CN109658545A - A kind of cipher set-up method and network access system of network lock - Google Patents

A kind of cipher set-up method and network access system of network lock Download PDF

Info

Publication number
CN109658545A
CN109658545A CN201810284667.7A CN201810284667A CN109658545A CN 109658545 A CN109658545 A CN 109658545A CN 201810284667 A CN201810284667 A CN 201810284667A CN 109658545 A CN109658545 A CN 109658545A
Authority
CN
China
Prior art keywords
operation code
network
network lock
character string
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810284667.7A
Other languages
Chinese (zh)
Inventor
金玉玲
马强业
高述贤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zhongtai Intelligent Iot Technology Co Ltd
Original Assignee
Shenzhen Zhongtai Intelligent Iot Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhongtai Intelligent Iot Technology Co Ltd filed Critical Shenzhen Zhongtai Intelligent Iot Technology Co Ltd
Priority to CN201810284667.7A priority Critical patent/CN109658545A/en
Publication of CN109658545A publication Critical patent/CN109658545A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00825Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Storage Device Security (AREA)

Abstract

The application is suitable for field of communication technology, provides the cipher set-up method and network access system of a kind of network lock, comprising: receives the cryptographic parameter that user is sent by terminal device;Operation code corresponding with the cryptographic parameter is generated according to the cryptographic parameter;The operation code of generation is returned into the terminal device, the operation code is used to that password to be arranged for the network lock.Solve the problems, such as that password can not be arranged in the case where no connection network in network lock by this method.

Description

A kind of cipher set-up method and network access system of network lock
Technical field
This application involves the cipher set-up methods and network access system of field of communication technology more particularly to a kind of network lock System.
Background technique
Network lock is a kind of equipment that switch password can be arranged by network remote, its working principle is that, user passes through hand Machine App or web page set password, App or web page and password are sent to server, and password is issued to by server again Network lock completes the operation of password setting with this.
Currently, in user setting password, must be requested that network lock connects network.If place environment do not have network or Network status is bad, then will lead to password setting function and be not available, seriously affected user experience.
Summary of the invention
In view of this, the embodiment of the present application provides the cipher set-up method and network access system of a kind of network lock, with Solve the problems, such as that password can not be arranged in the case where no connection network in network lock in the prior art.
The first aspect of the embodiment of the present application provides a kind of cipher set-up method of network lock, is applied to network access system Server in system, comprising:
Receive the cryptographic parameter that user is sent by terminal device;
Operation code corresponding with the cryptographic parameter is generated according to the cryptographic parameter;
The operation code of generation is returned into the terminal device, the operation code is used to that password to be arranged for the network lock.
The second aspect of the embodiment of the present application provides a kind of cipher set-up method of network lock, is applied to the application and implements Network lock in network access system described in example first aspect, comprising:
The operation code of user's input is received, and the operation code is parsed to obtain corresponding with the operation code Cryptographic parameter;
According to the cryptographic parameter parsed, password is set.
The third aspect of the embodiment of the present application provides a kind of server, including memory, processor and is stored in institute The computer program that can be run in memory and on the processor is stated, the processor executes real when the computer program The step of the method that existing the embodiment of the present application first aspect provides.
The fourth aspect of the embodiment of the present application provides a kind of network lock, including memory, processor and is stored in institute The computer program that can be run in memory and on the processor is stated, the processor executes real when the computer program The step of the method that existing the embodiment of the present application second aspect provides.
5th aspect of the embodiment of the present application provides a kind of computer readable storage medium, the computer-readable storage Media storage has computer program, and the computer program realizes the embodiment of the present application when being executed by one or more processors The step of the method that one side and/or second aspect provide.
6th aspect of the embodiment of the present application provides a kind of network access system, comprising:
The network lock of server, the offer of at least one fourth aspect that the third aspect provides, each network lock and the clothes Business device keeps the synchronization of the cryptographic parameter.
Existing beneficial effect is the embodiment of the present application compared with prior art:
The cryptographic parameter that the application is sent by receiving user by terminal device;According to cryptographic parameter generation and institute State the corresponding operation code of cryptographic parameter;The operation code of generation is returned into the terminal device, the operation code is for being described Password is arranged in network lock;And the operation code by receiving user's input, to the operation code parsed to obtain with it is described The corresponding cryptographic parameter of operation code;According to the cryptographic parameter parsed, password is set.It is efficiently solved by the above method The problem of in the case where no connection network password can not be arranged in network lock.
Detailed description of the invention
It in order to more clearly explain the technical solutions in the embodiments of the present application, below will be to embodiment or description of the prior art Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only some of the application Embodiment for those of ordinary skill in the art without any creative labor, can also be according to these Attached drawing obtains other attached drawings.
Fig. 1 is the schematic block diagram of network access system provided by the embodiments of the present application;
Fig. 2 is the implementation process schematic diagram of the cipher set-up method of network lock provided by the embodiments of the present application;
Fig. 3 is the implementation process schematic diagram of the cipher set-up method for the network lock that the another embodiment of the application provides;
Fig. 4 is a kind of schematic diagram of server provided by the embodiments of the present application;
Fig. 5 is a kind of schematic diagram of network lock provided by the embodiments of the present application;
Fig. 6 is the operational flowchart of the cipher set-up method of network lock provided by the embodiments of the present application.
Specific embodiment
In being described below, for illustration and not for limitation, the tool of such as particular system structure, technology etc is proposed Body details, so as to provide a thorough understanding of the present application embodiment.However, it will be clear to one skilled in the art that there is no these specific The application also may be implemented in the other embodiments of details.In other situations, it omits to well-known system, device, electricity The detailed description of road and method, so as not to obscure the description of the present application with unnecessary details.
It should be appreciated that ought use in this specification and in the appended claims, term " includes " instruction is described special Sign, entirety, step, operation, the presence of element and/or component, but be not precluded one or more of the other feature, entirety, step, Operation, the presence or addition of element, component and/or its set.
It is also understood that mesh of the term used in this present specification merely for the sake of description specific embodiment And be not intended to limit the application.As present specification and it is used in the attached claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singular, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in present specification and the appended claims is Refer to any combination and all possible combinations of one or more of associated item listed, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt Be construed to " when ... " or " once " or " in response to determination " or " in response to detecting ".Similarly, phrase " if it is determined that " or " if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In order to illustrate technical solution described herein, the following is a description of specific embodiments.
Fig. 1 is the schematic block diagram of network access system provided by the embodiments of the present application, for ease of description, illustrate only with The relevant part of the embodiment of the present application.As described in Figure, the network access system includes:
Server, at least one network lock, each network lock keep the synchronous of the cryptographic parameter with the server.
Network access system and terminal device are shown in Fig. 1, wherein network access system includes a server, until A few network lock.Terminal device is connect with the server in network access system, and with the network lock in network access system Connection.
In practical applications, the cipher set-up method of network lock described herein needs that terminal device is cooperated to use. The terminal device can be the terminal device for being equipped with default application software, such as mobile phone, iPad, computer, Portable hand Computer, bracelet etc..Wherein, default application software can be the application software for remote control network lock.It needs to illustrate It is to be one embodiment of network access system in the application shown in Fig. 1, specific limit is not done to the quantity of network lock It is fixed.One terminal device can be connect with a network lock, can also be connect with multiple network locks.Server can connect at least One mobile device.
Illustratively, user inputs cryptographic parameter in terminal device, and terminal device will by connecting with server communication Cryptographic parameter is sent to server, and server generates corresponding operation code according to cryptographic parameter, and operation code is returned to terminal Equipment, user input network lock according to the operation code shown on terminal device, by the operation code, and network lock inputs user Operation code is parsed to obtain cryptographic parameter, and carries out password setting according to the cryptographic parameter parsed.It should be noted that with After the operation code shown on terminal device is seen at family, operation code directly can be inputted into network lock, it can also be defeated by operation code Enter terminal device, and network lock is sent to by terminal device, is not specifically limited here.
Wherein, server and the concrete function of network lock can be found in the associated description of Fig. 2, Fig. 3 corresponding embodiment.
Switch password can be arranged by network remote in network lock at present, necessarily require network lock to connect when password is arranged Server, user set password, App or web page by cell phone application or web page and password are sent to server, clothes Password is issued to network lock again by business device, and the password setting operation of network lock is completed with this.It can not connect with server in network lock In the case where connecing, can not usually password setting be carried out to network lock, not can guarantee the cryptosync of server and network lock.This Shen Please network access system in embodiment, network lock do not need to connect with server, can realize same with the password of server Step.
Fig. 2 is the implementation process schematic diagram of the cipher set-up method of network lock provided by the embodiments of the present application, and the application is real Example is applied applied to the server in the network access system, this method as shown in the figure may comprise steps of:
Step S201 receives the cryptographic parameter that user is sent by terminal device.
Step S202 generates operation code corresponding with the cryptographic parameter according to the cryptographic parameter.
The operation code of generation is returned to the terminal device by step S203, and the operation code is used to be the network lock Password is set.
In one embodiment, the cryptographic parameter includes:
The effective time of the password of the network lock, the access times of the password, the password.
In practical applications, cryptographic parameter includes but is not limited to the above-mentioned parameters listed, and is not specifically limited herein.
It is the operational flowchart of the cipher set-up method of network lock provided by the embodiments of the present application referring to Fig. 6, Fig. 6.Step S201-S203 describes the interactive process between terminal device and server.
It is in another embodiment, described that operation code corresponding with the cryptographic parameter is generated according to the cryptographic parameter, Include:
The cryptographic parameter is parsed to obtain the first instruction character string.
One is randomly selected from preset transfer algorithm and is used as target transfer algorithm, and according to the target transfer algorithm The first instruction character string is carried out to be converted to the second instruction character string, the second instruction character string includes the target The mark of transfer algorithm.
According to predetermined encryption algorithm, the second instruction character string is encrypted, operation code is obtained.
In practical applications, the cryptographic parameter that server receiving terminal equipment is sent, it is necessary first to which cryptographic parameter is carried out Parsing, because cryptographic parameter is user by terminal device input, meets the parameter of user language, such as natural language, still Cryptographic parameter tends not to directly be identified by server, that is, machine language is not belonging to, so first parse by cryptographic parameter To the first instruction character string, the first instruction character string can be the machine languages such as binary code, not do specific limit herein It is fixed.In one embodiment, terminal device can be encrypted the cryptographic parameter that user inputs to obtain encrypted password ginseng Number, after server receives encrypted cryptographic parameter, first cryptographic parameter is decrypted, then to the cryptographic parameter after decryption into Row parsing obtains the first instruction character string.
It is stored in advance in the server there are many transfer algorithm, server can be random from pre-stored transfer algorithm A kind of transfer algorithm is chosen the first instruction character string convert as target transfer algorithm, and according to target transfer algorithm To the second instruction character string.Illustratively, the second instruction character string can be with " * " beginning, and back is 0~9 number composition Character string is not specifically limited herein.It include the mark of target transfer algorithm in the second instruction character string.Illustratively, It can be the mark of target transfer algorithm taking human as the 1st after presetting No. *, it is assumed that the second instruction character string is * 123456789, the 1st after No. * is 1, then it represents that target transfer algorithm is that first in pre-stored transfer algorithm turns Scaling method.It here is an example of the mark of target transfer algorithm in the second instruction character string, not to mark character, mark Knowledge method is specifically limited.Wherein, first, second here is only intended to distinguish different instruction character strings, is not used to count Number, specifically, the first instruction character string is used to indicate the instruction character by server parsing but the conversion of unconverted algorithm String, the second instruction character string are used to indicate the instruction character string by transfer algorithm conversion.Certainly, to the first instruction character string Before being converted, the first instruction character string can also be formatted, being converted to the format of the first instruction character string can The format identified by target transfer algorithm.
After obtaining the second instruction character string, the second instruction character string is encrypted according to predetermined encryption algorithm, is obtained Operation code.Wherein, predetermined encryption algorithm can be artificial preset, can be and is stored in advance in the server.
The embodiment of the present application receives the cryptographic parameter that user is sent by terminal device, and so that server is obtained user will The cryptographic parameter of the network lock of setting;Operation code corresponding with the cryptographic parameter, the behaviour are generated according to the cryptographic parameter Make code generating process have passed through algorithm conversion and predetermined encryption algorithm encryption, that is, have passed through and encrypt twice, safety compared with It is high;The operation code of generation is returned into the terminal device, the operation code is used to that password to be arranged for the network lock, makes terminal Equipment can receive operation code.
Fig. 3 is the implementation process schematic diagram of the cipher set-up method for the network lock that the another embodiment of the application provides, this Shen Please embodiment be applied to the network lock in the network access system, this method as shown in the figure may comprise steps of:
Step S301, receives the operation code of user's input, and is parsed to obtain and the behaviour to the operation code Make the corresponding cryptographic parameter of code.
Password is arranged according to the cryptographic parameter parsed in step S302.
It is the operational flowchart of the cipher set-up method of network lock provided by the embodiments of the present application referring to Fig. 6, Fig. 6.Step S301-S302 describes the interactive process between terminal device and network lock.
In one embodiment, described that the operation code is parsed to obtain password ginseng corresponding with the operation code Number, comprising:
The operation code is decrypted according to default decipherment algorithm to obtain the second instruction character string.
The target transfer algorithm is obtained, and the second instruction character string is turned based on the target transfer algorithm It gets in return to the first instruction character string.
Concatenate into the cryptographic parameter based on first instruction character.
In practical applications, default decipherment algorithm is corresponding with predetermined encryption algorithm, in other words, utilizes default solution Close algorithm can be decrypted the information encrypted using predetermined encryption algorithm.Default decipherment algorithm is pre-stored in network lock In.Illustratively, server by utilizing predetermined encryption algorithm A is encrypted to obtain operation code, network lock to the second instruction character string After receiving operation code, operation code is decrypted using pre-stored default decipherment algorithm A '.It can be only pre- in server A predetermined encryption algorithm is first stored, a default decipherment algorithm is accordingly also only stored in advance in network lock;Certainly, in server Multiple predetermined encryption algorithms can also be stored in advance, network lock can also accordingly store multiple default decipherment algorithms, operation code In include preset characters, preset characters are used to indicate the mark of predetermined encryption algorithm, in this way, network lock receives operation code Afterwards, the preset characters in operation code are obtained, predetermined encryption algorithm used in server can be obtained according to preset characters, in turn Choose default decipherment algorithm corresponding with predetermined encryption algorithm used in server.
After carrying out being converted to the first instruction character string to the second instruction character string according to target transfer algorithm, due to First instruction character string is machine language, is generally inconvenient to be recognized by the user, so needing to be converted to the first instruction character string The natural language that can be recognized by the user, i.e. cryptographic parameter.After according to cryptographic parameter, password is set, setting result can also be returned Back to terminal device, make user's awareness network lock cipher update status.
It is in another embodiment, described to obtain the target transfer algorithm, comprising:
The mark of target transfer algorithm is obtained from the second instruction character string.
Based on the mark of the target transfer algorithm obtained from the second instruction character string, from preset transfer algorithm Obtain target transfer algorithm.
In practical applications, include the mark of target transfer algorithm in the second instruction character string, be based on from the second coding line The mark of the target transfer algorithm obtained in symbol string, obtains target transfer algorithm from preset transfer algorithm.It is specific how The process for obtaining target transfer algorithm can be found in the embodiment of step S202.
The embodiment of the present application receives the operation code of user's input, so that network lock is in the case where no connection network The cryptographic parameter for needing to be arranged can be got;And the operation code is parsed to obtain password corresponding with the operation code Password is arranged according to the cryptographic parameter parsed, so that network lock with server the case where not being attached in parameter Under, the synchronous of password can be kept with server, enhance the applicability of network lock cipher setting;In addition, by operation The secondary decryption of code, enhances the safety of password.
Embodiment shown in Fig. 3 and embodiment shown in Fig. 2 are the cipher set-up methods to network lock from different angles It is described, Fig. 2 the embodiment described is described using server as executing subject, and embodiment shown in Fig. 3 is with net Network lock is described as executing subject.Pass through the method in the embodiment of the present application, it is ensured that network lock is in not connected network In the case where with server keep password setting information it is consistent, thus reduce because in network lock and server password setting not Consistent bring complexity and security risk.In practical applications, it is related to method in the application Fig. 2, Fig. 3 embodiment not only to fit Password for network lock is arranged, i.e., network lock keeps the synchronous of password with server in the case where not connected network, may be used also Make to be suitable for other information for needing network lock synchronous with server holding.In other words, feelings of the network lock in not connected network Under condition, by the technical solution in the embodiment of the present application, not only the synchronous of password can be kept with server, it can also be with service Device keeps the synchronization of the other information in addition to password.If network lock only to be needed to the type of the information synchronous with server holding It is replaced, still within the scope of protection of this application.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present application constitutes any limit It is fixed.
Fig. 4 is a kind of schematic block diagram of server provided by the embodiments of the present application.As shown in figure 4, the service of the embodiment Device 4 includes: one or more processors 40, memory 41 and is stored in the memory 41 and can be in the processor 40 The computer program 42 of upper operation.The processor 40 realizes above-mentioned each data communication side when executing the computer program 42 Step in method embodiment, such as step S201 to S203 shown in Fig. 2.
The computer program 42 can be divided into one or more module/units, and one or more of modules/ Unit is stored in the memory 41, and is executed by the processor 40, to complete the application.One or more of moulds Block/unit can be the series of computation machine program instruction section that can complete specific function, the instruction segment by describe it is described based on Implementation procedure of the calculation machine program 42 in the relay node 4.For example, the computer program 42 can be divided into reception list Member, generation unit, return unit.
Receiving unit, the cryptographic parameter sent for receiving user by terminal device.
Generation unit, for generating operation code corresponding with the cryptographic parameter according to the cryptographic parameter.
Return unit, for the operation code of generation to be returned to the terminal device, the operation code is used to be the net Network lock setting password.
Wherein, the cryptographic parameter includes:
The effective time of the password of the network lock, the access times of the password, the password.
Optionally, the generation unit includes:
Parsing module obtains the first instruction character string for being parsed to the cryptographic parameter.
Conversion module is used as target transfer algorithm for randomly selecting one from preset transfer algorithm, and according to institute Target transfer algorithm is stated the first instruction character string is carried out to be converted to the second instruction character string, second instruction character String includes the mark of the target transfer algorithm.
Encrypting module, for encrypting, being operated to the second instruction character string according to predetermined encryption algorithm Code.
Fig. 5 is a kind of schematic block diagram of network lock provided by the embodiments of the present application.As shown in figure 5, the network of the embodiment Lock 5 includes: one or more processors 50, memory 51 and is stored in the memory 51 and can be in the processor 50 The computer program 52 of upper operation.The processor 50 realizes above-mentioned each data communication side when executing the computer program 52 Step in method embodiment, such as step S301 to S303 shown in Fig. 3.
The computer program 52 can be divided into one or more module/units, and one or more of modules/ Unit is stored in the memory 51, and is executed by the processor 50, to complete the application.One or more of moulds Block/unit can be the series of computation machine program instruction section that can complete specific function, the instruction segment by describe it is described based on Implementation procedure of the calculation machine program 52 in the terminal node 4.For example, the computer program 42 can be divided into parsing list Member, setting unit.
Resolution unit for receiving the operation code of user's input, and is parsed to obtain and institute to the operation code State the corresponding cryptographic parameter of operation code.
Setting unit, for password to be arranged according to the cryptographic parameter parsed.
Optionally, the resolution unit includes:
Deciphering module obtains the second instruction character string for the operation code to be decrypted according to default decipherment algorithm.
Module is obtained, is referred to for obtaining the target transfer algorithm, and based on the target transfer algorithm to described second Character string is enabled to carry out being converted to the first instruction character string.
Generation module, for concatenating into the cryptographic parameter based on first instruction character.
Optionally, the acquisition module includes:
Labeling submodule is obtained, for obtaining the mark of target transfer algorithm from the second instruction character string.
Acquisition algorithm submodule, for the mark based on the target transfer algorithm obtained from the second instruction character string Know, target transfer algorithm is obtained from preset transfer algorithm.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing The all or part of function of description.Each functional unit in embodiment, module can integrate in one processing unit, can also To be that each unit physically exists alone, can also be integrated in one unit with two or more units, it is above-mentioned integrated Unit both can take the form of hardware realization, can also realize in the form of software functional units.In addition, each function list Member, the specific name of module are also only for convenience of distinguishing each other, the protection scope being not intended to limit this application.Above system The specific work process of middle unit, module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
The server/network lock includes but are not limited to processor, memory.It will be understood by those skilled in the art that Fig. 4/5 are only an example of server/network lock, do not constitute to the restriction of relay node/terminal node, may include Than illustrating more or fewer components, certain components or different components, such as the relay node/terminal are perhaps combined Node can also include input equipment, output equipment, network access equipment, bus etc..
Alleged processor can be central processing unit (Central Processing Unit, CPU), can also be it His general processor, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor Deng.
The memory can be the internal storage unit of server/network lock, such as server/network lock is hard Disk or memory.The memory is also possible to the External memory equipment of the server/network lock, such as the server/net Network locks the plug-in type hard disk of outfit, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Further, the memory can also both include the server/ The internal storage unit of network lock also includes External memory equipment.The memory is for storing the computer program and institute State other programs and data needed for terminal device.The memory, which can be also used for temporarily storing, have been exported or will The data of output.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodiment The part of load may refer to the associated description of other embodiments.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed Scope of the present application.
In embodiment provided herein, it should be understood that disclosed device/terminal device and method, it can be with It realizes by another way.For example, device described above/terminal device embodiment is only schematical, for example, institute The division of module or unit is stated, only a kind of logical function partition, there may be another division manner in actual implementation, such as Multiple units or components can be combined or can be integrated into another system, or some features can be ignored or not executed.Separately A bit, shown or discussed mutual coupling or direct-coupling or communication connection can be through some interfaces, device Or the INDIRECT COUPLING or communication connection of unit, it can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or In use, can store in a computer readable storage medium.Based on this understanding, the application realizes above-mentioned implementation All or part of the process in example method, can also instruct relevant hardware to complete, the meter by computer program Calculation machine program can be stored in a computer readable storage medium, the computer program when being executed by processor, it can be achieved that on The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generation Code can be source code form, object identification code form, executable file or certain intermediate forms etc..The computer-readable medium It may include: any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic that can carry the computer program code Dish, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that described The content that computer-readable medium includes can carry out increasing appropriate according to the requirement made laws in jurisdiction with patent practice Subtract, such as in certain jurisdictions, according to legislation and patent practice, computer-readable medium do not include be electric carrier signal and Telecommunication signal.
Embodiment described above is only to illustrate the technical solution of the application, rather than its limitations;Although referring to aforementioned reality Example is applied the application is described in detail, those skilled in the art should understand that: it still can be to aforementioned each Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified Or replacement, the spirit and scope of each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution should all Comprising within the scope of protection of this application.

Claims (10)

1. a kind of cipher set-up method of network lock, which is characterized in that applied to the server in network access system, the net Network lock cipher set-up method include:
Receive the cryptographic parameter that user is sent by terminal device;
Operation code corresponding with the cryptographic parameter is generated according to the cryptographic parameter;
The operation code of generation is returned into the terminal device, the operation code is used to that password to be arranged for the network lock.
2. the cipher set-up method of network lock as described in claim 1, which is characterized in that the cryptographic parameter includes:
The effective time of the password of the network lock, the access times of the password, the password.
3. the cipher set-up method of network lock as claimed in claim 1 or 2, which is characterized in that described to be joined according to the password Number generates operation code corresponding with the cryptographic parameter, comprising:
The cryptographic parameter is parsed to obtain the first instruction character string;
One is randomly selected from preset transfer algorithm and is used as target transfer algorithm, and according to the target transfer algorithm to institute It states the first instruction character string to carry out being converted to the second instruction character string, the second instruction character string is converted comprising the target The mark of algorithm;
According to predetermined encryption algorithm, the second instruction character string is encrypted, operation code is obtained.
4. a kind of cipher set-up method of network lock, which is characterized in that be applied to net as described in any one of claims 1 to 3 The cipher set-up method of network lock in network access control system, the network lock includes:
The operation code of user's input is received, and the operation code is parsed to obtain password corresponding with the operation code Parameter;
According to the cryptographic parameter parsed, password is set.
5. the cipher set-up method of network lock as claimed in claim 4, which is characterized in that described to be solved to the operation code Analysis obtains cryptographic parameter corresponding with the operation code, comprising:
The operation code is decrypted according to default decipherment algorithm to obtain the second instruction character string;
The target transfer algorithm is obtained, and the second instruction character string convert based on the target transfer algorithm To the first instruction character string;
Concatenate into the cryptographic parameter based on first instruction character.
6. the cipher set-up method of network lock as claimed in claim 5, which is characterized in that described to obtain the target conversion calculation Method, comprising:
The mark of target transfer algorithm is obtained from the second instruction character string;
Based on the mark of the target transfer algorithm obtained from the second instruction character string, obtained from preset transfer algorithm Target transfer algorithm.
7. a kind of server, including memory, processor and storage can transport in the memory and on the processor Capable computer program, which is characterized in that the processor realizes that claims 1 to 3 such as is appointed when executing the computer program The step of one the method.
8. a kind of network lock, including memory, processor and storage can transport in the memory and on the processor Capable computer program, which is characterized in that the processor realizes such as claim 4 to 6 times when executing the computer program The step of one the method.
9. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists In when the computer program is executed by processor the step of any one of such as claims 1 to 3 of realization the method and/or such as The step of any one of claim 4 to 6 the method.
10. a kind of network access system characterized by comprising
As claimed in claim 7 server, at least one network lock as claimed in claim 8, each network lock with it is described Server keeps the synchronization of the cryptographic parameter.
CN201810284667.7A 2018-04-02 2018-04-02 A kind of cipher set-up method and network access system of network lock Pending CN109658545A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810284667.7A CN109658545A (en) 2018-04-02 2018-04-02 A kind of cipher set-up method and network access system of network lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810284667.7A CN109658545A (en) 2018-04-02 2018-04-02 A kind of cipher set-up method and network access system of network lock

Publications (1)

Publication Number Publication Date
CN109658545A true CN109658545A (en) 2019-04-19

Family

ID=66110141

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810284667.7A Pending CN109658545A (en) 2018-04-02 2018-04-02 A kind of cipher set-up method and network access system of network lock

Country Status (1)

Country Link
CN (1) CN109658545A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110766840A (en) * 2019-10-12 2020-02-07 中国银行股份有限公司 Access control password setting method and device
CN110853194A (en) * 2019-11-14 2020-02-28 广东科徕尼智能科技有限公司 Sound setting method, intelligent lock and storage medium
CN113536285A (en) * 2020-04-13 2021-10-22 成都鼎桥通信技术有限公司 Special password encryption method and device for terminal equipment
CN116527258A (en) * 2023-06-30 2023-08-01 深圳市旭子科技有限公司 Unlocking method, device, equipment and storage medium of coded lock

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102412967A (en) * 2011-09-29 2012-04-11 用友软件股份有限公司 Data transmission system and method
CN105225304A (en) * 2014-05-30 2016-01-06 由田新技股份有限公司 Access control device and registration system and method thereof
CN107067502A (en) * 2016-12-28 2017-08-18 江苏启泰物联网科技有限公司 It is a kind of can remotely modifying door lock password method
CN107274532A (en) * 2017-07-11 2017-10-20 广东能兴科技发展有限公司 The temporary password gate control system that encryption parameter dynamically updates
CN107492173A (en) * 2017-08-15 2017-12-19 青岛易方德物联科技有限公司 A kind of cloud password access control system and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102412967A (en) * 2011-09-29 2012-04-11 用友软件股份有限公司 Data transmission system and method
CN105225304A (en) * 2014-05-30 2016-01-06 由田新技股份有限公司 Access control device and registration system and method thereof
CN107067502A (en) * 2016-12-28 2017-08-18 江苏启泰物联网科技有限公司 It is a kind of can remotely modifying door lock password method
CN107274532A (en) * 2017-07-11 2017-10-20 广东能兴科技发展有限公司 The temporary password gate control system that encryption parameter dynamically updates
CN107492173A (en) * 2017-08-15 2017-12-19 青岛易方德物联科技有限公司 A kind of cloud password access control system and method

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110766840A (en) * 2019-10-12 2020-02-07 中国银行股份有限公司 Access control password setting method and device
CN110853194A (en) * 2019-11-14 2020-02-28 广东科徕尼智能科技有限公司 Sound setting method, intelligent lock and storage medium
CN113536285A (en) * 2020-04-13 2021-10-22 成都鼎桥通信技术有限公司 Special password encryption method and device for terminal equipment
CN116527258A (en) * 2023-06-30 2023-08-01 深圳市旭子科技有限公司 Unlocking method, device, equipment and storage medium of coded lock
CN116527258B (en) * 2023-06-30 2023-09-22 深圳市旭子科技有限公司 Unlocking method, device, equipment and storage medium of coded lock

Similar Documents

Publication Publication Date Title
CN109658545A (en) A kind of cipher set-up method and network access system of network lock
CN102572314B (en) Image sensor and payment authentication method
CN104717198B (en) Oftware updating method and equipment on safety element
CN104488219A (en) Methods and system for secure communication between an rfid tag and a reader
CN109428710A (en) Data transmission method, device, storage medium and processor
CN109547201A (en) A kind of encryption method of root key, computer readable storage medium and terminal device
CN107358441A (en) Method, system and the mobile device and safety certificate equipment of payment verification
CN107707347A (en) The backup method and device of user key, the introduction method and device of user key
CN110232021A (en) The method and device of page test
CN110505066A (en) A kind of data transmission method, device, equipment and storage medium
CN110210591A (en) A kind of wiring method, computer installation and the computer readable storage medium of intellective IC card personal data
CN110210211A (en) A kind of method of data protection and calculate equipment
CN109787754A (en) A kind of data encryption/decryption method, computer readable storage medium and server
CN105978693B (en) A kind of method and system of terminal association
EP2950229B1 (en) Method for facilitating transactions, computer program product and mobile device
CN110245520A (en) A kind of file enciphering method, file encryption device and terminal device
CN108965315A (en) A kind of authentic authentication method of terminal device, device and terminal device
CN111368322B (en) File decryption method and device, electronic equipment and storage medium
CN102662483A (en) A method for cloud computing business intelligent terminal users to safely input information
CN106341384A (en) Methods for facilitating secure communication
CN109547203A (en) A kind of backup method of private key, back-up device and terminal device
CN115758432A (en) Omnibearing data encryption method and system based on machine learning algorithm
CN115909560A (en) Data encryption method, data decryption method and door lock system
CN103942484A (en) Security auxiliary device using mobile phone as carrier and identity authentication method
Naija et al. Implementation of a secured digital ultralight 14443-type A RFID tag with an FPGA platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190419

RJ01 Rejection of invention patent application after publication