CN108683706B - Encryption algorithm based on NB-IOT cloud lock communication and verification method thereof - Google Patents

Encryption algorithm based on NB-IOT cloud lock communication and verification method thereof Download PDF

Info

Publication number
CN108683706B
CN108683706B CN201810323882.3A CN201810323882A CN108683706B CN 108683706 B CN108683706 B CN 108683706B CN 201810323882 A CN201810323882 A CN 201810323882A CN 108683706 B CN108683706 B CN 108683706B
Authority
CN
China
Prior art keywords
character string
ciphertext
door lock
value
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810323882.3A
Other languages
Chinese (zh)
Other versions
CN108683706A (en
Inventor
王雷波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Hutlon Technology Co Ltd
Original Assignee
Guangdong Hutlon Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Hutlon Technology Co Ltd filed Critical Guangdong Hutlon Technology Co Ltd
Priority to CN201810323882.3A priority Critical patent/CN108683706B/en
Publication of CN108683706A publication Critical patent/CN108683706A/en
Application granted granted Critical
Publication of CN108683706B publication Critical patent/CN108683706B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD

Abstract

An encryption algorithm based on NB-IOT cloud lock communication comprises a process that a door lock end encrypts a password: step A: the door lock end inputs a password a, the cloud server conducts first encryption on the password a by using an MD5 encryption algorithm to obtain a first MD5 value b; and B: intercepting a character string at the end of the value b of the first MD5 to obtain a character string c; and C: carrying out second encryption on the character string c by using an MD5 encryption algorithm to obtain a second MD5 value d; step D: intercepting a character string at the end of a second MD5 value d to obtain a second character string e, wherein the second character string e is a ciphertext f; step E: the ciphertext f is stored at the door lock end. Through secondary encryption and secondary interception, the security of the cloud lock password is improved, the cloud lock is guaranteed not to be cracked by people, the mobile terminal needs to carry out the same encryption when verifying the door lock password to obtain a ciphertext, and the ciphertext is compared with the ciphertext of the door lock terminal to obtain a verification result.

Description

Encryption algorithm based on NB-IOT cloud lock communication and verification method thereof
Technical Field
The invention relates to the field of algorithm encryption, in particular to an encryption algorithm based on NB-IOT cloud lock communication and a verification method thereof.
Background
In the thing networking field, between equipment and the equipment, equipment and high in the clouds, data transmission is indispensable, and data security just seems very important, especially security protection class equipment of lock, as family security's an important protective screen, must encrypt the password of lock and handle, and the transmission course all uses the ciphertext in order to improve the security.
Existing encryption algorithms typically encrypt the password directly using the MD5 method. Although the encryption is irreversible by using the MD5 method, a hacker has an MD5 original text/ciphertext comparison database with huge data size, the MD5 ciphertext of a common password can be quickly decoded, and the password of a user in a social network site is basically the common password, so that the security of the user password is greatly reduced.
Disclosure of Invention
The invention aims to provide an encryption algorithm based on NB-IOT cloud lock communication and an authentication method thereof.
In order to achieve the purpose, the invention adopts the following technical scheme:
an encryption algorithm based on NB-IOT cloud lock communication comprises a process that a door lock end encrypts a password:
step A: the door lock end inputs a password a, the cloud server conducts first encryption on the password a by using an MD5 encryption algorithm to obtain a first MD5 value b;
and B: intercepting a character string at the end of the value b of the first MD5 to obtain a character string c;
and C: carrying out second encryption on the character string c by using an MD5 encryption algorithm to obtain a second MD5 value d;
step D: intercepting a character string at the end of a second MD5 value d to obtain a second character string e, wherein the second character string e is a ciphertext f;
step E: the ciphertext f is stored at the door lock end.
A verification method of an encryption algorithm based on NB-IOT cloud lock communication comprises the following steps that a mobile terminal verifies a door lock password:
the method comprises the following steps: the mobile terminal inputs a password a1, the cloud server encrypts the password a1 for the first time by using an MD5 encryption algorithm to obtain a first MD5 value b 1;
step two: intercepting a character string at the end of a b1 value of a first MD5 to obtain a character string c 1;
step three: carrying out second encryption on the character string c1 by using an MD5 encryption algorithm to obtain a second MD5 value d 1;
step four: intercepting a character string at the end of a second MD5 value d1 to obtain a second character string e1, wherein the second character string e1 is ciphertext f 1;
step five: the mobile terminal sends a ciphertext f1 to the door lock terminal through an NB-IOT protocol, a ciphertext f1 is compared with the ciphertext f stored at the door lock terminal, and if the ciphertext f1 is consistent with the ciphertext f, verification is successful; if the ciphertext f1 and the ciphertext f are not consistent, the verification fails;
step six: if the verification is successful, the door lock end feeds back a message of successful verification to the mobile end; and if the verification fails, the door lock end feeds back a message of the failure of the verification to the mobile end.
Preferably, the password a1 input by the mobile terminal is generated by the door lock terminal.
The invention has the beneficial effects that:
the MD5 encryption algorithm is characterized in that a string of character strings with a length is processed to obtain a new string of character strings with a fixed length, and the process is irreversible, so that the MD5 encryption algorithm has strong modification resistance, the possibility of reverse cracking is reduced by intercepting the character strings after the first encryption, then the character strings are encrypted for the second time, and then the interception is carried out to reduce the length of the character, so that the data transmission is facilitated.
Drawings
FIG. 1 is a flow chart of an encryption algorithm of the present invention;
fig. 2 is a flow chart of the verification of the door lock by the mobile terminal of the present invention.
Detailed Description
The technical scheme of the invention is further explained by the specific implementation mode in combination with the attached drawings.
An encryption algorithm based on NB-IOT cloud lock communication in this embodiment, as shown in fig. 1, includes a process in which a door lock end encrypts a password:
step A: the door lock end inputs a password a, the cloud server conducts first encryption on the password a by using an MD5 encryption algorithm to obtain a first MD5 value b;
and B: intercepting a character string at the end of the value b of the first MD5 to obtain a character string c;
and C: carrying out second encryption on the character string c by using an MD5 encryption algorithm to obtain a second MD5 value d;
step D: intercepting a character string at the end of a second MD5 value d to obtain a second character string e, wherein the second character string e is a ciphertext f;
step E: the ciphertext f is stored at the door lock end.
Although encryption using MD5 is irreversible, the value obtained after the same string is encrypted by MD5 is fixed, such as: after the encryption of '123456', the 'e 10adc3949ba59abbe56e057f20f883 e' is determined, all simpler passwords can find corresponding MD5 values on the network, at this time, the generated MD5 value is encrypted again once again, and the problem can be solved relatively safely, but in view of the narrow bandwidth of NB-Iot, a section of MD5 value can be intercepted to perform secondary encryption, then a section of MD5 value after the secondary encryption is intercepted to perform verification, so that the character string is intercepted after the first MD5 encryption, the security of the passwords is further ensured, then the character string is encrypted again for the second time of MD5, the security of the passwords is improved, and finally, the character string is intercepted once again, the length of the passwords is reduced, the transmission is facilitated, the security of the passwords is improved through the secondary encryption and secondary interception, and the cloud lock cannot be cracked by people.
An encryption algorithm verification method based on NB-IOT cloud lock communication, as shown in fig. 2, includes a process in which a mobile terminal verifies a door lock password:
the method comprises the following steps: the mobile terminal inputs a password a1, the cloud server encrypts the password a1 for the first time by using an MD5 encryption algorithm to obtain a first MD5 value b 1;
step two: intercepting a character string at the end of a b1 value of a first MD5 to obtain a character string c 1;
step three: carrying out second encryption on the character string c1 by using an MD5 encryption algorithm to obtain a second MD5 value d 1;
step four: intercepting a character string at the end of a second MD5 value d1 to obtain a second character string e1, wherein the second character string e1 is ciphertext f 1;
step five: the mobile terminal sends a ciphertext f1 to the door lock terminal through an NB-IOT protocol, a ciphertext f1 is compared with the ciphertext f stored at the door lock terminal, and if the ciphertext f1 is consistent with the ciphertext f, verification is successful; if the ciphertext f1 and the ciphertext f are not consistent, the verification fails;
step six: if the verification is successful, the door lock end feeds back a message of successful verification to the mobile end; and if the verification fails, the door lock end feeds back a message of the failure of the verification to the mobile end.
Preferably, the password a1 input by the mobile terminal is generated by the door lock terminal.
The technical principle of the present invention is described above in connection with specific embodiments. The description is made for the purpose of illustrating the principles of the invention and should not be construed in any way as limiting the scope of the invention. Based on the explanations herein, those skilled in the art will be able to conceive of other embodiments of the present invention without inventive effort, which would fall within the scope of the present invention.

Claims (1)

1. An encryption algorithm based on NB-IOT cloud lock communication and a verification method thereof are characterized in that: the method comprises the following steps that a door lock end encrypts a password:
step A: the door lock end inputs a password a, the cloud server conducts first encryption on the password a by using an MD5 encryption algorithm to obtain a first MD5 value b;
and B: intercepting a character string at the end of the value b of the first MD5 to obtain a character string c;
and C: carrying out second encryption on the character string c by using an MD5 encryption algorithm to obtain a second MD5 value d;
step D: intercepting a character string at the end of a second MD5 value d to obtain a second character string e, wherein the second character string e is a ciphertext f;
step E: the ciphertext f is stored at the door lock end;
the method comprises the following steps that a mobile terminal verifies a door lock password:
the method comprises the following steps: the mobile terminal inputs a password a1, the cloud server encrypts the password a1 for the first time by using an MD5 encryption algorithm to obtain a first MD5 value b 1;
step two: intercepting a character string at the end of a b1 value of a first MD5 to obtain a character string c 1;
step three: carrying out second encryption on the character string c1 by using an MD5 encryption algorithm to obtain a second MD5 value d 1;
step four: intercepting a character string at the end of a second MD5 value d1 to obtain a second character string e1, wherein the second character string e1 is ciphertext f 1;
step five: the mobile terminal sends a ciphertext f1 to the door lock terminal through an NB-IOT protocol, a ciphertext f1 is compared with the ciphertext f stored at the door lock terminal, and if the ciphertext f1 is consistent with the ciphertext f, verification is successful; if the ciphertext f1 and the ciphertext f are not consistent, the verification fails;
step six: if the verification is successful, the door lock end feeds back a message of successful verification to the mobile end; and if the verification fails, the door lock end feeds back a message of the failure of the verification to the mobile end.
CN201810323882.3A 2018-04-12 2018-04-12 Encryption algorithm based on NB-IOT cloud lock communication and verification method thereof Active CN108683706B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810323882.3A CN108683706B (en) 2018-04-12 2018-04-12 Encryption algorithm based on NB-IOT cloud lock communication and verification method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810323882.3A CN108683706B (en) 2018-04-12 2018-04-12 Encryption algorithm based on NB-IOT cloud lock communication and verification method thereof

Publications (2)

Publication Number Publication Date
CN108683706A CN108683706A (en) 2018-10-19
CN108683706B true CN108683706B (en) 2021-02-09

Family

ID=63800969

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810323882.3A Active CN108683706B (en) 2018-04-12 2018-04-12 Encryption algorithm based on NB-IOT cloud lock communication and verification method thereof

Country Status (1)

Country Link
CN (1) CN108683706B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109801423A (en) * 2019-02-20 2019-05-24 北京首汽智行科技有限公司 A kind of control method for vehicle and system based on bluetooth
CN109961545A (en) * 2019-03-07 2019-07-02 广东必达保安系统有限公司 Intelligent door lock and its wireless telecommunications plaintext data encryption and decryption approaches
CN110768953B (en) * 2019-09-15 2022-05-03 杭州拓深科技有限公司 Rapid Internet of things data encryption transmission method
CN112967423A (en) * 2021-02-01 2021-06-15 德施曼机电(中国)有限公司 Method, system, equipment and storage medium for unlocking coded lock
CN113538752A (en) * 2021-07-20 2021-10-22 慧管(上海)信息科技有限公司 Offline dynamic two-dimensional code verification method for access control terminal equipment
CN113715670A (en) * 2021-09-18 2021-11-30 慧管(上海)信息科技有限公司 Charging method of storage battery car charging pile equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105281901A (en) * 2015-09-24 2016-01-27 浪潮集团有限公司 Encryption method for cloud tenant key information
US9584493B1 (en) * 2015-12-18 2017-02-28 Wickr Inc. Decentralized authoritative messaging
CN106549756A (en) * 2015-09-21 2017-03-29 阿里巴巴集团控股有限公司 A kind of method and device of encryption
CN107196928A (en) * 2017-05-11 2017-09-22 广东汇泰龙科技有限公司 Cloud lock encryption method, cloud lock administration system and the cloud lock of a kind of high security

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106549756A (en) * 2015-09-21 2017-03-29 阿里巴巴集团控股有限公司 A kind of method and device of encryption
CN105281901A (en) * 2015-09-24 2016-01-27 浪潮集团有限公司 Encryption method for cloud tenant key information
US9584493B1 (en) * 2015-12-18 2017-02-28 Wickr Inc. Decentralized authoritative messaging
CN107196928A (en) * 2017-05-11 2017-09-22 广东汇泰龙科技有限公司 Cloud lock encryption method, cloud lock administration system and the cloud lock of a kind of high security

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
MD5加密算法的改进及应用;赵素萍;《现代计算机》;20170531;全文 *

Also Published As

Publication number Publication date
CN108683706A (en) 2018-10-19

Similar Documents

Publication Publication Date Title
CN108683706B (en) Encryption algorithm based on NB-IOT cloud lock communication and verification method thereof
US8737624B2 (en) Secure email communication system
US6064736A (en) Systems, methods and computer program products that use an encrypted session for additional password verification
Uymatiao et al. Time-based OTP authentication via secure tunnel (TOAST): A mobile TOTP scheme using TLS seed exchange and encrypted offline keystore
WO2017185911A1 (en) Network user authentication method
CN101431516B (en) Method for implementing distributed security policy, client terminal and communication system thereof
CN103929434A (en) File sharing method based on encryption and permission system
SE539602C2 (en) Generating a symmetric encryption key
CN110519300A (en) Client key method for secure storing based on password bidirectional authentication
CN106712946A (en) Data secure transmission method
ShanmugaPriya et al. The personal authentication service and security enhancement for optimal strong password
CN102148683A (en) Dual-factor authentication method based on HASH chip or encryption chip
WO2014183671A1 (en) Safety control method for cloud storage
CN104038336A (en) Data encryption method based on 3DES
CN109194701A (en) A kind of data processing method and device
CN110912877A (en) Data transmitting and receiving method and device based on IEC61850 model in transformer substation
CN104065619B (en) login method and device
CN105049448A (en) Single sign-on device and method
CN104394532A (en) Anti-brute force safe log-in method for mobile terminal
CN106230840B (en) A kind of command identifying method of high security
CN103441851A (en) Method for allowing terminal equipment to have access to VPN equipment
EP2506485A1 (en) Method and device for enhancing security of user security model
CN103825911B (en) A kind of safety and the client-side program identity method to set up conveniently taken into account
WO2021253852A1 (en) Data center 5g network encryption multicast-based authority authentication method and system
CN114386020A (en) Quick secondary identity authentication method and system based on quantum security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: No.1 Dongtai Road, Eastern Industrial Park, Lishui Town, Nanhai District, Foshan City, Guangdong Province

Applicant after: Guangdong Huitailong Technology Co.,Ltd.

Address before: No.1 Dongtai Road, Eastern Industrial Park, Lishui Town, Nanhai District, Foshan City, Guangdong Province

Applicant before: GUANGDONG HUTLON TECHNOLOGY Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant