CN109523658A - A kind of safety check diastema cryptographic methods, device and intelligent lock - Google Patents
A kind of safety check diastema cryptographic methods, device and intelligent lock Download PDFInfo
- Publication number
- CN109523658A CN109523658A CN201811147308.3A CN201811147308A CN109523658A CN 109523658 A CN109523658 A CN 109523658A CN 201811147308 A CN201811147308 A CN 201811147308A CN 109523658 A CN109523658 A CN 109523658A
- Authority
- CN
- China
- Prior art keywords
- password
- diastema
- digit
- user
- time delay
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00388—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks code verification carried out according to the challenge/response method
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00412—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/0042—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed
- G07C2009/00476—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
- Lock And Its Accessories (AREA)
Abstract
Safety check diastema cryptographic methods provided by the invention, the described method includes: the diastema password digit m of password key maximum quantity b, user password digit n and user's input are obtained, wherein the diastema password digit m=np+q, p are integer of the m divided by n, q is remainder, and p and q are positive integer;Time delay multiple z is determined using the password key maximum quantity b, the user password digit n, the diastema password digit m and preset relation;The required checking time tn that the user password digit n is verified is estimated according to selected terminal platform;When the diastema password for obtaining user's input is verified according to default time delay, determine that verifying is completed after the default time delay reaches, subsequent operation is executed according to verification result, by way of increasing and verifying time delay, in the case where not influencing user experience, the safety that diastema password uses is improved, the present invention further correspondingly provides safety check diastema encryption apparatus and intelligent lock.
Description
Technical field
The present invention relates to field of information security technology, in particular to a kind of safety check diastema cryptographic methods, device and intelligence
It can lockset.
Background technique
Currently, with the development of science and technology, in daily life password using more and more extensive, get home again from computer to mobile phone
In coded lock, it is ubiquitous.For coded lock, the password of coded lock is fixed and invariable, if someone peep and
The sequence of pressing of password has stealthily been write down, or when inputting password on code keyboard, there are a large amount of fingers above stationary digital
Line or trace cause the correlated digital of password to be revealed.Password is revealed in this case in order to prevent, produces diastema password skill
Art, i.e., in registered password above or below, the number inputted except any keying sequence obscures view as diastema password
It listens, can effectively prevent registration password and remembered by malicious person, while again can normally-open door lock.
Diastema password compares fixed password, and security level is higher, it more difficult to be spied upon, password disclosure risk is smaller, arbitrarily
Increase length, inputs password every time and change, the safety that user uses can be greatly increased.But diastema cryptographic technique can make
The safety for obtaining user password reduces, and according to mathematical analysis, is collided by the password of Brute Force method, even if sufficiently small void
Quasi- password digit, which will also greatly improve, cracks probability, and therefore, the safety of diastema password is also opposite.
Summary of the invention
The embodiment of the invention provides a kind of safety check diastema cryptographic methods, device and intelligent locks, when increasing verification
The method prolonged makes in the case where not influencing user experience, and safe uses diastema cryptographic function.
In a first aspect, the present invention provides a kind of safety check diastema cryptographic methods, which comprises
The diastema password digit m of password key maximum quantity b, user password digit n and user's input are obtained, wherein institute
Diastema password digit m=np+q is stated, p is integer of the m divided by n, and q is remainder, and p and q are positive integer;
Using the password key maximum quantity b, the user password digit n, the diastema password digit m and preset
Relationship determines time delay multiple z;
The required checking time tn that the user password digit n is verified is estimated according to selected terminal platform;
It verifies when obtaining the diastema password that user inputs according to default time delay, is determined after the default time delay reaches
Verifying is completed, and executes subsequent operation according to verification result.
Optionally, the preset relation are as follows:Institute
Stating [] is round numbers to the right, described close using the password key maximum quantity b, the user password digit n, the diastema
Code bit number m and preset relation determine time delay multiple z, comprising:
Using the password key maximum quantity b, the user password digit n, the diastema password digit m and preset
Relationship is rounded to the right numerical value, and the time delay multiple z is rounded to the right numerical value greater than described.
Optionally, when the remainder q is greater than 0, the method also includes:
After n diastema passwords of every verification duplication check input n diastema password [z/ (p+1)] -1 time, by last time school
Result is tested to be determined as approving result.
Optionally, when the remainder q is equal to 0, the method also includes:
After n diastema password of verification every for terminal duplication check input n diastema password [z/p] -1 time, by last
Secondary check results are determined as approving result.
Optionally, described when the diastema password for obtaining user's input is verified according to default time delay, when described default
Prolong and determine that verifying is completed after reaching, subsequent operation is executed according to verification result, comprising:
It completes to verify after verification z times of tn duration of time delay after each diastema Password Input finishes, if correct
Prompt cipher is correct, prompt cipher mistake and re-enters if mistake.
Second aspect, the present invention provide a kind of safety check diastema encryption apparatus, and described device includes:
Acquiring unit, the diastema for obtaining password key maximum quantity b, user password digit n and user's input are close
Code bit number m, wherein the diastema password digit m=np+q, p are integer of the m divided by n, q is remainder, and p and q are positive integer;
Processing unit, for utilizing the password key maximum quantity b, the user password digit n, the diastema password
Digit m and preset relation determine time delay multiple z;
Processing unit is also used to estimate the required school that the user password digit n is verified according to selected terminal platform
Test time tn;
Processing unit is also used to verify when the diastema password for obtaining user's input according to default time delay, to described default
Time delay determines that verifying is completed after reaching, and executes subsequent operation according to verification result.
Optionally, the preset relation are as follows:Institute
Stating [] is round numbers to the right, and the processing unit is specifically used for:
Using the password key maximum quantity b, the user password digit n, the diastema password digit m and preset
Relationship is rounded to the right numerical value, and the time delay multiple z is rounded to the right numerical value greater than described.
Optionally, the processing unit is also used to repeat school after n diastema passwords of every verification when the remainder q is greater than 0
Test input n diastema password [z/ (p+1)] -1 time, by last time check results be determined as approval result.
Optionally, the processing unit is also used to when the remainder q is equal to 0, n diastema password of verification every for terminal
Afterwards duplication check input n diastema password [z/p] -1 time, by last time check results be determined as approval result.
The third aspect, the present invention provide a kind of intelligent lock, have processor and memory, the processor is for executing
The program of memory storage is stored with the program for executing such as above method in the memory.
As can be seen from the above technical solutions, the embodiment of the present invention has the advantage that
Safety check diastema cryptographic methods provided by the invention, which comprises acquisition password key maximum quantity b,
User password digit n and user input diastema password digit m, wherein the diastema password digit m=np+q, p be m divided by
The integer of n, q are remainder, and p and q are positive integer;Utilize the password key maximum quantity b, the user password digit n, described
Diastema password digit m and preset relation determine time delay multiple z;The user password digit is estimated according to selected terminal platform
The required checking time tn that n is verified;When the diastema password for obtaining user's input is verified according to default time delay, to described
Default time delay determines that verifying is completed after reaching, and executes subsequent operation according to verification result, by way of increasing and verifying time delay,
In the case where not influencing user experience, the safety that diastema password uses is improved, the present invention further correspondingly provides safety check
Diastema encryption apparatus and intelligent lock equally can execute subsequent operation according to verification result, by the side for increasing verification time delay
Formula improves the safety that diastema password uses in the case where not influencing user experience.
Detailed description of the invention
A kind of flow chart of embodiment of safety check diastema cryptographic methods provided by the invention when Fig. 1;
When Fig. 2 in a kind of embodiment of safety check diastema cryptographic methods provided by the invention probability curve emulation signal
Figure;
A kind of structural block diagram of embodiment of safety check diastema encryption apparatus provided by the invention when Fig. 3.
Specific embodiment
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention
Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only
The embodiment of a part of the invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people
The model that the present invention protects all should belong in member's every other embodiment obtained without making creative work
It encloses.
Description and claims of this specification and term " first ", " second ", " third ", " in above-mentioned attached drawing
Four " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way
Data be interchangeable under appropriate circumstances, so that the embodiments described herein can be in addition to illustrating herein or describing
Sequence other than appearance is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that covering is non-exclusive
Include, for example, the process, method, system, product or equipment for containing a series of steps or units are not necessarily limited to clearly arrange
Those of out step or unit, but may include be not clearly listed or it is solid for these process, methods, product or equipment
The other step or units having.
As shown in connection with fig. 1, a kind of safety check diastema cryptographic methods are provided in the embodiment of the present invention, which comprises
S101, the diastema password digit m for obtaining password key maximum quantity b, user password digit n and user's input,
The wherein diastema password digit m=np+q, p are integer of the m divided by n, and q is remainder, and p and q are positive integer.
So-called diastema password can input the number except any keying sequence that is, in registered password above or below
Word, to mislead the public, can effectively prevent registration password and remembered by malicious person, while again can be just normally opened as diastema password
Door lock is opened, is common on the electronic lock and mobile phone using password as unlock verifying approach, method provided by the invention can answer
With on intelligent door lock or intelligent terminal, to improve information security, password key maximum quantity b is to input in equipment for user
The space digit of password, such as numeric keypad are 10, and letter is 26, and password key maximum quantity b is then 36, user password digit
N is the practical true user password length of verification;The diastema password digit m of user's input is to allow the diastema password of input long
Degree, by diastema password it is found that m >=n, and m=np+q, p are m divided by the integer of n, and q is remainder, it should be noted that for void
The definition of position password, those of ordinary skill in the art are not it is to be appreciated that repeat them here this.
S102, using the password key maximum quantity b, the user password digit n, the diastema password digit m with
And preset relation determines time delay multiple z.
Specifically, the preset relation are as follows:Institute
Stating [] is round numbers to the right, utilizes the password key maximum quantity b, the user password digit n, diastema password position
Number m and preset relation are rounded to the right numerical value, and the time delay multiple z is rounded to the right numerical value greater than described.
S103, the required checking time tn that the user password digit n is verified is estimated according to selected terminal platform.
When the remainder q is greater than 0, duplication check inputs n diastema password [z/ (p+ after n diastema passwords of every verification
1)] -1 time, last time check results are determined as to approve result.When the remainder q is equal to 0, verification n every for terminal
After diastema password duplication check input n diastema password [z/p] -1 time, by last time check results be determined as approval result.
S104, when obtain user input diastema password verified according to default time delay, reach to the default time delay
It determines that verifying is completed afterwards, subsequent operation is executed according to verification result.
It completes to verify after verification z times of tn duration of time delay after each diastema Password Input finishes, if correct
Prompt cipher is correct, prompt cipher mistake and re-enters if mistake.
Safety check diastema cryptographic methods provided by the invention, which comprises acquisition password key maximum quantity b,
User password digit n and user input diastema password digit m, wherein the diastema password digit m=np+q, p be m divided by
The integer of n, q are remainder, and p and q are positive integer;Utilize the password key maximum quantity b, the user password digit n, described
Diastema password digit m and preset relation determine time delay multiple z;The user password digit is estimated according to selected terminal platform
The required checking time tn that n is verified;When the diastema password for obtaining user's input is verified according to default time delay, to described
Default time delay determines that verifying is completed after reaching, and executes subsequent operation according to verification result, by way of increasing and verifying time delay,
In the case where not influencing user experience, the safety that diastema password uses is improved.
For safety check diastema cryptographic methods provided by the invention, demonstrate,proved below by the test for carrying out safety
It is bright.
For the random fixed digit password of user's input, attacker depends on fixed position by the probability of Brute Force
Number.For example, for numeric keypad 0~9, user sets unlocking pin 6, then by enumerate crack successful probability be 10^ (-
6) is desired for 10^6, this is a bigger trial and error number for attacker.
In GA374-2001 electronic safety lock standard, size of key is defined, it is specified that using electronic code electricity
Sub- theftproof lock A grades of size of keys should be no less than 10^5, and B grades of size of keys should be no less than 10^6.However the introducing of diastema password will so that
Input length becomes larger, so that collision probability is promoted, and then reduces actually active size of key.
Definition b is Password Input space digit, and n is the practical true user password length of verification;M is the void for allowing to input
Position Password Length, by diastema password it is found that m >=n, and m=np+q, p are m divided by the integer of n, and q is remainder;
It defines, the probability containing n user passwords is P in m virtual pins(b,m,n), then formula (1)
As shown in connection with fig. 2, because this is sufficiently small when n is larger, the function is similar compared with curve shape.Pass through
Matlab, which is drawn, works as b=10, i.e., the probability curve (3 < n < 11,7 < m < 21) under numeric keypad, and m is coordinate, in n in probability curve
It is poor with the safety of m diastema password when lesser, and this is current typical application scenarios, wherein 1, m it is bigger, collided
Probability it is bigger, but probability is increased speed compared to slowing down, until collision probability levels off to 1.2, n is smaller, more dangerous, identical general
The m digit needed under rate is also smaller.In view of being mainly 5 or 6 and being numeric keypad using n digit under reality
Under, we list the collision probability under typical m number:
When m is smaller, such as table 1.
Table 1
When m is larger, such as table 2.
Table 2
As representative value m=20, n=5,16 times are promoted by collision probability.
As representative value m=260, n=5,276 times are promoted by collision probability.
Brute Force is unlocked the expected time
Setting user password length n is fixed, and key input space digit b is fixed, if the diastema password of i-th user input
Length is then to open the number X expectation of lock:
WhereinFor formula (1)
The uncaging time for defining i-th user input is that then Brute Force opens the time Y expectation of lock are as follows:
In order to simplify processing, the input m that unlocks every time is seti, the distribution of ti is identical, thenti=tj=t, then expected time are as follows:
The P=b for not supporting commonly the keyboard of diastema password to unlock-n, i.e. the unlocking expected time is b-n×t。
From safety perspective, when the unlocking expected time of diastema password should not be below the unlocking of ordinary password keyboard
Between, it may be assumed that
Note
When m is smaller, the value of Z such as table 3:
Table 3
When m is larger, the value of Z such as table 4.
Table 4
By comparison it can be found that 5 user keys of the support 20 diastema passwords using classics, proving and comparisom
When time is greater than 16 times of commonly 6 passwords of verification, safety is suitable.
As shown in connection with fig. 3, correspondingly, the present invention provides a kind of safety check diastema encryption apparatus, and described device includes:
Acquiring unit 301, for obtaining the diastema of password key maximum quantity b, user password digit n and user's input
Password digit m, wherein the diastema password digit m=np+q, p are integer of the m divided by n, q is remainder, and p and q are positive integer;
Processing unit 302, for utilizing the password key maximum quantity b, the user password digit n, the diastema
Password digit m and preset relation determine time delay multiple z;
Processing unit 302 is also used to estimate the institute that the user password digit n is verified according to selected terminal platform
Need checking time tn;
Processing unit 302 is also used to verify when the diastema password for obtaining user's input according to default time delay, to described
Default time delay determines that verifying is completed after reaching, and executes subsequent operation according to verification result.
Optionally, the preset relation are as follows:Institute
Stating [] is round numbers to the right, and the processing unit 302 is specifically used for:
Using the password key maximum quantity b, the user password digit n, the diastema password digit m and preset
Relationship is rounded to the right numerical value, and the time delay multiple z is rounded to the right numerical value greater than described.
Optionally, the processing unit 302 is also used to when the remainder q is greater than 0, weight after n diastema passwords of every verification
Resume classes test input n diastema password [z/ (p+1)] -1 time, by last time check results be determined as approval result.
Optionally, the processing unit 302 is also used to when the remainder q is equal to 0, n diastema of verification every for terminal
After password duplication check input n diastema password [z/p] -1 time, by last time check results be determined as approval result.
Safety check diastema encryption apparatus provided by the invention, described device include: that acquiring unit obtains password key most
Big quantity b, user password digit n and the diastema password digit m of user's input, wherein the diastema password digit m=np+q,
P is integer of the m divided by n, and q is remainder, and p and q are positive integer;Processing unit utilizes the password key maximum quantity b, the use
Family password digit n, the diastema password digit m and preset relation determine time delay multiple z, are estimated according to selected terminal platform
The required checking time tn that the user password digit n is verified, when obtain user input diastema password according to it is default when
Prolong and verified, determine that verifying is completed after the default time delay reaches, subsequent operation is executed according to verification result, passes through increase
The mode of verification time delay improves the safety that diastema password uses in the case where not influencing user experience.
Correspondingly, a kind of intelligent lock is also provided in the embodiment of the present invention, there is processor and memory, the processor
For executing the program of the memory storage, it is stored with for executing the program such as the above method, specifically in the memory
Method is as follows:
The diastema password digit m of password key maximum quantity b, user password digit n and user's input are obtained, wherein institute
Diastema password digit m=np+q is stated, p is integer of the m divided by n, and q is remainder, and p and q are positive integer;
Using the password key maximum quantity b, the user password digit n, the diastema password digit m and preset
Relationship determines time delay multiple z;
The required checking time tn that the user password digit n is verified is estimated according to selected terminal platform;
It verifies when obtaining the diastema password that user inputs according to default time delay, is determined after the default time delay reaches
Verifying is completed, and executes subsequent operation according to verification result.
Optionally, the preset relation are as follows:Institute
Stating [] is round numbers to the right, described close using the password key maximum quantity b, the user password digit n, the diastema
Code bit number m and preset relation determine time delay multiple z, comprising:
Using the password key maximum quantity b, the user password digit n, the diastema password digit m and preset
Relationship is rounded to the right numerical value, and the time delay multiple z is rounded to the right numerical value greater than described.
Optionally, when the remainder q is greater than 0, the method also includes:
After n diastema passwords of every verification duplication check input n diastema password [z/ (p+1)] -1 time, by last time school
Result is tested to be determined as approving result.
Optionally, when the remainder q is equal to 0, the method also includes:
After n diastema password of verification every for terminal duplication check input n diastema password [z/p] -1 time, by last
Secondary check results are determined as approving result.
Optionally, described when the diastema password for obtaining user's input is verified according to default time delay, when described default
Prolong and determine that verifying is completed after reaching, subsequent operation is executed according to verification result, comprising:
It completes to verify after verification z times of tn duration of time delay after each diastema Password Input finishes, if correct
Prompt cipher is correct, prompt cipher mistake and re-enters if mistake.
Intelligent lock can be intelligent door lock, intelligent terminal etc., not limit this.
Intelligent lock provided by the invention, by way of increasing and verifying time delay, in the case where not influencing user experience,
Improve the safety that diastema password uses.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, device and method can be with
It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit
It divides, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components
It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or
The mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, the indirect coupling of device or unit
It closes or communicates to connect, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can
It is completed with instructing relevant hardware by program, which can be stored in a computer readable storage medium, storage
Medium may include: read-only memory (ROM, Read Only Memory), random access memory (RAM, Random
Access Memory), disk or CD etc..
A kind of safety check diastema cryptographic methods provided by the present invention, device and intelligent lock have been carried out in detail above
It introduces, for those of ordinary skill in the art, thought according to an embodiment of the present invention, in specific embodiment and application range
Upper there will be changes, in conclusion the contents of this specification are not to be construed as limiting the invention.
Claims (10)
1. a kind of safety check diastema cryptographic methods, which is characterized in that the described method includes:
The diastema password digit m for obtaining password key maximum quantity b, user password digit n and user's input, wherein the void
Position password digit m=np+q, p are integer of the m divided by n, and q is remainder, and p and q are positive integer;
Utilize the password key maximum quantity b, the user password digit n, the diastema password digit m and preset relation
Determine time delay multiple z;
The required checking time tn that the user password digit n is verified is estimated according to selected terminal platform;
It is verified when obtaining the diastema password that user inputs according to default time delay, verifying is determined after the default time delay reaches
It completes, subsequent operation is executed according to verification result.
2. safety check diastema cryptographic methods according to claim 1, which is characterized in that the preset relation are as follows:[] is round numbers to the right, described in the utilization
Password key maximum quantity b, the user password digit n, the diastema password digit m and preset relation determine time delay multiple
Z, comprising:
Utilize the password key maximum quantity b, the user password digit n, the diastema password digit m and preset relation
It is rounded numerical value to the right, the time delay multiple z is rounded to the right numerical value greater than described.
3. safety check diastema cryptographic methods according to claim 1, which is characterized in that when the remainder q is greater than 0,
The method also includes:
After n diastema passwords of every verification duplication check input n diastema password [z/ (p+1)] -1 time, will last time verification knot
Fruit is determined as approving result.
4. safety check diastema cryptographic methods according to claim 1, which is characterized in that when the remainder q is equal to 0,
The method also includes:
After n diastema password of verification every for terminal duplication check input n diastema password [z/p] -1 time, by last time school
Result is tested to be determined as approving result.
5. safety check diastema cryptographic methods according to claim 1, which is characterized in that described to work as what acquisition user inputted
Diastema password is verified according to default time delay, is determined that verifying is completed after the default time delay reaches, is held according to verification result
Row subsequent operation, comprising:
It completes to verify after verification z times of tn duration of time delay after each diastema Password Input finishes, be prompted if correct
Password is correct, prompt cipher mistake and re-enters if mistake.
6. a kind of safety check diastema encryption apparatus, which is characterized in that described device includes:
Acquiring unit, for obtaining the diastema password position of password key maximum quantity b, user password digit n and user's input
Number m, wherein the diastema password digit m=np+q, p are integer of the m divided by n, q is remainder, and p and q are positive integer;
Processing unit, for utilizing the password key maximum quantity b, the user password digit n, the diastema password digit
M and preset relation determine time delay multiple z;
When processing unit is also used to estimate the required verification that the user password digit n is verified according to selected terminal platform
Between tn;
Processing unit is also used to verify when the diastema password for obtaining user's input according to default time delay, to the default time delay
It determines that verifying is completed after reaching, subsequent operation is executed according to verification result.
7. safety check diastema encryption apparatus according to claim 6, which is characterized in that the preset relation are as follows:[] is round numbers to the right, the processing unit
It is specifically used for:
Utilize the password key maximum quantity b, the user password digit n, the diastema password digit m and preset relation
It is rounded numerical value to the right, the time delay multiple z is rounded to the right numerical value greater than described.
8. safety check diastema encryption apparatus according to claim 6, which is characterized in that the processing unit is also used to work as
When the remainder q is greater than 0, duplication check input n diastema password [z/ (p+1)] -1 time after n diastema passwords of every verification will most
A check results are determined as approving result afterwards.
9. safety check diastema encryption apparatus according to claim 6, which is characterized in that the processing unit is also used to work as
When the remainder q is equal to 0, duplication check input n diastema password [z/p] -1 time after n diastema password of verification every for terminal,
Last time check results are determined as to approve result.
10. a kind of intelligent lock, which is characterized in that there is processor and memory, the processor is for executing the storage
The program of device storage, the program for executing such as any one of claims 1 to 5 the method is stored in the memory.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811147308.3A CN109523658B (en) | 2018-09-29 | 2018-09-29 | Method and device for safely checking virtual password and intelligent lockset |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811147308.3A CN109523658B (en) | 2018-09-29 | 2018-09-29 | Method and device for safely checking virtual password and intelligent lockset |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109523658A true CN109523658A (en) | 2019-03-26 |
CN109523658B CN109523658B (en) | 2021-01-26 |
Family
ID=65772408
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811147308.3A Active CN109523658B (en) | 2018-09-29 | 2018-09-29 | Method and device for safely checking virtual password and intelligent lockset |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109523658B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1773414A (en) * | 2004-11-12 | 2006-05-17 | 上海电气集团股份有限公司 | Cipher safe protecting method for preventing intelligent device input cipher from being decrypted |
CN101227275A (en) * | 2008-02-13 | 2008-07-23 | 刘海云 | Enciphering method for combining accidental enciphering and exhaust algorithm decipher |
CN101610154A (en) * | 2009-07-17 | 2009-12-23 | 王聪 | Novel cipher encrypting method |
CN103051454A (en) * | 2012-12-19 | 2013-04-17 | 天地融科技股份有限公司 | Electronic equipment and password authentication method thereof |
CN105959948A (en) * | 2016-04-26 | 2016-09-21 | 上海斐讯数据通信技术有限公司 | Wireless private brute force cracking prevention method and wireless private brute force cracking prevention device |
RU2015108618A (en) * | 2015-03-11 | 2016-09-27 | Евгений Пантелеевич Сухоносов | Authenticated Password Authentication Method |
DE102016201198A1 (en) * | 2016-01-27 | 2017-07-27 | Gerd Reime | Safety and / or locking system and associated method |
CN107092839A (en) * | 2016-02-17 | 2017-08-25 | 深圳市维申斯科技有限公司 | The antitheft input method of code keypad based on random diastema password |
CN107195039A (en) * | 2017-05-11 | 2017-09-22 | 广东汇泰龙科技有限公司 | It is a kind of to prevent the intelligent cloud lock system and unlocking method of peep of cipher |
-
2018
- 2018-09-29 CN CN201811147308.3A patent/CN109523658B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1773414A (en) * | 2004-11-12 | 2006-05-17 | 上海电气集团股份有限公司 | Cipher safe protecting method for preventing intelligent device input cipher from being decrypted |
CN101227275A (en) * | 2008-02-13 | 2008-07-23 | 刘海云 | Enciphering method for combining accidental enciphering and exhaust algorithm decipher |
CN101610154A (en) * | 2009-07-17 | 2009-12-23 | 王聪 | Novel cipher encrypting method |
CN103051454A (en) * | 2012-12-19 | 2013-04-17 | 天地融科技股份有限公司 | Electronic equipment and password authentication method thereof |
RU2015108618A (en) * | 2015-03-11 | 2016-09-27 | Евгений Пантелеевич Сухоносов | Authenticated Password Authentication Method |
DE102016201198A1 (en) * | 2016-01-27 | 2017-07-27 | Gerd Reime | Safety and / or locking system and associated method |
CN107092839A (en) * | 2016-02-17 | 2017-08-25 | 深圳市维申斯科技有限公司 | The antitheft input method of code keypad based on random diastema password |
CN105959948A (en) * | 2016-04-26 | 2016-09-21 | 上海斐讯数据通信技术有限公司 | Wireless private brute force cracking prevention method and wireless private brute force cracking prevention device |
CN107195039A (en) * | 2017-05-11 | 2017-09-22 | 广东汇泰龙科技有限公司 | It is a kind of to prevent the intelligent cloud lock system and unlocking method of peep of cipher |
Non-Patent Citations (1)
Title |
---|
魏雅: "基于单片机的电子密码锁设计", 《电子设计工程》 * |
Also Published As
Publication number | Publication date |
---|---|
CN109523658B (en) | 2021-01-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104205721B (en) | The adaptive authentication method of context aware and device | |
CN105320864A (en) | Method and apparatus for processing event operation | |
CN101436935A (en) | PIN code verification method through fingerprint identification | |
CN107612880A (en) | One kind applies access method and device | |
CN104536686A (en) | Screen unlocking method and device | |
CN101072100A (en) | Authenticating system and method utilizing reliable platform module | |
CN103971239A (en) | Verification method and device | |
CN105809007A (en) | Privacy protection method and device | |
CN105929974A (en) | Password input management method and mobile terminal | |
CN103034417A (en) | Unlocking method for touch screen and terminal equipment | |
CN107295016A (en) | Auth method and device | |
CN106603241A (en) | Unlocking method, apparatus and electronic device | |
CN108647510A (en) | Application program access method and device | |
CN105868601A (en) | Pressure touch screen-based electronic terminal, encryption unlocking controller and method | |
Buriro et al. | SWIPEGAN: swiping data augmentation using generative adversarial networks for smartphone user authentication | |
CN105224848B (en) | A kind of equipment authentication method, apparatus and system | |
Karim et al. | Choosing the right MFA method for online systems: A comparative analysis | |
CN105590044A (en) | Information authentication method and apparatus | |
CN110516427B (en) | Terminal user identity authentication method and device, storage medium and computer equipment | |
CN109523658A (en) | A kind of safety check diastema cryptographic methods, device and intelligent lock | |
CN105897708A (en) | Information protection method and mobile terminal | |
CN103856331B (en) | A kind of signature authentication method and system | |
CN109147120A (en) | Authority processing method and device | |
CN104615267A (en) | Password input management method, system and electronic device | |
CN107426163A (en) | A kind of method and device of encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |