CN108234458A - Method, the system of encryption storage and the decryption extraction of a kind of cloud lock cipher - Google Patents
Method, the system of encryption storage and the decryption extraction of a kind of cloud lock cipher Download PDFInfo
- Publication number
- CN108234458A CN108234458A CN201711391000.9A CN201711391000A CN108234458A CN 108234458 A CN108234458 A CN 108234458A CN 201711391000 A CN201711391000 A CN 201711391000A CN 108234458 A CN108234458 A CN 108234458A
- Authority
- CN
- China
- Prior art keywords
- password
- cloud
- timestamp
- module
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00412—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
- G07C2009/00825—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication
Abstract
Encryption storage and the method for decrypting extraction the present invention relates to a kind of cloud lock cipher, including:Step A logs in the cloud lock APP and inputs clear-text passwords;Step B, is encrypted password, generates encrypted characters string;Step C is encrypted the encrypted characters string using secret key and Encryption Algorithm, generates secret order;Secret order is stored to the cloud and locks in APP and be sent to the server by step D;Step E, the server decrypt the secret order and obtain the encrypted characters string;Step F, the server obtain the clear-text passwords and timestamp;Step G, secondary to log in the cloud lock APP, the cloud lock APP reads secret order and secret order is sent to the server;Step H, the server are decrypted, and obtain the secondary clear-text passwords logged in and timestamp and are compared.The present invention makes the storage of password safer.The timestamp obtained is decrypted, can more easily judge password whether in effective time limit.
Description
Technical field
The present invention relates to intelligent door lock technical fields, and in particular to what the encryption storage and decryption of a kind of cloud lock cipher were extracted
Method, system.
Background technology
With the development of network technology and informationized society, in a manner that intelligent cloud locks remote control door lock by
Gradually become a reality.However exactly the ciphering process more safety that cloud is locked how to be allowed just to become further due to the convenience of network
The greatest problem that development cloud lock system needs solve.In the application process of cloud lock, even if user has selected to remember password, pass through
Extraneous program also is difficult to code breaking, this is only needs and goes one of practical problem specifically implemented.
Invention content
It is an object of the invention to be directed to shortcoming of the prior art, provide a kind of cryptographic security better cloud lock
Method, the system of encryption storage and the decryption extraction of password.
For this purpose, the present invention uses following technical scheme:
A kind of method of encryption storage and the decryption extraction of cloud lock cipher, locks APP and server including cloud;The cloud lock
APP is connected with server by telecommunication network;The method of the encryption storage and decryption extraction includes:
Step A logs in the cloud lock APP and inputs clear-text passwords, password is encrypted if password is remembered in selection, if
Selection does not remember that password then terminates;
Step B, is encrypted password, carries out bit arithmetic, splicing character string and timestamp to the password of input, generation adds
Close character string;
Step C is encrypted the encrypted characters string using secret key and Encryption Algorithm, generates secret order;
Secret order is stored to the cloud and locked in APP, while the secret order is sent to the server by step D;
Step E, the server decrypt the secret order using secret key and decipherment algorithm;Obtain the encrypted characters string;
Step F, the character string and timestamp of the server removal splicing, and reverse bit arithmetic is carried out, obtain institute
State clear-text passwords and timestamp;
Step G, secondary to log in the cloud lock APP, the cloud lock APP reads secret order and secret order is sent to the service
Device;
Step H, the server are decrypted in the method for step E and step F, obtain the secondary clear-text passwords logged in and
Timestamp, and the clear-text passwords with obtaining before and timestamp are compared, password is effective if the timestamp is in timeliness,
The password useless if timestamp is except timeliness.
Further description, the character string is multigroup by user's self-defining, from wherein in the character string is spliced
Randomly choose one group of use.
Further description, the encryption method are encrypted for MD5 or BASE64.
Further description, by User Defined, user voluntarily selects to remember password the time limit of the timestamp
Time limit.
The system of encryption storage and the decryption extraction of a kind of cloud lock cipher, locks APP and server including cloud;
The cloud lock APP includes encrypting module, password sending module and secret order storage module;
The encrypting module is calculated for being added character string and timestamp to clear-text passwords and using secret key and encrypt
Life is encrypted;The password sending module is sent to the server for secret order;The secret order storage module, module are used for
Secret order is stored to the cloud and locks APP;
The server includes deciphering module and password comparing module;
The deciphering module obtains clear-text passwords and timestamp for secret order to be decrypted;The password comparing module
For comparing password and timestamp.
Further description, the cloud, which is locked in APP, further includes character string setting module, and character string is made by oneself for user
Justice setting.
Further description, the cloud, which is locked in the encrypting module in APP, is additionally provided with enciphering algorithm module, the encryption
Algoritic module is encrypted using the method for MD5 or BASE64.
Further description, the encrypting module that the cloud is locked in APP is additionally provided with timestamp definition module, for user couple
The time limit self-defined setting of timestamp.
Beneficial effects of the present invention:By splicing character string, timestamp, using secret key and the encrypted mode of Encryption Algorithm,
The storage for making password is safer.Timestamp as cryptographic means is obtained during decryption simultaneously as one of verification information, it can be with
More easily judge password whether in effective time limit.
Description of the drawings
The present invention is further described with reference to the accompanying drawings and examples.
Fig. 1 is one embodiment of the present of invention flow chart.
Specific embodiment
Technical solution to further illustrate the present invention below with reference to the accompanying drawings and specific embodiments.
As shown in Figure 1, a kind of method of encryption storage and the decryption extraction of cloud lock cipher, locks APP and server including cloud;
The cloud lock APP is connected with server by telecommunication network;The method of the encryption storage and decryption extraction includes:
Step A logs in the cloud lock APP and inputs clear-text passwords, password is encrypted if password is remembered in selection, if
Selection does not remember that password then terminates;
Step B, is encrypted password, carries out bit arithmetic, splicing character string and timestamp to the password of input, generation adds
Close character string;
Step C is encrypted the encrypted characters string using secret key and Encryption Algorithm, generates secret order;
Secret order is stored to the cloud and locked in APP, while the secret order is sent to the server by step D;
Step E, the server decrypt the secret order using secret key and decipherment algorithm;Obtain the encrypted characters string;
Step F, the character string and timestamp of the server removal splicing, and reverse bit arithmetic is carried out, obtain institute
State clear-text passwords and timestamp;
Step G, secondary to log in the cloud lock APP, the cloud lock APP reads secret order and secret order is sent to the service
Device;
Step H, the server are decrypted in the method for step E and step F, obtain the secondary clear-text passwords logged in and
Timestamp, and the clear-text passwords with obtaining before and timestamp are compared, password is effective if the timestamp is in timeliness,
The password useless if timestamp is except timeliness.
Bit arithmetic, splicing character string and timestamp are carried out to the clear-text passwords of input, carried out using secret key and Encryption Algorithm
It after encryption, then is stored into local cloud lock APP, the password that the mode of this multi-enciphering avoids cloud lock APP is stolen.
When extracting clear-text passwords, in addition to clear-text passwords also extracts the timestamp spliced during encryption, timestamp password in timeliness is just effective.
Additional temporal information is made that further protection to the safety of password, even if password eavesdropper has stolen secret order, is limiting
Can not be cracked in the fixed time still can not obtain valid password, and the cryptoguard for thus making cloud lock APP is safer.
Further description, the character string is multigroup by user's self-defining, from wherein in the character string is spliced
Randomly choose one group of use.
User defined character string group more has randomness compared to the character string that system fixes generation, more flexible, to decoding
There is the decoding difficulty of bigger for person, improve encrypted safety.
Further description, the encryption method are encrypted for MD5 or BASE64.
In addition to the cryptographic means of secret key, the cipher mode of MD5 or BASE64 are also set up, makes Encryption Algorithm more complicated, more
Difficulty is cracked.
Further description, by User Defined, user voluntarily selects to remember password the time limit of the timestamp
Time limit.
If wanting to further improve the safety of the password in cloud lock APP, the replacement password of not timing is a choosing well
It selects.User's sets itself timestamp, to after setting the time limit, user can reset password as needed or set again timestamp
It fixes time stamp, further improves the safety of cloud lock APP.
The system of encryption storage and the decryption extraction of a kind of cloud lock cipher, locks APP and server including cloud;
The cloud lock APP includes encrypting module, password sending module and secret order storage module;
The encrypting module is calculated for being added character string and timestamp to clear-text passwords and using secret key and encrypt
Life is encrypted;The password sending module is sent to the server for secret order;The secret order storage module, module are used for
Secret order is stored to the cloud and locks APP;
The server includes deciphering module and password comparing module;
The deciphering module obtains clear-text passwords and timestamp for secret order to be decrypted;The password comparing module
For comparing password and timestamp.
The advanced line position operation of ciphering process, splicing character string and timestamp, after being encrypted using secret key and Encryption Algorithm,
It is stored into again in local cloud lock APP, complicated cipher mode makes password be more difficult to be cracked, and password is safer.Timestamp pair
The entry-into-force time of password is made that limitation, further improves the safety coefficient of password.
Further description, the cloud, which is locked in APP, further includes character string setting module, and character string is made by oneself for user
Justice setting.
The character string of User Defined setting compare the character string that fixation generates and more difficult has been cracked.
Further description, the cloud, which is locked in the encrypting module in APP, is additionally provided with enciphering algorithm module, the encryption
Algoritic module is encrypted using the method for MD5 or BASE64.
Encryption method is more various, safety coefficient higher.
Further description, the encrypting module that the cloud is locked in APP is additionally provided with timestamp definition module, for user couple
The time limit self-defined setting of timestamp.
It allows user that can be free to arrange the service life of password, makes cloud lock APP safer.
More than content is only presently preferred embodiments of the present invention, for those of ordinary skill in the art, according to the present invention
Thought, there will be changes, the content of the present specification should not be construed as to the present invention in specific embodiments and applications
Limitation.
Claims (8)
1. a kind of method of encryption storage and the decryption extraction of cloud lock cipher, it is characterised in that:APP and server are locked including cloud;
The cloud lock APP is connected with server by telecommunication network;The method of the encryption storage and decryption extraction includes:
Step A logs in the cloud lock APP and inputs clear-text passwords, password is encrypted if password is remembered in selection, if selection
Do not remember that password then terminates;
Step B, is encrypted password, carries out bit arithmetic, splicing character string and timestamp to the password of input, generates encrypted word
Symbol string;
Step C is encrypted the encrypted characters string using secret key and Encryption Algorithm, generates secret order;
Secret order is stored to the cloud and locked in APP, while the secret order is sent to the server by step D;
Step E, the server decrypt the secret order using secret key and decipherment algorithm;Obtain the encrypted characters string;
Step F, the character string and timestamp of the server removal splicing, and reverse bit arithmetic is carried out, acquisition is stated clearly
Literary password and timestamp;
Step G, secondary to log in the cloud lock APP, the cloud lock APP reads secret order and secret order is sent to the server;
Step H, the server are decrypted in the method for step E and step F, obtain the secondary clear-text passwords logged in and time
Stamp, and the clear-text passwords with obtaining before and timestamp are compared, password is effective if the timestamp is in timeliness, if when
Between stamp then password useless except timeliness.
2. the method for encryption storage and the decryption extraction of cloud lock cipher according to claim 1, it is characterised in that:The word
Symbol string is multigroup by user's self-defining, from wherein randomly choosing one group of use in the character string is spliced.
3. the method for encryption storage and the decryption extraction of cloud lock cipher according to claim 1, it is characterised in that:It is described to add
Decryption method is encrypted for MD5 or BASE64.
4. the method for encryption storage and the decryption extraction of cloud lock cipher according to claim 1, it is characterised in that:When described
Between the time limit stabbed by User Defined, user voluntarily selects to remember the time limit of password.
5. a kind of system of encryption storage and the decryption extraction of cloud lock cipher, it is characterised in that:APP and server are locked including cloud;
The cloud lock APP includes encrypting module, password sending module and secret order storage module;
The encrypting module for clear-text passwords is added character string and timestamp and using secret key and encryption tell the fortune into
Row encryption;The password sending module is sent to the server for secret order;The secret order storage module, module is used for will be close
Storage to the cloud is enabled to lock APP;
The server includes deciphering module and password comparing module;
The deciphering module obtains clear-text passwords and timestamp for secret order to be decrypted;The password comparing module is used for
Compare password and timestamp.
6. the system of encryption storage and the decryption extraction of cloud lock cipher according to claim 5, it is characterised in that:The cloud
Character string setting module is further included in lock APP, for user's self-defined setting to character string.
7. the system of encryption storage and the decryption extraction of cloud lock cipher according to claim 5, it is characterised in that:The cloud
Enciphering algorithm module, the method that the enciphering algorithm module uses MD5 or BASE64 are additionally provided in encrypting module in lock APP
It is encrypted.
8. the system of encryption storage and the decryption extraction of cloud lock cipher according to claim 5, it is characterised in that:The cloud
Encrypting module in lock APP is additionally provided with timestamp definition module, for user to the self-defined setting of the time limit of timestamp.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711391000.9A CN108234458A (en) | 2017-12-21 | 2017-12-21 | Method, the system of encryption storage and the decryption extraction of a kind of cloud lock cipher |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711391000.9A CN108234458A (en) | 2017-12-21 | 2017-12-21 | Method, the system of encryption storage and the decryption extraction of a kind of cloud lock cipher |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108234458A true CN108234458A (en) | 2018-06-29 |
Family
ID=62647539
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711391000.9A Pending CN108234458A (en) | 2017-12-21 | 2017-12-21 | Method, the system of encryption storage and the decryption extraction of a kind of cloud lock cipher |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108234458A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109150903A (en) * | 2018-09-25 | 2019-01-04 | 平安科技(深圳)有限公司 | A kind of account management method, device, storage medium and terminal device |
CN109936447A (en) * | 2019-01-31 | 2019-06-25 | 平安科技(深圳)有限公司 | Encryption and authentication method, system and computer equipment based on timestamp |
CN110445768A (en) * | 2019-07-18 | 2019-11-12 | 阿里巴巴集团控股有限公司 | A kind of login method, device and electronic equipment |
CN110796798A (en) * | 2018-08-01 | 2020-02-14 | 北京思源理想控股集团有限公司 | Intelligent inbox system and method |
CN112446982A (en) * | 2019-08-10 | 2021-03-05 | 云丁网络技术(北京)有限公司 | Method, device, computer readable medium and equipment for controlling intelligent lock |
CN112653701A (en) * | 2020-12-24 | 2021-04-13 | 北京安信天行科技有限公司 | Application password safe use monitoring method and system |
CN113343278A (en) * | 2021-07-05 | 2021-09-03 | 湖南快乐阳光互动娱乐传媒有限公司 | Login request verification method and device for preventing CSRF attack |
CN113538752A (en) * | 2021-07-20 | 2021-10-22 | 慧管(上海)信息科技有限公司 | Offline dynamic two-dimensional code verification method for access control terminal equipment |
CN114267102A (en) * | 2021-12-02 | 2022-04-01 | 深圳市皇家金盾智能科技有限公司 | Intelligent door lock control method, device and system |
US11417159B2 (en) | 2019-08-02 | 2022-08-16 | Yunding Network Technology (Beijing) Co., Ltd. | Methods and systems for controlling a smart lock |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101309278A (en) * | 2008-06-27 | 2008-11-19 | 腾讯科技(深圳)有限公司 | Method and system for storing encrypt data on customer |
US20110087890A1 (en) * | 2009-10-09 | 2011-04-14 | Lsi Corporation | Interlocking plain text passwords to data encryption keys |
CN105812357A (en) * | 2016-03-07 | 2016-07-27 | 中标软件有限公司 | User password management method for cloud computing platform |
CN105827408A (en) * | 2015-12-03 | 2016-08-03 | 中国航天系统工程有限公司 | Timestamp technique-based industrial network security transmission method |
CN106357404A (en) * | 2016-08-26 | 2017-01-25 | 易联(北京)物联网科技有限公司 | Data encryption method based on NFC chip security authentication |
-
2017
- 2017-12-21 CN CN201711391000.9A patent/CN108234458A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101309278A (en) * | 2008-06-27 | 2008-11-19 | 腾讯科技(深圳)有限公司 | Method and system for storing encrypt data on customer |
US20110087890A1 (en) * | 2009-10-09 | 2011-04-14 | Lsi Corporation | Interlocking plain text passwords to data encryption keys |
CN105827408A (en) * | 2015-12-03 | 2016-08-03 | 中国航天系统工程有限公司 | Timestamp technique-based industrial network security transmission method |
CN105812357A (en) * | 2016-03-07 | 2016-07-27 | 中标软件有限公司 | User password management method for cloud computing platform |
CN106357404A (en) * | 2016-08-26 | 2017-01-25 | 易联(北京)物联网科技有限公司 | Data encryption method based on NFC chip security authentication |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110796798A (en) * | 2018-08-01 | 2020-02-14 | 北京思源理想控股集团有限公司 | Intelligent inbox system and method |
CN109150903A (en) * | 2018-09-25 | 2019-01-04 | 平安科技(深圳)有限公司 | A kind of account management method, device, storage medium and terminal device |
CN109936447A (en) * | 2019-01-31 | 2019-06-25 | 平安科技(深圳)有限公司 | Encryption and authentication method, system and computer equipment based on timestamp |
CN110445768A (en) * | 2019-07-18 | 2019-11-12 | 阿里巴巴集团控股有限公司 | A kind of login method, device and electronic equipment |
CN110445768B (en) * | 2019-07-18 | 2021-11-09 | 创新先进技术有限公司 | Login method and device and electronic equipment |
US11417159B2 (en) | 2019-08-02 | 2022-08-16 | Yunding Network Technology (Beijing) Co., Ltd. | Methods and systems for controlling a smart lock |
US11928904B2 (en) | 2019-08-02 | 2024-03-12 | Yunding Network Technology (Beijing) Co., Ltd. | Methods and systems for controlling a smart lock |
CN112446982A (en) * | 2019-08-10 | 2021-03-05 | 云丁网络技术(北京)有限公司 | Method, device, computer readable medium and equipment for controlling intelligent lock |
CN112653701A (en) * | 2020-12-24 | 2021-04-13 | 北京安信天行科技有限公司 | Application password safe use monitoring method and system |
CN112653701B (en) * | 2020-12-24 | 2023-03-14 | 北京安信天行科技有限公司 | Application password safe use monitoring method and system |
CN113343278A (en) * | 2021-07-05 | 2021-09-03 | 湖南快乐阳光互动娱乐传媒有限公司 | Login request verification method and device for preventing CSRF attack |
CN113343278B (en) * | 2021-07-05 | 2022-07-26 | 湖南快乐阳光互动娱乐传媒有限公司 | Login request verification method and device for preventing CSRF attack |
CN113538752A (en) * | 2021-07-20 | 2021-10-22 | 慧管(上海)信息科技有限公司 | Offline dynamic two-dimensional code verification method for access control terminal equipment |
CN114267102A (en) * | 2021-12-02 | 2022-04-01 | 深圳市皇家金盾智能科技有限公司 | Intelligent door lock control method, device and system |
CN114267102B (en) * | 2021-12-02 | 2023-11-17 | 深圳市皇家金盾智能科技有限公司 | Intelligent door lock control method, device and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108234458A (en) | Method, the system of encryption storage and the decryption extraction of a kind of cloud lock cipher | |
CN105471584B (en) | A kind of identity identifying method based on quantum key encryption | |
KR101874721B1 (en) | Identity authentication system, apparatus, and method, and identity authentication request apparatus | |
TWI536790B (en) | Communication method using fingerprint information authentication | |
CN104219228A (en) | User registration and user identification method and user registration and user identification system | |
CN106506487A (en) | A kind of information Encrypt and Decrypt method and device | |
KR102510785B1 (en) | Methods and systems for safely transmitting data | |
JP2009103774A (en) | Secret sharing system | |
CN102833075A (en) | Identity authentication and digital signature method based on three-layered overlapping type key management technology | |
US20150256343A1 (en) | Securely Generating and Storing Passwords in a Computer System | |
US20210281399A1 (en) | Methods and systems of securely transferring data | |
CN103560892A (en) | Secret key generation method and secret key generation device | |
CN104219044A (en) | Key secret method for encrypting storing device | |
CN104268447A (en) | Encryption method of embedded software | |
CN105281902A (en) | Web system safety login method based on mobile terminal | |
CN105791258A (en) | Data transmission method, terminal and open platform | |
CN104866784A (en) | BIOS encryption-based safety hard disk, and data encryption and decryption method | |
CN103338106A (en) | Methods and devices for ciphering and deciphering file | |
CN104113410A (en) | Method and device for data encryption transmission based on multi-table encryption method | |
CN103117850A (en) | Cryptosystem based on random sequence database | |
CN102882675A (en) | Password encryption method for social network sites | |
CN104394532A (en) | Anti-brute force safe log-in method for mobile terminal | |
CN109412799B (en) | System and method for generating local key | |
CN114282189A (en) | Data security storage method, system, client and server | |
KR101754519B1 (en) | Keyboard secure system and method for protecting data input via keyboard using one time key |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180629 |