CN108683706B - Encryption algorithm based on NB-IOT cloud lock communication and verification method thereof - Google Patents
Encryption algorithm based on NB-IOT cloud lock communication and verification method thereof Download PDFInfo
- Publication number
- CN108683706B CN108683706B CN201810323882.3A CN201810323882A CN108683706B CN 108683706 B CN108683706 B CN 108683706B CN 201810323882 A CN201810323882 A CN 201810323882A CN 108683706 B CN108683706 B CN 108683706B
- Authority
- CN
- China
- Prior art keywords
- character string
- ciphertext
- door lock
- value
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
Abstract
An encryption algorithm based on NB-IOT cloud lock communication comprises a process that a door lock end encrypts a password: step A: the door lock end inputs a password a, the cloud server conducts first encryption on the password a by using an MD5 encryption algorithm to obtain a first MD5 value b; and B: intercepting a character string at the end of the value b of the first MD5 to obtain a character string c; and C: carrying out second encryption on the character string c by using an MD5 encryption algorithm to obtain a second MD5 value d; step D: intercepting a character string at the end of a second MD5 value d to obtain a second character string e, wherein the second character string e is a ciphertext f; step E: the ciphertext f is stored at the door lock end. Through secondary encryption and secondary interception, the security of the cloud lock password is improved, the cloud lock is guaranteed not to be cracked by people, the mobile terminal needs to carry out the same encryption when verifying the door lock password to obtain a ciphertext, and the ciphertext is compared with the ciphertext of the door lock terminal to obtain a verification result.
Description
Technical Field
The invention relates to the field of algorithm encryption, in particular to an encryption algorithm based on NB-IOT cloud lock communication and a verification method thereof.
Background
In the thing networking field, between equipment and the equipment, equipment and high in the clouds, data transmission is indispensable, and data security just seems very important, especially security protection class equipment of lock, as family security's an important protective screen, must encrypt the password of lock and handle, and the transmission course all uses the ciphertext in order to improve the security.
Existing encryption algorithms typically encrypt the password directly using the MD5 method. Although the encryption is irreversible by using the MD5 method, a hacker has an MD5 original text/ciphertext comparison database with huge data size, the MD5 ciphertext of a common password can be quickly decoded, and the password of a user in a social network site is basically the common password, so that the security of the user password is greatly reduced.
Disclosure of Invention
The invention aims to provide an encryption algorithm based on NB-IOT cloud lock communication and an authentication method thereof.
In order to achieve the purpose, the invention adopts the following technical scheme:
an encryption algorithm based on NB-IOT cloud lock communication comprises a process that a door lock end encrypts a password:
step A: the door lock end inputs a password a, the cloud server conducts first encryption on the password a by using an MD5 encryption algorithm to obtain a first MD5 value b;
and B: intercepting a character string at the end of the value b of the first MD5 to obtain a character string c;
and C: carrying out second encryption on the character string c by using an MD5 encryption algorithm to obtain a second MD5 value d;
step D: intercepting a character string at the end of a second MD5 value d to obtain a second character string e, wherein the second character string e is a ciphertext f;
step E: the ciphertext f is stored at the door lock end.
A verification method of an encryption algorithm based on NB-IOT cloud lock communication comprises the following steps that a mobile terminal verifies a door lock password:
the method comprises the following steps: the mobile terminal inputs a password a1, the cloud server encrypts the password a1 for the first time by using an MD5 encryption algorithm to obtain a first MD5 value b 1;
step two: intercepting a character string at the end of a b1 value of a first MD5 to obtain a character string c 1;
step three: carrying out second encryption on the character string c1 by using an MD5 encryption algorithm to obtain a second MD5 value d 1;
step four: intercepting a character string at the end of a second MD5 value d1 to obtain a second character string e1, wherein the second character string e1 is ciphertext f 1;
step five: the mobile terminal sends a ciphertext f1 to the door lock terminal through an NB-IOT protocol, a ciphertext f1 is compared with the ciphertext f stored at the door lock terminal, and if the ciphertext f1 is consistent with the ciphertext f, verification is successful; if the ciphertext f1 and the ciphertext f are not consistent, the verification fails;
step six: if the verification is successful, the door lock end feeds back a message of successful verification to the mobile end; and if the verification fails, the door lock end feeds back a message of the failure of the verification to the mobile end.
Preferably, the password a1 input by the mobile terminal is generated by the door lock terminal.
The invention has the beneficial effects that:
the MD5 encryption algorithm is characterized in that a string of character strings with a length is processed to obtain a new string of character strings with a fixed length, and the process is irreversible, so that the MD5 encryption algorithm has strong modification resistance, the possibility of reverse cracking is reduced by intercepting the character strings after the first encryption, then the character strings are encrypted for the second time, and then the interception is carried out to reduce the length of the character, so that the data transmission is facilitated.
Drawings
FIG. 1 is a flow chart of an encryption algorithm of the present invention;
fig. 2 is a flow chart of the verification of the door lock by the mobile terminal of the present invention.
Detailed Description
The technical scheme of the invention is further explained by the specific implementation mode in combination with the attached drawings.
An encryption algorithm based on NB-IOT cloud lock communication in this embodiment, as shown in fig. 1, includes a process in which a door lock end encrypts a password:
step A: the door lock end inputs a password a, the cloud server conducts first encryption on the password a by using an MD5 encryption algorithm to obtain a first MD5 value b;
and B: intercepting a character string at the end of the value b of the first MD5 to obtain a character string c;
and C: carrying out second encryption on the character string c by using an MD5 encryption algorithm to obtain a second MD5 value d;
step D: intercepting a character string at the end of a second MD5 value d to obtain a second character string e, wherein the second character string e is a ciphertext f;
step E: the ciphertext f is stored at the door lock end.
Although encryption using MD5 is irreversible, the value obtained after the same string is encrypted by MD5 is fixed, such as: after the encryption of '123456', the 'e 10adc3949ba59abbe56e057f20f883 e' is determined, all simpler passwords can find corresponding MD5 values on the network, at this time, the generated MD5 value is encrypted again once again, and the problem can be solved relatively safely, but in view of the narrow bandwidth of NB-Iot, a section of MD5 value can be intercepted to perform secondary encryption, then a section of MD5 value after the secondary encryption is intercepted to perform verification, so that the character string is intercepted after the first MD5 encryption, the security of the passwords is further ensured, then the character string is encrypted again for the second time of MD5, the security of the passwords is improved, and finally, the character string is intercepted once again, the length of the passwords is reduced, the transmission is facilitated, the security of the passwords is improved through the secondary encryption and secondary interception, and the cloud lock cannot be cracked by people.
An encryption algorithm verification method based on NB-IOT cloud lock communication, as shown in fig. 2, includes a process in which a mobile terminal verifies a door lock password:
the method comprises the following steps: the mobile terminal inputs a password a1, the cloud server encrypts the password a1 for the first time by using an MD5 encryption algorithm to obtain a first MD5 value b 1;
step two: intercepting a character string at the end of a b1 value of a first MD5 to obtain a character string c 1;
step three: carrying out second encryption on the character string c1 by using an MD5 encryption algorithm to obtain a second MD5 value d 1;
step four: intercepting a character string at the end of a second MD5 value d1 to obtain a second character string e1, wherein the second character string e1 is ciphertext f 1;
step five: the mobile terminal sends a ciphertext f1 to the door lock terminal through an NB-IOT protocol, a ciphertext f1 is compared with the ciphertext f stored at the door lock terminal, and if the ciphertext f1 is consistent with the ciphertext f, verification is successful; if the ciphertext f1 and the ciphertext f are not consistent, the verification fails;
step six: if the verification is successful, the door lock end feeds back a message of successful verification to the mobile end; and if the verification fails, the door lock end feeds back a message of the failure of the verification to the mobile end.
Preferably, the password a1 input by the mobile terminal is generated by the door lock terminal.
The technical principle of the present invention is described above in connection with specific embodiments. The description is made for the purpose of illustrating the principles of the invention and should not be construed in any way as limiting the scope of the invention. Based on the explanations herein, those skilled in the art will be able to conceive of other embodiments of the present invention without inventive effort, which would fall within the scope of the present invention.
Claims (1)
1. An encryption algorithm based on NB-IOT cloud lock communication and a verification method thereof are characterized in that: the method comprises the following steps that a door lock end encrypts a password:
step A: the door lock end inputs a password a, the cloud server conducts first encryption on the password a by using an MD5 encryption algorithm to obtain a first MD5 value b;
and B: intercepting a character string at the end of the value b of the first MD5 to obtain a character string c;
and C: carrying out second encryption on the character string c by using an MD5 encryption algorithm to obtain a second MD5 value d;
step D: intercepting a character string at the end of a second MD5 value d to obtain a second character string e, wherein the second character string e is a ciphertext f;
step E: the ciphertext f is stored at the door lock end;
the method comprises the following steps that a mobile terminal verifies a door lock password:
the method comprises the following steps: the mobile terminal inputs a password a1, the cloud server encrypts the password a1 for the first time by using an MD5 encryption algorithm to obtain a first MD5 value b 1;
step two: intercepting a character string at the end of a b1 value of a first MD5 to obtain a character string c 1;
step three: carrying out second encryption on the character string c1 by using an MD5 encryption algorithm to obtain a second MD5 value d 1;
step four: intercepting a character string at the end of a second MD5 value d1 to obtain a second character string e1, wherein the second character string e1 is ciphertext f 1;
step five: the mobile terminal sends a ciphertext f1 to the door lock terminal through an NB-IOT protocol, a ciphertext f1 is compared with the ciphertext f stored at the door lock terminal, and if the ciphertext f1 is consistent with the ciphertext f, verification is successful; if the ciphertext f1 and the ciphertext f are not consistent, the verification fails;
step six: if the verification is successful, the door lock end feeds back a message of successful verification to the mobile end; and if the verification fails, the door lock end feeds back a message of the failure of the verification to the mobile end.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810323882.3A CN108683706B (en) | 2018-04-12 | 2018-04-12 | Encryption algorithm based on NB-IOT cloud lock communication and verification method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810323882.3A CN108683706B (en) | 2018-04-12 | 2018-04-12 | Encryption algorithm based on NB-IOT cloud lock communication and verification method thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108683706A CN108683706A (en) | 2018-10-19 |
CN108683706B true CN108683706B (en) | 2021-02-09 |
Family
ID=63800969
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810323882.3A Active CN108683706B (en) | 2018-04-12 | 2018-04-12 | Encryption algorithm based on NB-IOT cloud lock communication and verification method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108683706B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109801423A (en) * | 2019-02-20 | 2019-05-24 | 北京首汽智行科技有限公司 | A kind of control method for vehicle and system based on bluetooth |
CN109961545A (en) * | 2019-03-07 | 2019-07-02 | 广东必达保安系统有限公司 | Intelligent door lock and its wireless telecommunications plaintext data encryption and decryption approaches |
CN110768953B (en) * | 2019-09-15 | 2022-05-03 | 杭州拓深科技有限公司 | Rapid Internet of things data encryption transmission method |
CN112967423A (en) * | 2021-02-01 | 2021-06-15 | 德施曼机电(中国)有限公司 | Method, system, equipment and storage medium for unlocking coded lock |
CN113538752A (en) * | 2021-07-20 | 2021-10-22 | 慧管(上海)信息科技有限公司 | Offline dynamic two-dimensional code verification method for access control terminal equipment |
CN113715670A (en) * | 2021-09-18 | 2021-11-30 | 慧管(上海)信息科技有限公司 | Charging method of storage battery car charging pile equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105281901A (en) * | 2015-09-24 | 2016-01-27 | 浪潮集团有限公司 | Encryption method for cloud tenant key information |
US9584493B1 (en) * | 2015-12-18 | 2017-02-28 | Wickr Inc. | Decentralized authoritative messaging |
CN106549756A (en) * | 2015-09-21 | 2017-03-29 | 阿里巴巴集团控股有限公司 | A kind of method and device of encryption |
CN107196928A (en) * | 2017-05-11 | 2017-09-22 | 广东汇泰龙科技有限公司 | Cloud lock encryption method, cloud lock administration system and the cloud lock of a kind of high security |
-
2018
- 2018-04-12 CN CN201810323882.3A patent/CN108683706B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106549756A (en) * | 2015-09-21 | 2017-03-29 | 阿里巴巴集团控股有限公司 | A kind of method and device of encryption |
CN105281901A (en) * | 2015-09-24 | 2016-01-27 | 浪潮集团有限公司 | Encryption method for cloud tenant key information |
US9584493B1 (en) * | 2015-12-18 | 2017-02-28 | Wickr Inc. | Decentralized authoritative messaging |
CN107196928A (en) * | 2017-05-11 | 2017-09-22 | 广东汇泰龙科技有限公司 | Cloud lock encryption method, cloud lock administration system and the cloud lock of a kind of high security |
Non-Patent Citations (1)
Title |
---|
MD5加密算法的改进及应用;赵素萍;《现代计算机》;20170531;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN108683706A (en) | 2018-10-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108683706B (en) | Encryption algorithm based on NB-IOT cloud lock communication and verification method thereof | |
US8737624B2 (en) | Secure email communication system | |
US6064736A (en) | Systems, methods and computer program products that use an encrypted session for additional password verification | |
Uymatiao et al. | Time-based OTP authentication via secure tunnel (TOAST): A mobile TOTP scheme using TLS seed exchange and encrypted offline keystore | |
WO2017185911A1 (en) | Network user authentication method | |
CN101431516B (en) | Method for implementing distributed security policy, client terminal and communication system thereof | |
CN103929434A (en) | File sharing method based on encryption and permission system | |
SE539602C2 (en) | Generating a symmetric encryption key | |
CN110519300A (en) | Client key method for secure storing based on password bidirectional authentication | |
CN106712946A (en) | Data secure transmission method | |
ShanmugaPriya et al. | The personal authentication service and security enhancement for optimal strong password | |
CN102148683A (en) | Dual-factor authentication method based on HASH chip or encryption chip | |
WO2014183671A1 (en) | Safety control method for cloud storage | |
CN104038336A (en) | Data encryption method based on 3DES | |
CN109194701A (en) | A kind of data processing method and device | |
CN110912877A (en) | Data transmitting and receiving method and device based on IEC61850 model in transformer substation | |
CN104065619B (en) | login method and device | |
CN105049448A (en) | Single sign-on device and method | |
CN104394532A (en) | Anti-brute force safe log-in method for mobile terminal | |
CN106230840B (en) | A kind of command identifying method of high security | |
CN103441851A (en) | Method for allowing terminal equipment to have access to VPN equipment | |
EP2506485A1 (en) | Method and device for enhancing security of user security model | |
CN103825911B (en) | A kind of safety and the client-side program identity method to set up conveniently taken into account | |
WO2021253852A1 (en) | Data center 5g network encryption multicast-based authority authentication method and system | |
CN114386020A (en) | Quick secondary identity authentication method and system based on quantum security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: No.1 Dongtai Road, Eastern Industrial Park, Lishui Town, Nanhai District, Foshan City, Guangdong Province Applicant after: Guangdong Huitailong Technology Co.,Ltd. Address before: No.1 Dongtai Road, Eastern Industrial Park, Lishui Town, Nanhai District, Foshan City, Guangdong Province Applicant before: GUANGDONG HUTLON TECHNOLOGY Co.,Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |