CN108234458A - Method, the system of encryption storage and the decryption extraction of a kind of cloud lock cipher - Google Patents

Method, the system of encryption storage and the decryption extraction of a kind of cloud lock cipher Download PDF

Info

Publication number
CN108234458A
CN108234458A CN201711391000.9A CN201711391000A CN108234458A CN 108234458 A CN108234458 A CN 108234458A CN 201711391000 A CN201711391000 A CN 201711391000A CN 108234458 A CN108234458 A CN 108234458A
Authority
CN
China
Prior art keywords
password
cloud
timestamp
module
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711391000.9A
Other languages
Chinese (zh)
Inventor
王雷波
黎宇
叶敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Hutlon Technology Co Ltd
Original Assignee
Guangdong Hutlon Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Hutlon Technology Co Ltd filed Critical Guangdong Hutlon Technology Co Ltd
Priority to CN201711391000.9A priority Critical patent/CN108234458A/en
Publication of CN108234458A publication Critical patent/CN108234458A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00412Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00825Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication

Abstract

Encryption storage and the method for decrypting extraction the present invention relates to a kind of cloud lock cipher, including:Step A logs in the cloud lock APP and inputs clear-text passwords;Step B, is encrypted password, generates encrypted characters string;Step C is encrypted the encrypted characters string using secret key and Encryption Algorithm, generates secret order;Secret order is stored to the cloud and locks in APP and be sent to the server by step D;Step E, the server decrypt the secret order and obtain the encrypted characters string;Step F, the server obtain the clear-text passwords and timestamp;Step G, secondary to log in the cloud lock APP, the cloud lock APP reads secret order and secret order is sent to the server;Step H, the server are decrypted, and obtain the secondary clear-text passwords logged in and timestamp and are compared.The present invention makes the storage of password safer.The timestamp obtained is decrypted, can more easily judge password whether in effective time limit.

Description

Method, the system of encryption storage and the decryption extraction of a kind of cloud lock cipher
Technical field
The present invention relates to intelligent door lock technical fields, and in particular to what the encryption storage and decryption of a kind of cloud lock cipher were extracted Method, system.
Background technology
With the development of network technology and informationized society, in a manner that intelligent cloud locks remote control door lock by Gradually become a reality.However exactly the ciphering process more safety that cloud is locked how to be allowed just to become further due to the convenience of network The greatest problem that development cloud lock system needs solve.In the application process of cloud lock, even if user has selected to remember password, pass through Extraneous program also is difficult to code breaking, this is only needs and goes one of practical problem specifically implemented.
Invention content
It is an object of the invention to be directed to shortcoming of the prior art, provide a kind of cryptographic security better cloud lock Method, the system of encryption storage and the decryption extraction of password.
For this purpose, the present invention uses following technical scheme:
A kind of method of encryption storage and the decryption extraction of cloud lock cipher, locks APP and server including cloud;The cloud lock APP is connected with server by telecommunication network;The method of the encryption storage and decryption extraction includes:
Step A logs in the cloud lock APP and inputs clear-text passwords, password is encrypted if password is remembered in selection, if Selection does not remember that password then terminates;
Step B, is encrypted password, carries out bit arithmetic, splicing character string and timestamp to the password of input, generation adds Close character string;
Step C is encrypted the encrypted characters string using secret key and Encryption Algorithm, generates secret order;
Secret order is stored to the cloud and locked in APP, while the secret order is sent to the server by step D;
Step E, the server decrypt the secret order using secret key and decipherment algorithm;Obtain the encrypted characters string;
Step F, the character string and timestamp of the server removal splicing, and reverse bit arithmetic is carried out, obtain institute State clear-text passwords and timestamp;
Step G, secondary to log in the cloud lock APP, the cloud lock APP reads secret order and secret order is sent to the service Device;
Step H, the server are decrypted in the method for step E and step F, obtain the secondary clear-text passwords logged in and Timestamp, and the clear-text passwords with obtaining before and timestamp are compared, password is effective if the timestamp is in timeliness, The password useless if timestamp is except timeliness.
Further description, the character string is multigroup by user's self-defining, from wherein in the character string is spliced Randomly choose one group of use.
Further description, the encryption method are encrypted for MD5 or BASE64.
Further description, by User Defined, user voluntarily selects to remember password the time limit of the timestamp Time limit.
The system of encryption storage and the decryption extraction of a kind of cloud lock cipher, locks APP and server including cloud;
The cloud lock APP includes encrypting module, password sending module and secret order storage module;
The encrypting module is calculated for being added character string and timestamp to clear-text passwords and using secret key and encrypt Life is encrypted;The password sending module is sent to the server for secret order;The secret order storage module, module are used for Secret order is stored to the cloud and locks APP;
The server includes deciphering module and password comparing module;
The deciphering module obtains clear-text passwords and timestamp for secret order to be decrypted;The password comparing module For comparing password and timestamp.
Further description, the cloud, which is locked in APP, further includes character string setting module, and character string is made by oneself for user Justice setting.
Further description, the cloud, which is locked in the encrypting module in APP, is additionally provided with enciphering algorithm module, the encryption Algoritic module is encrypted using the method for MD5 or BASE64.
Further description, the encrypting module that the cloud is locked in APP is additionally provided with timestamp definition module, for user couple The time limit self-defined setting of timestamp.
Beneficial effects of the present invention:By splicing character string, timestamp, using secret key and the encrypted mode of Encryption Algorithm, The storage for making password is safer.Timestamp as cryptographic means is obtained during decryption simultaneously as one of verification information, it can be with More easily judge password whether in effective time limit.
Description of the drawings
The present invention is further described with reference to the accompanying drawings and examples.
Fig. 1 is one embodiment of the present of invention flow chart.
Specific embodiment
Technical solution to further illustrate the present invention below with reference to the accompanying drawings and specific embodiments.
As shown in Figure 1, a kind of method of encryption storage and the decryption extraction of cloud lock cipher, locks APP and server including cloud; The cloud lock APP is connected with server by telecommunication network;The method of the encryption storage and decryption extraction includes:
Step A logs in the cloud lock APP and inputs clear-text passwords, password is encrypted if password is remembered in selection, if Selection does not remember that password then terminates;
Step B, is encrypted password, carries out bit arithmetic, splicing character string and timestamp to the password of input, generation adds Close character string;
Step C is encrypted the encrypted characters string using secret key and Encryption Algorithm, generates secret order;
Secret order is stored to the cloud and locked in APP, while the secret order is sent to the server by step D;
Step E, the server decrypt the secret order using secret key and decipherment algorithm;Obtain the encrypted characters string;
Step F, the character string and timestamp of the server removal splicing, and reverse bit arithmetic is carried out, obtain institute State clear-text passwords and timestamp;
Step G, secondary to log in the cloud lock APP, the cloud lock APP reads secret order and secret order is sent to the service Device;
Step H, the server are decrypted in the method for step E and step F, obtain the secondary clear-text passwords logged in and Timestamp, and the clear-text passwords with obtaining before and timestamp are compared, password is effective if the timestamp is in timeliness, The password useless if timestamp is except timeliness.
Bit arithmetic, splicing character string and timestamp are carried out to the clear-text passwords of input, carried out using secret key and Encryption Algorithm It after encryption, then is stored into local cloud lock APP, the password that the mode of this multi-enciphering avoids cloud lock APP is stolen. When extracting clear-text passwords, in addition to clear-text passwords also extracts the timestamp spliced during encryption, timestamp password in timeliness is just effective. Additional temporal information is made that further protection to the safety of password, even if password eavesdropper has stolen secret order, is limiting Can not be cracked in the fixed time still can not obtain valid password, and the cryptoguard for thus making cloud lock APP is safer.
Further description, the character string is multigroup by user's self-defining, from wherein in the character string is spliced Randomly choose one group of use.
User defined character string group more has randomness compared to the character string that system fixes generation, more flexible, to decoding There is the decoding difficulty of bigger for person, improve encrypted safety.
Further description, the encryption method are encrypted for MD5 or BASE64.
In addition to the cryptographic means of secret key, the cipher mode of MD5 or BASE64 are also set up, makes Encryption Algorithm more complicated, more Difficulty is cracked.
Further description, by User Defined, user voluntarily selects to remember password the time limit of the timestamp Time limit.
If wanting to further improve the safety of the password in cloud lock APP, the replacement password of not timing is a choosing well It selects.User's sets itself timestamp, to after setting the time limit, user can reset password as needed or set again timestamp It fixes time stamp, further improves the safety of cloud lock APP.
The system of encryption storage and the decryption extraction of a kind of cloud lock cipher, locks APP and server including cloud;
The cloud lock APP includes encrypting module, password sending module and secret order storage module;
The encrypting module is calculated for being added character string and timestamp to clear-text passwords and using secret key and encrypt Life is encrypted;The password sending module is sent to the server for secret order;The secret order storage module, module are used for Secret order is stored to the cloud and locks APP;
The server includes deciphering module and password comparing module;
The deciphering module obtains clear-text passwords and timestamp for secret order to be decrypted;The password comparing module For comparing password and timestamp.
The advanced line position operation of ciphering process, splicing character string and timestamp, after being encrypted using secret key and Encryption Algorithm, It is stored into again in local cloud lock APP, complicated cipher mode makes password be more difficult to be cracked, and password is safer.Timestamp pair The entry-into-force time of password is made that limitation, further improves the safety coefficient of password.
Further description, the cloud, which is locked in APP, further includes character string setting module, and character string is made by oneself for user Justice setting.
The character string of User Defined setting compare the character string that fixation generates and more difficult has been cracked.
Further description, the cloud, which is locked in the encrypting module in APP, is additionally provided with enciphering algorithm module, the encryption Algoritic module is encrypted using the method for MD5 or BASE64.
Encryption method is more various, safety coefficient higher.
Further description, the encrypting module that the cloud is locked in APP is additionally provided with timestamp definition module, for user couple The time limit self-defined setting of timestamp.
It allows user that can be free to arrange the service life of password, makes cloud lock APP safer.
More than content is only presently preferred embodiments of the present invention, for those of ordinary skill in the art, according to the present invention Thought, there will be changes, the content of the present specification should not be construed as to the present invention in specific embodiments and applications Limitation.

Claims (8)

1. a kind of method of encryption storage and the decryption extraction of cloud lock cipher, it is characterised in that:APP and server are locked including cloud; The cloud lock APP is connected with server by telecommunication network;The method of the encryption storage and decryption extraction includes:
Step A logs in the cloud lock APP and inputs clear-text passwords, password is encrypted if password is remembered in selection, if selection Do not remember that password then terminates;
Step B, is encrypted password, carries out bit arithmetic, splicing character string and timestamp to the password of input, generates encrypted word Symbol string;
Step C is encrypted the encrypted characters string using secret key and Encryption Algorithm, generates secret order;
Secret order is stored to the cloud and locked in APP, while the secret order is sent to the server by step D;
Step E, the server decrypt the secret order using secret key and decipherment algorithm;Obtain the encrypted characters string;
Step F, the character string and timestamp of the server removal splicing, and reverse bit arithmetic is carried out, acquisition is stated clearly Literary password and timestamp;
Step G, secondary to log in the cloud lock APP, the cloud lock APP reads secret order and secret order is sent to the server;
Step H, the server are decrypted in the method for step E and step F, obtain the secondary clear-text passwords logged in and time Stamp, and the clear-text passwords with obtaining before and timestamp are compared, password is effective if the timestamp is in timeliness, if when Between stamp then password useless except timeliness.
2. the method for encryption storage and the decryption extraction of cloud lock cipher according to claim 1, it is characterised in that:The word Symbol string is multigroup by user's self-defining, from wherein randomly choosing one group of use in the character string is spliced.
3. the method for encryption storage and the decryption extraction of cloud lock cipher according to claim 1, it is characterised in that:It is described to add Decryption method is encrypted for MD5 or BASE64.
4. the method for encryption storage and the decryption extraction of cloud lock cipher according to claim 1, it is characterised in that:When described Between the time limit stabbed by User Defined, user voluntarily selects to remember the time limit of password.
5. a kind of system of encryption storage and the decryption extraction of cloud lock cipher, it is characterised in that:APP and server are locked including cloud;
The cloud lock APP includes encrypting module, password sending module and secret order storage module;
The encrypting module for clear-text passwords is added character string and timestamp and using secret key and encryption tell the fortune into Row encryption;The password sending module is sent to the server for secret order;The secret order storage module, module is used for will be close Storage to the cloud is enabled to lock APP;
The server includes deciphering module and password comparing module;
The deciphering module obtains clear-text passwords and timestamp for secret order to be decrypted;The password comparing module is used for Compare password and timestamp.
6. the system of encryption storage and the decryption extraction of cloud lock cipher according to claim 5, it is characterised in that:The cloud Character string setting module is further included in lock APP, for user's self-defined setting to character string.
7. the system of encryption storage and the decryption extraction of cloud lock cipher according to claim 5, it is characterised in that:The cloud Enciphering algorithm module, the method that the enciphering algorithm module uses MD5 or BASE64 are additionally provided in encrypting module in lock APP It is encrypted.
8. the system of encryption storage and the decryption extraction of cloud lock cipher according to claim 5, it is characterised in that:The cloud Encrypting module in lock APP is additionally provided with timestamp definition module, for user to the self-defined setting of the time limit of timestamp.
CN201711391000.9A 2017-12-21 2017-12-21 Method, the system of encryption storage and the decryption extraction of a kind of cloud lock cipher Pending CN108234458A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711391000.9A CN108234458A (en) 2017-12-21 2017-12-21 Method, the system of encryption storage and the decryption extraction of a kind of cloud lock cipher

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711391000.9A CN108234458A (en) 2017-12-21 2017-12-21 Method, the system of encryption storage and the decryption extraction of a kind of cloud lock cipher

Publications (1)

Publication Number Publication Date
CN108234458A true CN108234458A (en) 2018-06-29

Family

ID=62647539

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711391000.9A Pending CN108234458A (en) 2017-12-21 2017-12-21 Method, the system of encryption storage and the decryption extraction of a kind of cloud lock cipher

Country Status (1)

Country Link
CN (1) CN108234458A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109150903A (en) * 2018-09-25 2019-01-04 平安科技(深圳)有限公司 A kind of account management method, device, storage medium and terminal device
CN109936447A (en) * 2019-01-31 2019-06-25 平安科技(深圳)有限公司 Encryption and authentication method, system and computer equipment based on timestamp
CN110445768A (en) * 2019-07-18 2019-11-12 阿里巴巴集团控股有限公司 A kind of login method, device and electronic equipment
CN110796798A (en) * 2018-08-01 2020-02-14 北京思源理想控股集团有限公司 Intelligent inbox system and method
CN112446982A (en) * 2019-08-10 2021-03-05 云丁网络技术(北京)有限公司 Method, device, computer readable medium and equipment for controlling intelligent lock
CN112653701A (en) * 2020-12-24 2021-04-13 北京安信天行科技有限公司 Application password safe use monitoring method and system
CN113343278A (en) * 2021-07-05 2021-09-03 湖南快乐阳光互动娱乐传媒有限公司 Login request verification method and device for preventing CSRF attack
CN113538752A (en) * 2021-07-20 2021-10-22 慧管(上海)信息科技有限公司 Offline dynamic two-dimensional code verification method for access control terminal equipment
CN114267102A (en) * 2021-12-02 2022-04-01 深圳市皇家金盾智能科技有限公司 Intelligent door lock control method, device and system
US11417159B2 (en) 2019-08-02 2022-08-16 Yunding Network Technology (Beijing) Co., Ltd. Methods and systems for controlling a smart lock

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101309278A (en) * 2008-06-27 2008-11-19 腾讯科技(深圳)有限公司 Method and system for storing encrypt data on customer
US20110087890A1 (en) * 2009-10-09 2011-04-14 Lsi Corporation Interlocking plain text passwords to data encryption keys
CN105812357A (en) * 2016-03-07 2016-07-27 中标软件有限公司 User password management method for cloud computing platform
CN105827408A (en) * 2015-12-03 2016-08-03 中国航天系统工程有限公司 Timestamp technique-based industrial network security transmission method
CN106357404A (en) * 2016-08-26 2017-01-25 易联(北京)物联网科技有限公司 Data encryption method based on NFC chip security authentication

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101309278A (en) * 2008-06-27 2008-11-19 腾讯科技(深圳)有限公司 Method and system for storing encrypt data on customer
US20110087890A1 (en) * 2009-10-09 2011-04-14 Lsi Corporation Interlocking plain text passwords to data encryption keys
CN105827408A (en) * 2015-12-03 2016-08-03 中国航天系统工程有限公司 Timestamp technique-based industrial network security transmission method
CN105812357A (en) * 2016-03-07 2016-07-27 中标软件有限公司 User password management method for cloud computing platform
CN106357404A (en) * 2016-08-26 2017-01-25 易联(北京)物联网科技有限公司 Data encryption method based on NFC chip security authentication

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110796798A (en) * 2018-08-01 2020-02-14 北京思源理想控股集团有限公司 Intelligent inbox system and method
CN109150903A (en) * 2018-09-25 2019-01-04 平安科技(深圳)有限公司 A kind of account management method, device, storage medium and terminal device
CN109936447A (en) * 2019-01-31 2019-06-25 平安科技(深圳)有限公司 Encryption and authentication method, system and computer equipment based on timestamp
CN110445768A (en) * 2019-07-18 2019-11-12 阿里巴巴集团控股有限公司 A kind of login method, device and electronic equipment
CN110445768B (en) * 2019-07-18 2021-11-09 创新先进技术有限公司 Login method and device and electronic equipment
US11417159B2 (en) 2019-08-02 2022-08-16 Yunding Network Technology (Beijing) Co., Ltd. Methods and systems for controlling a smart lock
US11928904B2 (en) 2019-08-02 2024-03-12 Yunding Network Technology (Beijing) Co., Ltd. Methods and systems for controlling a smart lock
CN112446982A (en) * 2019-08-10 2021-03-05 云丁网络技术(北京)有限公司 Method, device, computer readable medium and equipment for controlling intelligent lock
CN112653701A (en) * 2020-12-24 2021-04-13 北京安信天行科技有限公司 Application password safe use monitoring method and system
CN112653701B (en) * 2020-12-24 2023-03-14 北京安信天行科技有限公司 Application password safe use monitoring method and system
CN113343278A (en) * 2021-07-05 2021-09-03 湖南快乐阳光互动娱乐传媒有限公司 Login request verification method and device for preventing CSRF attack
CN113343278B (en) * 2021-07-05 2022-07-26 湖南快乐阳光互动娱乐传媒有限公司 Login request verification method and device for preventing CSRF attack
CN113538752A (en) * 2021-07-20 2021-10-22 慧管(上海)信息科技有限公司 Offline dynamic two-dimensional code verification method for access control terminal equipment
CN114267102A (en) * 2021-12-02 2022-04-01 深圳市皇家金盾智能科技有限公司 Intelligent door lock control method, device and system
CN114267102B (en) * 2021-12-02 2023-11-17 深圳市皇家金盾智能科技有限公司 Intelligent door lock control method, device and system

Similar Documents

Publication Publication Date Title
CN108234458A (en) Method, the system of encryption storage and the decryption extraction of a kind of cloud lock cipher
CN105471584B (en) A kind of identity identifying method based on quantum key encryption
KR101874721B1 (en) Identity authentication system, apparatus, and method, and identity authentication request apparatus
TWI536790B (en) Communication method using fingerprint information authentication
CN104219228A (en) User registration and user identification method and user registration and user identification system
CN106506487A (en) A kind of information Encrypt and Decrypt method and device
KR102510785B1 (en) Methods and systems for safely transmitting data
JP2009103774A (en) Secret sharing system
CN102833075A (en) Identity authentication and digital signature method based on three-layered overlapping type key management technology
US20150256343A1 (en) Securely Generating and Storing Passwords in a Computer System
US20210281399A1 (en) Methods and systems of securely transferring data
CN103560892A (en) Secret key generation method and secret key generation device
CN104219044A (en) Key secret method for encrypting storing device
CN104268447A (en) Encryption method of embedded software
CN105281902A (en) Web system safety login method based on mobile terminal
CN105791258A (en) Data transmission method, terminal and open platform
CN104866784A (en) BIOS encryption-based safety hard disk, and data encryption and decryption method
CN103338106A (en) Methods and devices for ciphering and deciphering file
CN104113410A (en) Method and device for data encryption transmission based on multi-table encryption method
CN103117850A (en) Cryptosystem based on random sequence database
CN102882675A (en) Password encryption method for social network sites
CN104394532A (en) Anti-brute force safe log-in method for mobile terminal
CN109412799B (en) System and method for generating local key
CN114282189A (en) Data security storage method, system, client and server
KR101754519B1 (en) Keyboard secure system and method for protecting data input via keyboard using one time key

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180629