CN109360307B - Multi-encryption storage system - Google Patents
Multi-encryption storage system Download PDFInfo
- Publication number
- CN109360307B CN109360307B CN201811121355.0A CN201811121355A CN109360307B CN 109360307 B CN109360307 B CN 109360307B CN 201811121355 A CN201811121355 A CN 201811121355A CN 109360307 B CN109360307 B CN 109360307B
- Authority
- CN
- China
- Prior art keywords
- cabinet
- password
- string
- box
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05G—SAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
- E05G1/00—Safes or strong-rooms for valuables
- E05G1/06—Safes or strong-rooms for valuables having provision for multiple compartments
- E05G1/08—Safes or strong-rooms for valuables having provision for multiple compartments secured individually
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
- G07C9/00912—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for safes, strong-rooms, vaults or the like
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention provides a multiple-encryption storage system which comprises a safety server, a storage cabinet, a first terminal held by a first user and a second terminal held by a second user, wherein each cabinet groove of the storage cabinet is provided with a cabinet box, and each cabinet box is in communication connection with the safety server; the first terminal and the second terminal are not interconnected and are in communication connection with the security server; the security server responds to a first terminal instruction, selects a cabinet box to be opened, and generates a pass password and a holding password for the cabinet box to be opened; and transmitting the pass password and the identifier of the cabinet box to be opened to the storage cabinet, and transmitting the holding password to a second terminal corresponding to the cabinet box to be opened. The invention can open the cabinet boxes only by taking the preset input passwords, so that the safety performance of the storage cabinet is obviously improved, and the cabinet boxes can be opened without limiting specific second terminals as long as the input passwords at the preset number of second terminals are obtained, so that the invention has wide application prospect.
Description
Technical Field
The invention relates to the field of intelligent control, in particular to a multiple-encryption storage system.
Background
The storage cabinet is widely applied to storage management of various types of small parts, samples, molds, tools, electronic components, file data, design drawings, bills, catalogs, tables and the like in offices, government offices, factories and the like. Is a personal steward of personal items. Unlike traditional wooden cabinet, it is easy to damage, impact resistant, easy to breed bacteria and produce bad smell. The locker is made of high-quality cold-rolled steel plates and has incomparable excellent performance compared with the traditional wooden locker, however, the locker usually has no anti-theft function or is weak in anti-theft function and easy to crack, so that a user suffers from property loss.
Disclosure of Invention
In order to solve the technical problem, the invention provides a multiple-encryption storage system.
The invention is realized by the following technical scheme:
a multiple encryption storage system comprises a security server, a storage cabinet, a first terminal held by a first user and a second terminal held by a second user, wherein each cabinet groove of the storage cabinet is provided with a cabinet box, and each cabinet box is in communication connection with the security server; the first terminal and the second terminal are not interconnected and are in communication connection with the security server;
the security server responds to a first terminal instruction, selects a cabinet box to be opened, and generates a pass password and a holding password for the cabinet box to be opened; and transmitting the pass password and the identifier of the cabinet box to be opened to the storage cabinet, and transmitting the holding password to a second terminal corresponding to the cabinet box to be opened.
Further, the secret code is a parameter pair (x)i,yi)。
Further, the second terminal is further configured to generate an input password, specifically to obtain the parameter pair (x)i,yi) (ii) a According to the parameter xiTo obtainA first data string of bits; according to the parameter yiTo obtainA second string of bits; and splicing the first data string and the second data string to obtain the input password.
Further, the locker is also used for acquiring beta input passwords pi(ii) a According to each input password piObtaining the password identification pair (x)i,yi) (ii) a Obtaining the (x)i,yi) A first algebraic expression with x as an argument at point 0; acquiring a second algebraic expression taking x as an independent variable according to the first algebraic expression taking x as the independent variable, wherein for any value of x, the difference values of the corresponding second algebraic expression and the corresponding first algebraic expression are all multiples of a core parameter value xi; acquiring a constant item in the second algebraic expression, and taking the constant item as a suspected password;
the storage cabinet also inquires whether a pass password identical to the suspected pass password exists, if yes, a target cabinet box corresponding to the pass password is obtained, and the target cabinet box slides out.
Further, the security server is also used for passing passwordsEncrypting a to-be-encrypted digital string formed by the to-be-encrypted digital string and a corresponding cabinet box identifier of the to-be-encrypted digital string, specifically querying a password dictionary and obtaining a to-be-extracted key set from the password dictionary, wherein the to-be-extracted key set and the to-be-encrypted digital string have no same number; the length N of each key of the password dictionary is the same, and the security server and the storage cabinet share the same password dictionary; randomly extracting a key from the key set to be extracted as a current key; counting the number with the highest occurrence frequency in the digital string to be encrypted, and obtaining the specific occurrence frequency of the number; generating an interference digit string with a preset length, wherein the interference digit string has the following characteristics: the interference digit string comprises all digits in the current key and only includes digits in the current key, and the number of occurrences of the lowest-frequency digit in the interference digit string is higher than that of the passwordThe number of occurrences of the highest-frequency-of-occurrence digit; splicing M current keys to obtain a key string, and sequentially inserting each number in the key string into the digital string to be encrypted to obtain a first data string; and splicing the first data string and the interference digital string to obtain encrypted data, and transmitting the encrypted data to the storage cabinet.
Further, the locker is also used for decrypting the encrypted data, and specifically used for counting the occurrence frequency of each number in the received encrypted data; extracting N target numbers with the maximum occurrence frequency; inquiring a key comprising N target numbers in a password dictionary to obtain a target key; extracting a pass password from received data according to the target secret keyAnd the corresponding cabinet box mark; password to be passedThe corresponding box identification is stored in the information memory.
In the description of the present invention, it is to be understood that the terms "central," "longitudinal," "lateral," "upper," "lower," "front," "rear," "left," "right," "vertical," "horizontal," "top," "bottom," "inner," "outer," and the like are used in the orientation or positional relationship indicated in the drawings, which are merely for convenience in describing the invention and to simplify the description, and are not intended to indicate or imply that the referenced device or element must have a particular orientation, be constructed and operated in a particular orientation, and are therefore not to be construed as limiting the invention. Furthermore, the terms "first", "second", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first," "second," etc. may explicitly or implicitly include one or more of that feature. In the description of the invention, the meaning of "a plurality" is two or more unless otherwise specified.
In the description of the invention, it is to be noted that, unless otherwise explicitly specified or limited, the terms "mounted", "connected" and "connected" are to be construed broadly, e.g. as being fixed or detachable or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the creation of the present invention can be understood by those of ordinary skill in the art through specific situations.
The invention has the beneficial effects that:
the invention provides a multiple-encryption storage system, which can open the cabinet box only when a preset number of input passwords are taken, so that the safety performance of the storage cabinet is obviously improved, and the cabinet box can be opened without limiting specific second terminals as long as the input passwords at the preset number of second terminals are obtained, so that the embodiment of the invention has wide application prospect.
Drawings
Fig. 1 is a flowchart of a method for opening a cabinet box by a security server according to this embodiment;
FIG. 2 is a block diagram of a controller provided in the present embodiment;
fig. 3 is a flowchart of a method for generating a secret password by a server according to the present embodiment;
fig. 4 is a flowchart of a method for generating an input password by the second terminal according to the embodiment;
fig. 5 is a flowchart of a method for obtaining a suspected password according to this embodiment;
fig. 6 is a flowchart of an encryption process of the security server provided in the present embodiment;
FIG. 7 is a flowchart of a decryption method for the locker according to this embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail below.
The embodiment of the invention provides a multiple-encryption storage system which comprises a security server, a storage cabinet and a plurality of handheld terminals, wherein each cabinet groove of the storage cabinet is provided with a cabinet box, and each cabinet box and each handheld terminal are in communication connection with the security server; the handheld terminal comprises a first terminal held by a first user and a second terminal held by a second user, wherein the first terminal and the second terminal are both in a plurality, and the first terminal and the second terminal are not interconnected.
The security server comprises a cabinet box management module, a user management module, a cabinet box selection module, a password generation module, a password pushing module and a password management module;
the cabinet box management module is used for managing the cabinet boxes and recording used cabinet boxes and unused cabinet boxes;
the user management module is used for managing a first terminal and a second terminal, the first terminal has the authority of opening the cabinet box, and the second terminal has the authority of using the cabinet box;
the cabinet box selection module is used for responding to a cabinet box opening instruction of the first terminal and selecting an unused cabinet box as a cabinet box to be opened;
the password generation module is used for generating a pass password and a holding password aiming at the cabinet box to be opened;
the password pushing module is used for pushing the pass password to the cabinet box to be opened and pushing the holding password to a second terminal corresponding to the cabinet box to be opened;
and the password management module is used for recording the relationship among the first terminal, the second terminal, the cabinet box used by the second terminal, the pass password of the cabinet box and the holding password of the second terminal.
The method for opening the cabinet box by the security server is shown in fig. 1, and comprises the following steps:
s1, responding to a first terminal instruction, inquiring an unused cabinet by a cabinet management module, and feeding back the unused cabinet to the first terminal.
And S2, receiving an unused cabinet box selection instruction of the first terminal, and selecting a cabinet box to be opened from the unused cabinet boxes.
And S3, generating a pass password and a holding password for the cabinet box to be opened.
And S4, transmitting the pass password and the identification of the cabinet box to be opened to the storage cabinet, and transmitting the holding password to a second terminal corresponding to the cabinet box to be opened.
The locker includes the cabinet body, and the cabinet body is provided with a plurality of layers of tank bracket, and every layer of tank bracket is gone up to distribute and is provided with a plurality of cabinets groove, and the cabinet box is equipped with to the tank inslot, and the cabinet groove can be through being provided with the slide rail for but cabinet box slidable mounting reduces the gliding resistance of cabinet box on the slide rail, and the cabinet box rear end is connected with drive arrangement, and the tank bracket is provided with control panel, camera and bee calling organ, control panel, camera and bee calling organ all are connected with a controller, control panel is used for acquireing the password of user input.
Specifically, be provided with N row password input device on the control panel, each row password input device can input a password, control panel can obtain N passwords at most. In the embodiment of the invention, the password input device of the control panel inputs the input password generated by the second terminal according to the holding password.
As shown in fig. 2, the controller includes:
and the communicator is used for being in communication connection with the safety server.
And the information storage is used for storing the corresponding relation between each cabinet box and the pass password.
And the password synthesizer is used for acquiring a suspected password corresponding to the input password input by the user.
And the judger is used for judging whether the password identical to the suspected password exists in the information memory.
And the cabinet box opener is used for obtaining the target cabinet box corresponding to the pass password and opening the target cabinet box if the target cabinet box exists.
And the buzzer controller is used for starting the buzzer if the buzzer does not exist.
And the camera controller is used for starting the camera if the camera does not exist.
In the embodiment of the invention, the driving device is preferably an air cylinder driving mechanism, the air cylinder driving mechanism comprises an air cylinder, a push rod of the air cylinder is hinged with a universal connector, and one end of the universal connector is connected to the end part of the cabinet box, so that the air cylinder can conveniently push the cabinet box to slide in the cabinet groove; when the cabinet box is opened, the cabinet box slides out of the cabinet groove, a user can store articles into the cabinet box, and after the articles are stored, the cabinet box is pushed back along the cabinet groove, and the cabinet box is automatically closed.
Specifically, the security server needs to perform configuration before generating the pass password and the holding password, and the configuration content includes: the number alpha of the second terminals participating in opening the cabinet box, the number beta of the second terminals required by opening the cabinet box together at the lowest, the core parameter value xi and the pass password
The number alpha of the second terminals participating in opening the cabinet box represents the number of the holding passwords needing to be generated, and each second terminal can only obtain one holding password. The number beta (beta < alpha) of the second terminals required for opening the cabinet boxes at the lowest common level represents the number of the input passwords required for opening the cabinet boxes. The core parameter values are used for the secure server to generate the respective secret passwords.
Specifically, the method for generating the secret password by the security server is shown in fig. 3, and includes:
and S101, determining a parameter data set according to the core parameter value xi.
In particular, the parameter dataset represents a set of ξ remaining classes of modulo ξ.
S103, randomly acquiring alpha different parameters xiFor each parameter xiAll bring it into the algebraic expression to get the corresponding value yiI.e. alpha parameter pairs (x) are generatedi,yi) Wherein x isiAnd yiNumber of bits is less than
S104, parameter pair (x)i,yi) And transmitting the data as a holding password to alpha second terminals participating in opening the cabinet box, wherein each second terminal acquires one holding password.
Specifically, the security server pushes the holding password to the second terminal according to a mobile phone number or a micro signal corresponding to the second terminal.
Specifically, as shown in fig. 4, the method for generating the input password by the second terminal includes:
s201, acquiring parameter pair (x)i,yi)。
And S204, splicing the first data string and the second data string to obtain an input password.
For each second terminal, it may display an input password to facilitate manual entry of the input password into the control panel by the user.
Specifically, an embodiment of the present invention further provides a method for acquiring a suspected password, where the method is implemented by a password synthesizer of a locker, and as shown in fig. 5, the method includes:
s301, acquiring beta input passwords piAnd the length of each input password is M.
Specifically, the beta input passwords are input through N (N is more than or equal to beta) rows of cipherers of the control panel, and each row of cipherers can only input one input password.
S302, according to each input password piObtaining the password identification pair (x)i,yi)。
Specifically, in the embodiment of the present invention, if the length of the password is M, the password is firstBit-mapped password xiAfter, afterBit-mapped password yi。
S303, acquiring the data of (x)i,yi) A first algebraic expression with x as argument at point 0.
S304, acquiring a second algebraic expression with x as an independent variable according to the first algebraic expression with x as the independent variable, wherein for any value of x, the difference value between the corresponding second algebraic expression and the corresponding first algebraic expression is a multiple of the value xi of the core parameter.
S305, acquiring a constant item in the second algebraic expression, and taking the constant item as a suspected password.
Further, the embodiment of the invention also provides a cabinet box opening method, which is implemented by a cabinet box opener of a storage cabinet, and the method comprises the following steps:
s310, whether the password identical to the suspected password exists in the information storage is inquired.
And S320, if the password exists, obtaining the target cabinet box corresponding to the pass password, and sliding out of the target cabinet box.
S330, if the alarm signal does not exist, an alarm mechanism is started.
Specifically, the alarm mechanism may be selected by a user, and if the user selects the camera mechanism, the camera is turned on, and if the user selects the buzzer mechanism, the buzzer is turned on.
Specifically, a timer is arranged in each of the buzzer and the camera, and the timer is used for closing the buzzer or the camera after the buzzer or the camera is started for a preset time.
Further, in order to improve the security of the locker and the security server in the interaction process and avoid leakage of the password, the embodiment of the invention encrypts the whole process of the communication between the security server and the locker.
Password for passing by security serverThe process of encrypting the to-be-encrypted digital string formed by the corresponding box identifier is shown in fig. 6, and includes:
s401, inquiring a password dictionary and acquiring a key set to be extracted from the password dictionary, wherein the key set to be extracted and the number string to be encrypted have no same number; and each key of the password dictionary has the same length N, and the security server and the locker share the same password dictionary.
S402, randomly extracting a key from the key set to be extracted as a current key.
And S403, counting the number with the highest occurrence frequency in the digital string to be encrypted, and obtaining the specific occurrence frequency of the number.
S404, generating an interference digit string with a preset length, wherein the interference digit string has the following characteristics: the interference digit string comprises all digits in the current key and only includes digits in the current key, and the number of occurrences of the lowest-frequency digit in the interference digit string is higher than that of the passwordThe number of occurrences of the highest frequency occurring digit.
S405, splicing M current keys to obtain a key string, and sequentially inserting each number in the key string into the digital string to be encrypted to obtain a first data string.
S406, splicing the first data string and the interference digit string to obtain encrypted data.
Correspondingly, the locker decryption method is shown in fig. 7, and includes:
s501, counting the occurrence frequency of each number in the received encrypted data;
s502, extracting N target numbers with the largest occurrence frequency;
s503, inquiring a key comprising N target numbers in a password dictionary to obtain a target key;
s504, a pass password is extracted from received data according to the target secret keyAnd the corresponding cabinet box mark;
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
It should be noted that: the sequence of the above embodiments of the present invention is only for description, and does not represent the advantages and disadvantages of the embodiments.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.
Claims (1)
1. A multiple encryption storage system is characterized in that:
the multiple encryption storage system comprises a security server, a storage cabinet, a first terminal held by a first user and a second terminal held by a second user, wherein each cabinet groove of the storage cabinet is provided with a cabinet box, and each cabinet box is in communication connection with the security server; the first terminal and the second terminal are not interconnected and are in communication connection with the security server; the storage cabinet comprises a cabinet body, the cabinet body is provided with a plurality of layers of cabinet frames, each layer of cabinet frame is distributed with a plurality of cabinet grooves, cabinet boxes are arranged in the cabinet grooves, the cabinet grooves can be provided with slide rails, so that the cabinet boxes can be slidably arranged on the slide rails, the sliding resistance of the cabinet boxes is reduced, the rear ends of the cabinet boxes are connected with a driving device, the cabinet frames are provided with a control panel, a camera and a buzzer, the control panel, the camera and the buzzer are all connected with a controller, and the control panel is used for acquiring passwords input by users; the control panel is provided with N rows of password input devices, each row of password input devices can input one password, and the control panel can acquire N passwords at most;
the security server responds to a first terminal instruction, selects a cabinet box to be opened, and generates a pass password and a holding password for the cabinet box to be opened; the holding password is a parameter pair(ii) a The pass password and the identification of the cabinet box to be opened are transmitted to the storage cabinet, and the holding password is transmitted to a second terminal corresponding to the cabinet box to be opened;
the second terminal is further configured to generate an input password, in particular to obtain a parameter pair(ii) a According to the parametersTo obtainA first data string of bits; according to the parametersTo obtainA second string of bits; splicing the first data string and the second data string to obtain an input password;
the storage isThe cabinet is also used for obtainingPersonal input password(ii) a According to each input passwordObtaining the password identification pair(ii) a Is obtained toAt 0 point or moreA first algebraic expression of an argument; according to the aboveIs obtained as a first algebraic expression of the independent variable toSecond algebraic expression as an argument for anyThe difference between the corresponding second and first algebraic expressions is the core parameter valueMultiples of (d); acquiring a constant item in the second algebraic expression, and taking the constant item as a suspected password;
the locker also inquires whether a pass password identical to the suspected pass password exists, if so, a target box corresponding to the pass password is obtained, and the target box slides out;
the security server is also used for passing passwordsEncrypting a to-be-encrypted digital string formed by the to-be-encrypted digital string and a corresponding cabinet box identifier of the to-be-encrypted digital string, specifically querying a password dictionary and obtaining a to-be-extracted key set from the password dictionary, wherein the to-be-extracted key set and the to-be-encrypted digital string have no same number; the length N of each key of the password dictionary is the same, and the security server and the storage cabinet share the same password dictionary; randomly extracting a key from the key set to be extracted as a current key; counting the number with the highest occurrence frequency in the digital string to be encrypted, and obtaining the specific occurrence frequency of the number; generating an interference digit string with a preset length, wherein the interference digit string has the following characteristics: the interference digit string comprises all digits in the current key and only includes digits in the current key, and the number of occurrences of the lowest-frequency digit in the interference digit string is higher than that of the passwordThe number of occurrences of the highest-frequency-of-occurrence digit; splicing M current keys to obtain a key string, and sequentially inserting each number in the key string into the digital string to be encrypted to obtain a first data string; splicing the first data string and the interference digital string to obtain encrypted data, and transmitting the encrypted data to the storage cabinet;
the storage cabinet is also used for decrypting the encrypted data, and is particularly used for counting the occurrence frequency of each number in the received encrypted data; extracting N target numbers with the maximum occurrence frequency; inquiring a key comprising N target numbers in a password dictionary to obtain a target key; extracting a pass password from received data according to the target secret keyAnd the corresponding cabinet box mark; will pass through secretCodeThe corresponding box identification is stored in the information memory.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811121355.0A CN109360307B (en) | 2018-09-25 | 2018-09-25 | Multi-encryption storage system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811121355.0A CN109360307B (en) | 2018-09-25 | 2018-09-25 | Multi-encryption storage system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109360307A CN109360307A (en) | 2019-02-19 |
CN109360307B true CN109360307B (en) | 2020-11-03 |
Family
ID=65347772
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811121355.0A Active CN109360307B (en) | 2018-09-25 | 2018-09-25 | Multi-encryption storage system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109360307B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101803270A (en) * | 2007-07-31 | 2010-08-11 | 雷蒙德·吉恩·克利福德·阿图斯 | Method and system for encryption of data |
CN102480726A (en) * | 2010-11-24 | 2012-05-30 | 比亚迪股份有限公司 | Password protection method, password protection system and mobile terminal with same |
WO2013156956A1 (en) * | 2012-04-18 | 2013-10-24 | Fourie Jurie Alexander | Mobile device charging station |
CN103745536A (en) * | 2014-01-24 | 2014-04-23 | 温州超动科技有限公司 | Cabinet management system based on dynamic passwords |
CN104167030A (en) * | 2013-12-19 | 2014-11-26 | 陈桂强 | Electronic cipher shared lock based on (t,n) threshold |
US9672673B1 (en) * | 2016-03-22 | 2017-06-06 | Digilock Asia Ltd. | Electronic locker lock system |
CN108171849A (en) * | 2018-01-11 | 2018-06-15 | 上海威惠智能科技有限公司 | Password update method, safety cabinet and safety box control system |
-
2018
- 2018-09-25 CN CN201811121355.0A patent/CN109360307B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101803270A (en) * | 2007-07-31 | 2010-08-11 | 雷蒙德·吉恩·克利福德·阿图斯 | Method and system for encryption of data |
CN102480726A (en) * | 2010-11-24 | 2012-05-30 | 比亚迪股份有限公司 | Password protection method, password protection system and mobile terminal with same |
WO2013156956A1 (en) * | 2012-04-18 | 2013-10-24 | Fourie Jurie Alexander | Mobile device charging station |
CN104167030A (en) * | 2013-12-19 | 2014-11-26 | 陈桂强 | Electronic cipher shared lock based on (t,n) threshold |
CN103745536A (en) * | 2014-01-24 | 2014-04-23 | 温州超动科技有限公司 | Cabinet management system based on dynamic passwords |
US9672673B1 (en) * | 2016-03-22 | 2017-06-06 | Digilock Asia Ltd. | Electronic locker lock system |
CN108171849A (en) * | 2018-01-11 | 2018-06-15 | 上海威惠智能科技有限公司 | Password update method, safety cabinet and safety box control system |
Also Published As
Publication number | Publication date |
---|---|
CN109360307A (en) | 2019-02-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wang et al. | Secure ranked keyword search over encrypted cloud data | |
Chatterjee et al. | Cracking-resistant password vaults using natural language encoders | |
US9740849B2 (en) | Registration and authentication of computing devices using a digital skeleton key | |
CN110324143A (en) | Data transmission method, electronic equipment and storage medium | |
CN110430055A (en) | Offline cryptogram generation method, offline cryptogram verification method and door lock management server | |
CN101815091A (en) | Cipher providing equipment, cipher authentication system and cipher authentication method | |
US9641328B1 (en) | Generation of public-private key pairs | |
CN102064944A (en) | Safety card issuing method as well as card issuing equipment and system | |
US10742401B2 (en) | Half-pyramid data encryption | |
CN103312519B (en) | A kind of dynamic password device and method of work thereof | |
CN102571355B (en) | Method and device for importing secret key without landing | |
WO2018234813A1 (en) | Controlling access to data | |
CN103685149B (en) | The method and apparatus for handling the password of game server | |
CN114417073A (en) | Neighbor node query method and device of encryption graph and electronic equipment | |
CN104533185A (en) | Collecting system based on code case | |
CN109360307B (en) | Multi-encryption storage system | |
CN110062941A (en) | Message transmission system, communication terminal, server unit, message method and program | |
CN109147246B (en) | Intelligent anti-theft system | |
CN109138649B (en) | Password storing safety system | |
CN109252789B (en) | Intelligent safety control system | |
CN117294429A (en) | Public resource transaction data encryption and decryption method, system and medium based on blockchain | |
CN107729766B (en) | Data storage method, data reading method and system thereof | |
CN109377596B (en) | Safety system | |
CN116776365A (en) | Data query method, device and storage medium | |
CN109281583B (en) | Cipher safe |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20230420 Address after: 010000 Intersection of Genghis Khan Street and Horqin North Road, Xincheng District, Hohhot, Inner Mongolia Autonomous Region Patentee after: Hohhot Xincheng Innovation and Entrepreneurship Service Center Address before: 322200 No. 4 Jieyang East Road, Puyang Street, Pujiang County, Jinhua, Zhejiang Patentee before: She Lijuan |
|
TR01 | Transfer of patent right |