CN109523658A - A kind of safety check diastema cryptographic methods, device and intelligent lock - Google Patents

A kind of safety check diastema cryptographic methods, device and intelligent lock Download PDF

Info

Publication number
CN109523658A
CN109523658A CN201811147308.3A CN201811147308A CN109523658A CN 109523658 A CN109523658 A CN 109523658A CN 201811147308 A CN201811147308 A CN 201811147308A CN 109523658 A CN109523658 A CN 109523658A
Authority
CN
China
Prior art keywords
password
diastema
digit
user
time delay
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811147308.3A
Other languages
Chinese (zh)
Other versions
CN109523658B (en
Inventor
余小龙
王宇
张腾龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tismart Technology Co Ltd
Original Assignee
Shenzhen Tismart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tismart Technology Co Ltd filed Critical Shenzhen Tismart Technology Co Ltd
Priority to CN201811147308.3A priority Critical patent/CN109523658B/en
Publication of CN109523658A publication Critical patent/CN109523658A/en
Application granted granted Critical
Publication of CN109523658B publication Critical patent/CN109523658B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00388Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks code verification carried out according to the challenge/response method
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00412Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/0042Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed
    • G07C2009/00476Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Storage Device Security (AREA)
  • Lock And Its Accessories (AREA)

Abstract

Safety check diastema cryptographic methods provided by the invention, the described method includes: the diastema password digit m of password key maximum quantity b, user password digit n and user's input are obtained, wherein the diastema password digit m=np+q, p are integer of the m divided by n, q is remainder, and p and q are positive integer;Time delay multiple z is determined using the password key maximum quantity b, the user password digit n, the diastema password digit m and preset relation;The required checking time tn that the user password digit n is verified is estimated according to selected terminal platform;When the diastema password for obtaining user's input is verified according to default time delay, determine that verifying is completed after the default time delay reaches, subsequent operation is executed according to verification result, by way of increasing and verifying time delay, in the case where not influencing user experience, the safety that diastema password uses is improved, the present invention further correspondingly provides safety check diastema encryption apparatus and intelligent lock.

Description

A kind of safety check diastema cryptographic methods, device and intelligent lock
Technical field
The present invention relates to field of information security technology, in particular to a kind of safety check diastema cryptographic methods, device and intelligence It can lockset.
Background technique
Currently, with the development of science and technology, in daily life password using more and more extensive, get home again from computer to mobile phone In coded lock, it is ubiquitous.For coded lock, the password of coded lock is fixed and invariable, if someone peep and The sequence of pressing of password has stealthily been write down, or when inputting password on code keyboard, there are a large amount of fingers above stationary digital Line or trace cause the correlated digital of password to be revealed.Password is revealed in this case in order to prevent, produces diastema password skill Art, i.e., in registered password above or below, the number inputted except any keying sequence obscures view as diastema password It listens, can effectively prevent registration password and remembered by malicious person, while again can normally-open door lock.
Diastema password compares fixed password, and security level is higher, it more difficult to be spied upon, password disclosure risk is smaller, arbitrarily Increase length, inputs password every time and change, the safety that user uses can be greatly increased.But diastema cryptographic technique can make The safety for obtaining user password reduces, and according to mathematical analysis, is collided by the password of Brute Force method, even if sufficiently small void Quasi- password digit, which will also greatly improve, cracks probability, and therefore, the safety of diastema password is also opposite.
Summary of the invention
The embodiment of the invention provides a kind of safety check diastema cryptographic methods, device and intelligent locks, when increasing verification The method prolonged makes in the case where not influencing user experience, and safe uses diastema cryptographic function.
In a first aspect, the present invention provides a kind of safety check diastema cryptographic methods, which comprises
The diastema password digit m of password key maximum quantity b, user password digit n and user's input are obtained, wherein institute Diastema password digit m=np+q is stated, p is integer of the m divided by n, and q is remainder, and p and q are positive integer;
Using the password key maximum quantity b, the user password digit n, the diastema password digit m and preset Relationship determines time delay multiple z;
The required checking time tn that the user password digit n is verified is estimated according to selected terminal platform;
It verifies when obtaining the diastema password that user inputs according to default time delay, is determined after the default time delay reaches Verifying is completed, and executes subsequent operation according to verification result.
Optionally, the preset relation are as follows:Institute Stating [] is round numbers to the right, described close using the password key maximum quantity b, the user password digit n, the diastema Code bit number m and preset relation determine time delay multiple z, comprising:
Using the password key maximum quantity b, the user password digit n, the diastema password digit m and preset Relationship is rounded to the right numerical value, and the time delay multiple z is rounded to the right numerical value greater than described.
Optionally, when the remainder q is greater than 0, the method also includes:
After n diastema passwords of every verification duplication check input n diastema password [z/ (p+1)] -1 time, by last time school Result is tested to be determined as approving result.
Optionally, when the remainder q is equal to 0, the method also includes:
After n diastema password of verification every for terminal duplication check input n diastema password [z/p] -1 time, by last Secondary check results are determined as approving result.
Optionally, described when the diastema password for obtaining user's input is verified according to default time delay, when described default Prolong and determine that verifying is completed after reaching, subsequent operation is executed according to verification result, comprising:
It completes to verify after verification z times of tn duration of time delay after each diastema Password Input finishes, if correct Prompt cipher is correct, prompt cipher mistake and re-enters if mistake.
Second aspect, the present invention provide a kind of safety check diastema encryption apparatus, and described device includes:
Acquiring unit, the diastema for obtaining password key maximum quantity b, user password digit n and user's input are close Code bit number m, wherein the diastema password digit m=np+q, p are integer of the m divided by n, q is remainder, and p and q are positive integer;
Processing unit, for utilizing the password key maximum quantity b, the user password digit n, the diastema password Digit m and preset relation determine time delay multiple z;
Processing unit is also used to estimate the required school that the user password digit n is verified according to selected terminal platform Test time tn;
Processing unit is also used to verify when the diastema password for obtaining user's input according to default time delay, to described default Time delay determines that verifying is completed after reaching, and executes subsequent operation according to verification result.
Optionally, the preset relation are as follows:Institute Stating [] is round numbers to the right, and the processing unit is specifically used for:
Using the password key maximum quantity b, the user password digit n, the diastema password digit m and preset Relationship is rounded to the right numerical value, and the time delay multiple z is rounded to the right numerical value greater than described.
Optionally, the processing unit is also used to repeat school after n diastema passwords of every verification when the remainder q is greater than 0 Test input n diastema password [z/ (p+1)] -1 time, by last time check results be determined as approval result.
Optionally, the processing unit is also used to when the remainder q is equal to 0, n diastema password of verification every for terminal Afterwards duplication check input n diastema password [z/p] -1 time, by last time check results be determined as approval result.
The third aspect, the present invention provide a kind of intelligent lock, have processor and memory, the processor is for executing The program of memory storage is stored with the program for executing such as above method in the memory.
As can be seen from the above technical solutions, the embodiment of the present invention has the advantage that
Safety check diastema cryptographic methods provided by the invention, which comprises acquisition password key maximum quantity b, User password digit n and user input diastema password digit m, wherein the diastema password digit m=np+q, p be m divided by The integer of n, q are remainder, and p and q are positive integer;Utilize the password key maximum quantity b, the user password digit n, described Diastema password digit m and preset relation determine time delay multiple z;The user password digit is estimated according to selected terminal platform The required checking time tn that n is verified;When the diastema password for obtaining user's input is verified according to default time delay, to described Default time delay determines that verifying is completed after reaching, and executes subsequent operation according to verification result, by way of increasing and verifying time delay, In the case where not influencing user experience, the safety that diastema password uses is improved, the present invention further correspondingly provides safety check Diastema encryption apparatus and intelligent lock equally can execute subsequent operation according to verification result, by the side for increasing verification time delay Formula improves the safety that diastema password uses in the case where not influencing user experience.
Detailed description of the invention
A kind of flow chart of embodiment of safety check diastema cryptographic methods provided by the invention when Fig. 1;
When Fig. 2 in a kind of embodiment of safety check diastema cryptographic methods provided by the invention probability curve emulation signal Figure;
A kind of structural block diagram of embodiment of safety check diastema encryption apparatus provided by the invention when Fig. 3.
Specific embodiment
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only The embodiment of a part of the invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people The model that the present invention protects all should belong in member's every other embodiment obtained without making creative work It encloses.
Description and claims of this specification and term " first ", " second ", " third ", " in above-mentioned attached drawing Four " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way Data be interchangeable under appropriate circumstances, so that the embodiments described herein can be in addition to illustrating herein or describing Sequence other than appearance is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that covering is non-exclusive Include, for example, the process, method, system, product or equipment for containing a series of steps or units are not necessarily limited to clearly arrange Those of out step or unit, but may include be not clearly listed or it is solid for these process, methods, product or equipment The other step or units having.
As shown in connection with fig. 1, a kind of safety check diastema cryptographic methods are provided in the embodiment of the present invention, which comprises
S101, the diastema password digit m for obtaining password key maximum quantity b, user password digit n and user's input, The wherein diastema password digit m=np+q, p are integer of the m divided by n, and q is remainder, and p and q are positive integer.
So-called diastema password can input the number except any keying sequence that is, in registered password above or below Word, to mislead the public, can effectively prevent registration password and remembered by malicious person, while again can be just normally opened as diastema password Door lock is opened, is common on the electronic lock and mobile phone using password as unlock verifying approach, method provided by the invention can answer With on intelligent door lock or intelligent terminal, to improve information security, password key maximum quantity b is to input in equipment for user The space digit of password, such as numeric keypad are 10, and letter is 26, and password key maximum quantity b is then 36, user password digit N is the practical true user password length of verification;The diastema password digit m of user's input is to allow the diastema password of input long Degree, by diastema password it is found that m >=n, and m=np+q, p are m divided by the integer of n, and q is remainder, it should be noted that for void The definition of position password, those of ordinary skill in the art are not it is to be appreciated that repeat them here this.
S102, using the password key maximum quantity b, the user password digit n, the diastema password digit m with And preset relation determines time delay multiple z.
Specifically, the preset relation are as follows:Institute Stating [] is round numbers to the right, utilizes the password key maximum quantity b, the user password digit n, diastema password position Number m and preset relation are rounded to the right numerical value, and the time delay multiple z is rounded to the right numerical value greater than described.
S103, the required checking time tn that the user password digit n is verified is estimated according to selected terminal platform.
When the remainder q is greater than 0, duplication check inputs n diastema password [z/ (p+ after n diastema passwords of every verification 1)] -1 time, last time check results are determined as to approve result.When the remainder q is equal to 0, verification n every for terminal After diastema password duplication check input n diastema password [z/p] -1 time, by last time check results be determined as approval result.
S104, when obtain user input diastema password verified according to default time delay, reach to the default time delay It determines that verifying is completed afterwards, subsequent operation is executed according to verification result.
It completes to verify after verification z times of tn duration of time delay after each diastema Password Input finishes, if correct Prompt cipher is correct, prompt cipher mistake and re-enters if mistake.
Safety check diastema cryptographic methods provided by the invention, which comprises acquisition password key maximum quantity b, User password digit n and user input diastema password digit m, wherein the diastema password digit m=np+q, p be m divided by The integer of n, q are remainder, and p and q are positive integer;Utilize the password key maximum quantity b, the user password digit n, described Diastema password digit m and preset relation determine time delay multiple z;The user password digit is estimated according to selected terminal platform The required checking time tn that n is verified;When the diastema password for obtaining user's input is verified according to default time delay, to described Default time delay determines that verifying is completed after reaching, and executes subsequent operation according to verification result, by way of increasing and verifying time delay, In the case where not influencing user experience, the safety that diastema password uses is improved.
For safety check diastema cryptographic methods provided by the invention, demonstrate,proved below by the test for carrying out safety It is bright.
For the random fixed digit password of user's input, attacker depends on fixed position by the probability of Brute Force Number.For example, for numeric keypad 0~9, user sets unlocking pin 6, then by enumerate crack successful probability be 10^ (- 6) is desired for 10^6, this is a bigger trial and error number for attacker.
In GA374-2001 electronic safety lock standard, size of key is defined, it is specified that using electronic code electricity Sub- theftproof lock A grades of size of keys should be no less than 10^5, and B grades of size of keys should be no less than 10^6.However the introducing of diastema password will so that Input length becomes larger, so that collision probability is promoted, and then reduces actually active size of key.
Definition b is Password Input space digit, and n is the practical true user password length of verification;M is the void for allowing to input Position Password Length, by diastema password it is found that m >=n, and m=np+q, p are m divided by the integer of n, and q is remainder;
It defines, the probability containing n user passwords is P in m virtual pins(b,m,n), then formula (1)
As shown in connection with fig. 2, because this is sufficiently small when n is larger, the function is similar compared with curve shape.Pass through Matlab, which is drawn, works as b=10, i.e., the probability curve (3 < n < 11,7 < m < 21) under numeric keypad, and m is coordinate, in n in probability curve It is poor with the safety of m diastema password when lesser, and this is current typical application scenarios, wherein 1, m it is bigger, collided Probability it is bigger, but probability is increased speed compared to slowing down, until collision probability levels off to 1.2, n is smaller, more dangerous, identical general The m digit needed under rate is also smaller.In view of being mainly 5 or 6 and being numeric keypad using n digit under reality Under, we list the collision probability under typical m number:
When m is smaller, such as table 1.
Table 1
When m is larger, such as table 2.
Table 2
As representative value m=20, n=5,16 times are promoted by collision probability.
As representative value m=260, n=5,276 times are promoted by collision probability.
Brute Force is unlocked the expected time
Setting user password length n is fixed, and key input space digit b is fixed, if the diastema password of i-th user input Length is then to open the number X expectation of lock:
WhereinFor formula (1)
The uncaging time for defining i-th user input is that then Brute Force opens the time Y expectation of lock are as follows:
In order to simplify processing, the input m that unlocks every time is seti, the distribution of ti is identical, thenti=tj=t, then expected time are as follows:
The P=b for not supporting commonly the keyboard of diastema password to unlock-n, i.e. the unlocking expected time is b-n×t。
From safety perspective, when the unlocking expected time of diastema password should not be below the unlocking of ordinary password keyboard Between, it may be assumed that
Note
When m is smaller, the value of Z such as table 3:
Table 3
When m is larger, the value of Z such as table 4.
Table 4
By comparison it can be found that 5 user keys of the support 20 diastema passwords using classics, proving and comparisom When time is greater than 16 times of commonly 6 passwords of verification, safety is suitable.
As shown in connection with fig. 3, correspondingly, the present invention provides a kind of safety check diastema encryption apparatus, and described device includes:
Acquiring unit 301, for obtaining the diastema of password key maximum quantity b, user password digit n and user's input Password digit m, wherein the diastema password digit m=np+q, p are integer of the m divided by n, q is remainder, and p and q are positive integer;
Processing unit 302, for utilizing the password key maximum quantity b, the user password digit n, the diastema Password digit m and preset relation determine time delay multiple z;
Processing unit 302 is also used to estimate the institute that the user password digit n is verified according to selected terminal platform Need checking time tn;
Processing unit 302 is also used to verify when the diastema password for obtaining user's input according to default time delay, to described Default time delay determines that verifying is completed after reaching, and executes subsequent operation according to verification result.
Optionally, the preset relation are as follows:Institute Stating [] is round numbers to the right, and the processing unit 302 is specifically used for:
Using the password key maximum quantity b, the user password digit n, the diastema password digit m and preset Relationship is rounded to the right numerical value, and the time delay multiple z is rounded to the right numerical value greater than described.
Optionally, the processing unit 302 is also used to when the remainder q is greater than 0, weight after n diastema passwords of every verification Resume classes test input n diastema password [z/ (p+1)] -1 time, by last time check results be determined as approval result.
Optionally, the processing unit 302 is also used to when the remainder q is equal to 0, n diastema of verification every for terminal After password duplication check input n diastema password [z/p] -1 time, by last time check results be determined as approval result.
Safety check diastema encryption apparatus provided by the invention, described device include: that acquiring unit obtains password key most Big quantity b, user password digit n and the diastema password digit m of user's input, wherein the diastema password digit m=np+q, P is integer of the m divided by n, and q is remainder, and p and q are positive integer;Processing unit utilizes the password key maximum quantity b, the use Family password digit n, the diastema password digit m and preset relation determine time delay multiple z, are estimated according to selected terminal platform The required checking time tn that the user password digit n is verified, when obtain user input diastema password according to it is default when Prolong and verified, determine that verifying is completed after the default time delay reaches, subsequent operation is executed according to verification result, passes through increase The mode of verification time delay improves the safety that diastema password uses in the case where not influencing user experience.
Correspondingly, a kind of intelligent lock is also provided in the embodiment of the present invention, there is processor and memory, the processor For executing the program of the memory storage, it is stored with for executing the program such as the above method, specifically in the memory Method is as follows:
The diastema password digit m of password key maximum quantity b, user password digit n and user's input are obtained, wherein institute Diastema password digit m=np+q is stated, p is integer of the m divided by n, and q is remainder, and p and q are positive integer;
Using the password key maximum quantity b, the user password digit n, the diastema password digit m and preset Relationship determines time delay multiple z;
The required checking time tn that the user password digit n is verified is estimated according to selected terminal platform;
It verifies when obtaining the diastema password that user inputs according to default time delay, is determined after the default time delay reaches Verifying is completed, and executes subsequent operation according to verification result.
Optionally, the preset relation are as follows:Institute Stating [] is round numbers to the right, described close using the password key maximum quantity b, the user password digit n, the diastema Code bit number m and preset relation determine time delay multiple z, comprising:
Using the password key maximum quantity b, the user password digit n, the diastema password digit m and preset Relationship is rounded to the right numerical value, and the time delay multiple z is rounded to the right numerical value greater than described.
Optionally, when the remainder q is greater than 0, the method also includes:
After n diastema passwords of every verification duplication check input n diastema password [z/ (p+1)] -1 time, by last time school Result is tested to be determined as approving result.
Optionally, when the remainder q is equal to 0, the method also includes:
After n diastema password of verification every for terminal duplication check input n diastema password [z/p] -1 time, by last Secondary check results are determined as approving result.
Optionally, described when the diastema password for obtaining user's input is verified according to default time delay, when described default Prolong and determine that verifying is completed after reaching, subsequent operation is executed according to verification result, comprising:
It completes to verify after verification z times of tn duration of time delay after each diastema Password Input finishes, if correct Prompt cipher is correct, prompt cipher mistake and re-enters if mistake.
Intelligent lock can be intelligent door lock, intelligent terminal etc., not limit this.
Intelligent lock provided by the invention, by way of increasing and verifying time delay, in the case where not influencing user experience, Improve the safety that diastema password uses.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, device and method can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit It divides, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or The mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, the indirect coupling of device or unit It closes or communicates to connect, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can It is completed with instructing relevant hardware by program, which can be stored in a computer readable storage medium, storage Medium may include: read-only memory (ROM, Read Only Memory), random access memory (RAM, Random Access Memory), disk or CD etc..
A kind of safety check diastema cryptographic methods provided by the present invention, device and intelligent lock have been carried out in detail above It introduces, for those of ordinary skill in the art, thought according to an embodiment of the present invention, in specific embodiment and application range Upper there will be changes, in conclusion the contents of this specification are not to be construed as limiting the invention.

Claims (10)

1. a kind of safety check diastema cryptographic methods, which is characterized in that the described method includes:
The diastema password digit m for obtaining password key maximum quantity b, user password digit n and user's input, wherein the void Position password digit m=np+q, p are integer of the m divided by n, and q is remainder, and p and q are positive integer;
Utilize the password key maximum quantity b, the user password digit n, the diastema password digit m and preset relation Determine time delay multiple z;
The required checking time tn that the user password digit n is verified is estimated according to selected terminal platform;
It is verified when obtaining the diastema password that user inputs according to default time delay, verifying is determined after the default time delay reaches It completes, subsequent operation is executed according to verification result.
2. safety check diastema cryptographic methods according to claim 1, which is characterized in that the preset relation are as follows:[] is round numbers to the right, described in the utilization Password key maximum quantity b, the user password digit n, the diastema password digit m and preset relation determine time delay multiple Z, comprising:
Utilize the password key maximum quantity b, the user password digit n, the diastema password digit m and preset relation It is rounded numerical value to the right, the time delay multiple z is rounded to the right numerical value greater than described.
3. safety check diastema cryptographic methods according to claim 1, which is characterized in that when the remainder q is greater than 0, The method also includes:
After n diastema passwords of every verification duplication check input n diastema password [z/ (p+1)] -1 time, will last time verification knot Fruit is determined as approving result.
4. safety check diastema cryptographic methods according to claim 1, which is characterized in that when the remainder q is equal to 0, The method also includes:
After n diastema password of verification every for terminal duplication check input n diastema password [z/p] -1 time, by last time school Result is tested to be determined as approving result.
5. safety check diastema cryptographic methods according to claim 1, which is characterized in that described to work as what acquisition user inputted Diastema password is verified according to default time delay, is determined that verifying is completed after the default time delay reaches, is held according to verification result Row subsequent operation, comprising:
It completes to verify after verification z times of tn duration of time delay after each diastema Password Input finishes, be prompted if correct Password is correct, prompt cipher mistake and re-enters if mistake.
6. a kind of safety check diastema encryption apparatus, which is characterized in that described device includes:
Acquiring unit, for obtaining the diastema password position of password key maximum quantity b, user password digit n and user's input Number m, wherein the diastema password digit m=np+q, p are integer of the m divided by n, q is remainder, and p and q are positive integer;
Processing unit, for utilizing the password key maximum quantity b, the user password digit n, the diastema password digit M and preset relation determine time delay multiple z;
When processing unit is also used to estimate the required verification that the user password digit n is verified according to selected terminal platform Between tn;
Processing unit is also used to verify when the diastema password for obtaining user's input according to default time delay, to the default time delay It determines that verifying is completed after reaching, subsequent operation is executed according to verification result.
7. safety check diastema encryption apparatus according to claim 6, which is characterized in that the preset relation are as follows:[] is round numbers to the right, the processing unit It is specifically used for:
Utilize the password key maximum quantity b, the user password digit n, the diastema password digit m and preset relation It is rounded numerical value to the right, the time delay multiple z is rounded to the right numerical value greater than described.
8. safety check diastema encryption apparatus according to claim 6, which is characterized in that the processing unit is also used to work as When the remainder q is greater than 0, duplication check input n diastema password [z/ (p+1)] -1 time after n diastema passwords of every verification will most A check results are determined as approving result afterwards.
9. safety check diastema encryption apparatus according to claim 6, which is characterized in that the processing unit is also used to work as When the remainder q is equal to 0, duplication check input n diastema password [z/p] -1 time after n diastema password of verification every for terminal, Last time check results are determined as to approve result.
10. a kind of intelligent lock, which is characterized in that there is processor and memory, the processor is for executing the storage The program of device storage, the program for executing such as any one of claims 1 to 5 the method is stored in the memory.
CN201811147308.3A 2018-09-29 2018-09-29 Method and device for safely checking virtual password and intelligent lockset Active CN109523658B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811147308.3A CN109523658B (en) 2018-09-29 2018-09-29 Method and device for safely checking virtual password and intelligent lockset

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811147308.3A CN109523658B (en) 2018-09-29 2018-09-29 Method and device for safely checking virtual password and intelligent lockset

Publications (2)

Publication Number Publication Date
CN109523658A true CN109523658A (en) 2019-03-26
CN109523658B CN109523658B (en) 2021-01-26

Family

ID=65772408

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811147308.3A Active CN109523658B (en) 2018-09-29 2018-09-29 Method and device for safely checking virtual password and intelligent lockset

Country Status (1)

Country Link
CN (1) CN109523658B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1773414A (en) * 2004-11-12 2006-05-17 上海电气集团股份有限公司 Cipher safe protecting method for preventing intelligent device input cipher from being decrypted
CN101227275A (en) * 2008-02-13 2008-07-23 刘海云 Enciphering method for combining accidental enciphering and exhaust algorithm decipher
CN101610154A (en) * 2009-07-17 2009-12-23 王聪 Novel cipher encrypting method
CN103051454A (en) * 2012-12-19 2013-04-17 天地融科技股份有限公司 Electronic equipment and password authentication method thereof
CN105959948A (en) * 2016-04-26 2016-09-21 上海斐讯数据通信技术有限公司 Wireless private brute force cracking prevention method and wireless private brute force cracking prevention device
RU2015108618A (en) * 2015-03-11 2016-09-27 Евгений Пантелеевич Сухоносов Authenticated Password Authentication Method
DE102016201198A1 (en) * 2016-01-27 2017-07-27 Gerd Reime Safety and / or locking system and associated method
CN107092839A (en) * 2016-02-17 2017-08-25 深圳市维申斯科技有限公司 The antitheft input method of code keypad based on random diastema password
CN107195039A (en) * 2017-05-11 2017-09-22 广东汇泰龙科技有限公司 It is a kind of to prevent the intelligent cloud lock system and unlocking method of peep of cipher

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1773414A (en) * 2004-11-12 2006-05-17 上海电气集团股份有限公司 Cipher safe protecting method for preventing intelligent device input cipher from being decrypted
CN101227275A (en) * 2008-02-13 2008-07-23 刘海云 Enciphering method for combining accidental enciphering and exhaust algorithm decipher
CN101610154A (en) * 2009-07-17 2009-12-23 王聪 Novel cipher encrypting method
CN103051454A (en) * 2012-12-19 2013-04-17 天地融科技股份有限公司 Electronic equipment and password authentication method thereof
RU2015108618A (en) * 2015-03-11 2016-09-27 Евгений Пантелеевич Сухоносов Authenticated Password Authentication Method
DE102016201198A1 (en) * 2016-01-27 2017-07-27 Gerd Reime Safety and / or locking system and associated method
CN107092839A (en) * 2016-02-17 2017-08-25 深圳市维申斯科技有限公司 The antitheft input method of code keypad based on random diastema password
CN105959948A (en) * 2016-04-26 2016-09-21 上海斐讯数据通信技术有限公司 Wireless private brute force cracking prevention method and wireless private brute force cracking prevention device
CN107195039A (en) * 2017-05-11 2017-09-22 广东汇泰龙科技有限公司 It is a kind of to prevent the intelligent cloud lock system and unlocking method of peep of cipher

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
魏雅: "基于单片机的电子密码锁设计", 《电子设计工程》 *

Also Published As

Publication number Publication date
CN109523658B (en) 2021-01-26

Similar Documents

Publication Publication Date Title
CN104205721B (en) The adaptive authentication method of context aware and device
CN105320864A (en) Method and apparatus for processing event operation
CN101436935A (en) PIN code verification method through fingerprint identification
CN107612880A (en) One kind applies access method and device
CN104536686A (en) Screen unlocking method and device
CN101072100A (en) Authenticating system and method utilizing reliable platform module
CN103971239A (en) Verification method and device
CN105809007A (en) Privacy protection method and device
CN105929974A (en) Password input management method and mobile terminal
CN103034417A (en) Unlocking method for touch screen and terminal equipment
CN107295016A (en) Auth method and device
CN106603241A (en) Unlocking method, apparatus and electronic device
CN108647510A (en) Application program access method and device
CN105868601A (en) Pressure touch screen-based electronic terminal, encryption unlocking controller and method
Buriro et al. SWIPEGAN: swiping data augmentation using generative adversarial networks for smartphone user authentication
CN105224848B (en) A kind of equipment authentication method, apparatus and system
Karim et al. Choosing the right MFA method for online systems: A comparative analysis
CN105590044A (en) Information authentication method and apparatus
CN110516427B (en) Terminal user identity authentication method and device, storage medium and computer equipment
CN109523658A (en) A kind of safety check diastema cryptographic methods, device and intelligent lock
CN105897708A (en) Information protection method and mobile terminal
CN103856331B (en) A kind of signature authentication method and system
CN109147120A (en) Authority processing method and device
CN104615267A (en) Password input management method, system and electronic device
CN107426163A (en) A kind of method and device of encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant