that this place is retouched
The specific embodiment stated is intended merely to, for explaining the present invention, be not intended to limit the present invention.
Sender and recipient have the system of an ECC asymmetric encryption to ciphering process of the present invention in simple terms, in order to
It is easy to describe, it is ECC1 to call sender's rivest, shamir, adelman system herein, and the rivest, shamir, adelman of recipient is reminded
That is ECC2.In store ECC1 private key PrivateKey1, ECC2 public key PublicKey2 in sender's configuration file
With the session key Key of symmetric encipherment algorithm.The in store ECC2 of recipient private key PrivateKey2 and ECC1 public key
PublicKey1.Encryption substantially process is the SHA signatures that sender encrypts transmission content using PrivateKey1, is used simultaneously
PublicKey2 encryption key Key, and Key is used to encrypt the content to be transmitted.So the data of transmission there are 3, respectively add
SHA signatures after close, the transmission content after encryption, the session key Key after encryption.The process of recipient's decryption substantially uses
PublicKey1 decryption SHA signatures, using PrivaeKey2 decrypted session key Key, then go decryption to add with the Key after decryption
Close transmission data.Specific encryption flow is shown in Fig. 1, and specific flow of decrypting is shown in Fig. 2.
User management is divided into user's login, user's registration, deletes five parts such as user, editor user and inquiry user.
(1) user logs on as background program and logs in api interface by user, receives the account (ID) of the user uploaded when user logs in
With the parameter such as password, after crossing and being proved to be successful, 13 dynamic tokens are then generated in order to strengthen user information safety and are tested
Code, and the term of validity of the dynamic token identifying code are demonstrate,proved, if user logs in for the first time is then stored directly in database user letter
In breath set, dynamic token and its effective period of time that user gathers the inside are otherwise updated.(2) user's registration is that system is initial
Acquiescence has several super keepes, can only add user by logging in management platform by super keepe, while be difference
User type different authority is set.When the user of addition has the authority for adding new user, user's can adds
Add new user, the parameter that adding new user needs to submit is name, ID, dynamic token, the login password of user, user
The field such as phone, user type, the affiliated company of user.(3) inquiry user is the personnel for having inquiry employee's authority, can pass through pipe
Platform inquires about the relevant information of employee, and inquiry employee needs the dynamic token of the parameter submitted by operator
(accessToken) and employee to be checked relevant information.(4) editor user be user can by log in smart lock software or
Person's management platform changes the information of itself, and high authority user can change low rights user by logging in management platform
Relevant information.(5) low rights user can be deleted for the user of high authority by deleting user.Backstage is by deleting user API
Interface, the information that operator uploads is received, data are parsed, and after making respective handling, return to result.
Key management module is divided into four parts such as addition key, inquiry key, editor's key, deletion key.Only possess
The staff of operating right can be managed to key information.(1) key is added as from the background by adding key information
Api interface, the operation self information uploaded and the information for adding new electron key are received, then data are parsed, sentenced
Disconnected operator has a lack of competence, and whether the information of key is suitable.(2) key backstage is inquired about to connect by inquiring about key information API
The data format of mouth, the information that reception operator uploads, its operating process and return result all inquires about user's respectively
Operating process is similar with the data format for returning to result.(3) key backstage is edited by editing key information api interface,
The data format of the information that reception operator uploads, its operating process and return result all distinguishes Edit Profile
Operating process is similar with the data format for returning to result.(4) key is deleted to connect by deleting key information API for backstage
The data format of mouth, the information that reception operator uploads, its operating process and return result is all respectively with deleting user
The operating process of information is similar with the data format for returning to result.
Task management module is divided into application work order, obtains work order information, examination & verification work order, operation confirmation and operation note letter
A few part compositions such as breath.(1) operator is received by logging in smart lock software upload by work order application api interface from the background
Apply for the information of work order, the address of the base station comprising application operation, the operation beginning and ending time, the ID of electron key, job content, make
The relevant informations such as the personal information of industry personnel, then the information of reception is parsed from the background.(2) obtain no matter work order information is
It is keeper or engineer, is required for obtaining work order information, then work order is handled.Backstage is by capturing work order information
Api interface, operator's upload information is received, after carrying out data parsing checking, inquired about inside database work order information set full
The work order of sufficient condition, and work order information is marked and then work order information return will be inquired.(3) it is keeper to examine work order
Work order is examined by examining work order interface, from the background by examine work order interface keeper upload to work order information
Auditing result information, and to data parse, preserve database after handling it.(4) operation confirms as engineer and passes through work
Industry completes interface to submit job result, the information that background program is uploaded by interface operator, after data parsing,
Storehouse data are updated the data, it is similar with approval process.First judge the validity of dynamic token, sentence carrying out correlation to work order information
It is disconnected, ensure and pass inside hardware if the work order information being updated if inside database, while the renewal of shutdown number
The uniformity of door number.(5) engineer can have record to produce by smart lock software and electron key or lock interaction, backstage
By operation note interface, the information that operator uploads is received, data parsing is carried out, preserves data to data storehouse.When upload
Data are directly to open the door and are when changing key, need confirmation corresponding to the database to make if key is initial key
Industry number is updated to initial number, and the data reference database of upload designs the information inside the enabling set of records ends of the inside.(6) obtain
Take away door be recorded as keeper by log in management platform check enabling record, from the background by checking that interface feeds back related data
To management platform.
Claims (2)
1. one kind is based on Rijndael and ECC mixed encryption methods, this method includes:
Step S1:Data ciphering method;
Step S1.1:The SHA256 that sender obtains the data for needing to transmit using hash function SHA256 unencryption signs
Value, to verify that the data in transmission are not tampered with;
Step S1.2:The SHA256 signature values of unencryption are encrypted using ECC rivest, shamir, adelmans by sender, and encryption makes
Private key is the private key PrivateKey1 in sender's ECC1 systems;
Step S1.3:The Datya of unencryption is encrypted using Rijndael symmetric encipherment algorithms by sender;
Step S1.4:The key Key that sender is used step S1.3 ciphering process is encrypted, using ECC asymmetric encryption
Key is encrypted algorithm, and it is the public key PublicKey1 in recipient's ECC2 systems to encrypt the private key used;
Obtaining us by step 1 needs the data transmitted, that is, the Data after SHA256 signatures, encryption after encrypting, after encryption
Key;
Step S2:Data decryption method;
Step S2.1:The data that the Post that recipient receives Https is transmitted sign to enter using ECC to the SHA256 after encryption
Row decryption, the key of decryption is sender's ECC1 public keys PublicKey1;
Step S2.2:Key after the encryption that the Post that recipient receives Https is transmitted is decrypted using ECC, decryption
Key is recipient's ECC2 private keys PrivateKey2;
Step S2.3:Data after the encryption that the Post that recipient receives Https is transmitted is decrypted using Rijndael,
The key of decryption is that step S2.2 obtains Key;
Step S2.4:Data SHA256 digital signature is calculated using hash function SHA256 after S2.3 obtains Data, by this
Individual digital signature and step S2.1 SHA256 signatures are contrasted;If both are equal, proof data are correct, pass through checking;Such as
Both fruits are unequal to prove that data are tampered, authentication failed.
2. a kind of intelligent lock management method based on Rijndael and ECC mixed encryption methods using described in claim 1, bag
Data processing and the background process application work order information of user terminal are included, the exchange data between user terminal and backstage are first encrypted
Retransmit;
The data processing step of wherein user terminal is:
The first step:Backstage is received the user's login account password transmitted by login management platform, inquired about by user's login interface
Database user whether there is, and in the absence of account number cipher is then re-entered, exists, logins successfully, then generate dynamic token with
And the effective period of time of dynamic token, then update the data storehouse user set in dynamic token and dynamic token it is effective when
Between section;
Second step:Editor user, api interface is edited by user from the background, receive the data message of management platform transmission, solved
Analysis, judges whether the dynamic token of user is effective, invalid, needs to log in the execution first step again, and the 3rd is performed if effectively
Step;
3rd step:Judge whether operator has the authority of editor user, the 5th step is performed if the authority for having editor user, if not having
The authority for having editor user then performs the 4th step;
4th step:Judge whether user is modification personal information, if it is performs the 5th step, is failed if not then modification,
Perform the 7th step;
5th step:Judge whether to edit ID, if then editor's failure, performs the 7th step, otherwise perform the 6th step;
6th step:The corresponding information of user is changed according to the parameter of upload, it is successfully modified, perform the 7th step;
7th step:Modification terminates;
The step of background process application work order information is:
The first step:Backstage logs in api interface by user, receives the user's login account password transmitted by login management platform,
Inquiry database user whether there is, and in the absence of then needing to re-enter account number cipher, exists, logins successfully, and then generation is dynamic
The effective period of time of state token and dynamic token, then update the data dynamic token and dynamic token in storehouse user set
Effective period of time;
Second step:Backstage is received the information that operator uploads, data parsed, according to base by base station inquiry api interface
The partial information of station address, base station information set is searched for generally, return to the base station address information of matching, selected for operator
Select the complete base station address information for needing to fill in;
3rd step:Backstage receives the information for the application work order that operator uploads, and data are entered by applying for work order api interface
Row parsing;
4th step:Background program judges whether the dynamic token of operator is effective, and the first step can be re-executed if invalid, if
Effective then the 5th step of execution;
5th step:Background program judges whether user has application work order authority, the 6th step is performed if having permission, if without authority
Then apply for work order failure, perform the 11st step;
6th step:Background program judges whether it belongs to the authority of operator management to applying for that the base station of operation is checked
Under base station, if then add base station relevant information, including the address of base station, longitude and latitude, base station administrative staff name,
The information such as ID, phone, affiliated unit, the ID of the corresponding lock in base station and encryption key, then perform the 7th step, otherwise application is lost
Lose, perform the 11st step;
7th step:Background program is checked electronic key information, and it is its director to judge operator, and its use
Scope, the relevant information of key, including the 8th step of use range of key etc. and then execution are filled in if by examination & verification, otherwise Shen
It please fail, perform the 11st step;
8th step:Background program verifies to the form of activity duration, and the operation beginning and ending time is 10 digit in seconds
Existing for the form of timestamp, and the operation time started is more than or equal to current time, and the end time of operation, which is more than, waits operation to open
Begin the time, by performing the 9th step after checking, otherwise application failure, carry out the 11st step;
9th step:Background program verifies see whether be sky to homework type, is not empty then the tenth step of execution, for sky then
Application failure, performs 11 steps;
Tenth step:Background program verifies see whether be sky to operation reason, not different for empty then addition examination & verification situation, work order
Normal mark, operation abnormal marking, the relevant information for examining abnormal marking, operation deadline, completion status and work order ID, ginseng
According to the information inside the design work order information set of chapter 3 database, work order ID current times generate after timestamp takes ten,
Data preserve database, apply successfully, performing the 11st step, for empty then application failure, perform the 11st step;
11st step:Application terminates, and returns to operating result, the data format that its data format returns when being user's registration.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710586190.3A CN107370733A (en) | 2017-07-18 | 2017-07-18 | A kind of intelligent lock management method based on Rijndael and ECC Hybrid Encryptions |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710586190.3A CN107370733A (en) | 2017-07-18 | 2017-07-18 | A kind of intelligent lock management method based on Rijndael and ECC Hybrid Encryptions |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107370733A true CN107370733A (en) | 2017-11-21 |
Family
ID=60308080
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710586190.3A Pending CN107370733A (en) | 2017-07-18 | 2017-07-18 | A kind of intelligent lock management method based on Rijndael and ECC Hybrid Encryptions |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107370733A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111815816A (en) * | 2020-06-22 | 2020-10-23 | 北京智辉空间科技有限责任公司 | Electronic lock security system and key distribution method thereof |
CN113487783A (en) * | 2021-07-06 | 2021-10-08 | 西北工业大学 | Method for realizing access control system control based on biological feature recognition function of smart phone |
CN115037773A (en) * | 2022-07-28 | 2022-09-09 | 中兴(温州)轨道通讯技术有限公司 | Rail transit communication system with stable transmission |
CN115344851A (en) * | 2022-10-13 | 2022-11-15 | 海看网络科技(山东)股份有限公司 | Method for realizing non-inductive refreshing of token based on dynamic proxy |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101064595A (en) * | 2006-04-27 | 2007-10-31 | 联想(北京)有限公司 | Computer network safe input authentication system and method |
US20120033809A1 (en) * | 2010-08-04 | 2012-02-09 | Huang Lawrence P | System for scrambling and methods for use therewith |
CN103490894A (en) * | 2013-09-09 | 2014-01-01 | 飞天诚信科技股份有限公司 | Implementation method and device for determining lifecycle of intelligent key device |
CN106603484A (en) * | 2016-10-25 | 2017-04-26 | 雷飏 | Virtual key method and apparatus using the same, background system, and user terminal |
-
2017
- 2017-07-18 CN CN201710586190.3A patent/CN107370733A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101064595A (en) * | 2006-04-27 | 2007-10-31 | 联想(北京)有限公司 | Computer network safe input authentication system and method |
US20120033809A1 (en) * | 2010-08-04 | 2012-02-09 | Huang Lawrence P | System for scrambling and methods for use therewith |
CN103490894A (en) * | 2013-09-09 | 2014-01-01 | 飞天诚信科技股份有限公司 | Implementation method and device for determining lifecycle of intelligent key device |
CN106603484A (en) * | 2016-10-25 | 2017-04-26 | 雷飏 | Virtual key method and apparatus using the same, background system, and user terminal |
Non-Patent Citations (1)
Title |
---|
陈启祥等: "《基于Rijndael和ECC算法的网络数据安全系统》", 《计算机工程》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111815816A (en) * | 2020-06-22 | 2020-10-23 | 北京智辉空间科技有限责任公司 | Electronic lock security system and key distribution method thereof |
CN113487783A (en) * | 2021-07-06 | 2021-10-08 | 西北工业大学 | Method for realizing access control system control based on biological feature recognition function of smart phone |
CN115037773A (en) * | 2022-07-28 | 2022-09-09 | 中兴(温州)轨道通讯技术有限公司 | Rail transit communication system with stable transmission |
CN115344851A (en) * | 2022-10-13 | 2022-11-15 | 海看网络科技(山东)股份有限公司 | Method for realizing non-inductive refreshing of token based on dynamic proxy |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220407720A1 (en) | Electronic identification verification methods and systems with storage of certification records to a side chain | |
CN109643285B (en) | Encrypted user data transmission and storage | |
US7620824B2 (en) | Data communicating apparatus, data communicating method, and program | |
Küsters et al. | sElect: a lightweight verifiable remote voting system | |
CN102484638B (en) | Layered protection and validation of identity data delivered online via multiple intermediate clients | |
JP4788212B2 (en) | Digital signature program and digital signature system | |
WO2018145127A1 (en) | Electronic identification verification methods and systems with storage of certification records to a side chain | |
CN110555029A (en) | ticket management method and device based on block chain and storage medium | |
CN106341493A (en) | Entity rights oriented digitalized electronic contract signing method | |
CN106104562A (en) | Safety of secret data stores and recovery system and method | |
CN106060078B (en) | User information encryption method, register method and verification method applied to cloud platform | |
CN107370733A (en) | A kind of intelligent lock management method based on Rijndael and ECC Hybrid Encryptions | |
KR102357460B1 (en) | Electronic voting system and method based on homogeneous cryptography | |
CN104574176A (en) | USBKEY-based secure online tax declaration method | |
CN103905204A (en) | Data transmission method and transmission system | |
CN103825724B (en) | Identification type password system and method for updating and recovering private key automatically | |
CN106060073B (en) | Channel key machinery of consultation | |
CN102055685B (en) | Method for encrypting webmail information | |
CN106961329A (en) | A kind of solution for being directed to ADS B agreements confidentiality and integrality | |
CN111625800A (en) | Digital identity authentication method and system based on in-vivo detection | |
Sujithra et al. | ID based adaptive-key signcryption for data security in cloud environment | |
CN102821110B (en) | A kind of password method for retrieving for audio/video storage device | |
CN113761578A (en) | Document true checking method based on block chain | |
Setiawan et al. | Design of secure electronic disposition applications by applying blowfish, SHA-512, and RSA digital signature algorithms to government institution | |
CN106254341A (en) | Data fingerprint extracting method and system for centralized electronic data safety system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171121 |
|
RJ01 | Rejection of invention patent application after publication |