CN109658545A - A kind of cipher set-up method and network access system of network lock - Google Patents
A kind of cipher set-up method and network access system of network lock Download PDFInfo
- Publication number
- CN109658545A CN109658545A CN201810284667.7A CN201810284667A CN109658545A CN 109658545 A CN109658545 A CN 109658545A CN 201810284667 A CN201810284667 A CN 201810284667A CN 109658545 A CN109658545 A CN 109658545A
- Authority
- CN
- China
- Prior art keywords
- operation code
- network
- network lock
- character string
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
- G07C2009/00825—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
Abstract
The application is suitable for field of communication technology, provides the cipher set-up method and network access system of a kind of network lock, comprising: receives the cryptographic parameter that user is sent by terminal device;Operation code corresponding with the cryptographic parameter is generated according to the cryptographic parameter;The operation code of generation is returned into the terminal device, the operation code is used to that password to be arranged for the network lock.Solve the problems, such as that password can not be arranged in the case where no connection network in network lock by this method.
Description
Technical field
This application involves the cipher set-up methods and network access system of field of communication technology more particularly to a kind of network lock
System.
Background technique
Network lock is a kind of equipment that switch password can be arranged by network remote, its working principle is that, user passes through hand
Machine App or web page set password, App or web page and password are sent to server, and password is issued to by server again
Network lock completes the operation of password setting with this.
Currently, in user setting password, must be requested that network lock connects network.If place environment do not have network or
Network status is bad, then will lead to password setting function and be not available, seriously affected user experience.
Summary of the invention
In view of this, the embodiment of the present application provides the cipher set-up method and network access system of a kind of network lock, with
Solve the problems, such as that password can not be arranged in the case where no connection network in network lock in the prior art.
The first aspect of the embodiment of the present application provides a kind of cipher set-up method of network lock, is applied to network access system
Server in system, comprising:
Receive the cryptographic parameter that user is sent by terminal device;
Operation code corresponding with the cryptographic parameter is generated according to the cryptographic parameter;
The operation code of generation is returned into the terminal device, the operation code is used to that password to be arranged for the network lock.
The second aspect of the embodiment of the present application provides a kind of cipher set-up method of network lock, is applied to the application and implements
Network lock in network access system described in example first aspect, comprising:
The operation code of user's input is received, and the operation code is parsed to obtain corresponding with the operation code
Cryptographic parameter;
According to the cryptographic parameter parsed, password is set.
The third aspect of the embodiment of the present application provides a kind of server, including memory, processor and is stored in institute
The computer program that can be run in memory and on the processor is stated, the processor executes real when the computer program
The step of the method that existing the embodiment of the present application first aspect provides.
The fourth aspect of the embodiment of the present application provides a kind of network lock, including memory, processor and is stored in institute
The computer program that can be run in memory and on the processor is stated, the processor executes real when the computer program
The step of the method that existing the embodiment of the present application second aspect provides.
5th aspect of the embodiment of the present application provides a kind of computer readable storage medium, the computer-readable storage
Media storage has computer program, and the computer program realizes the embodiment of the present application when being executed by one or more processors
The step of the method that one side and/or second aspect provide.
6th aspect of the embodiment of the present application provides a kind of network access system, comprising:
The network lock of server, the offer of at least one fourth aspect that the third aspect provides, each network lock and the clothes
Business device keeps the synchronization of the cryptographic parameter.
Existing beneficial effect is the embodiment of the present application compared with prior art:
The cryptographic parameter that the application is sent by receiving user by terminal device;According to cryptographic parameter generation and institute
State the corresponding operation code of cryptographic parameter;The operation code of generation is returned into the terminal device, the operation code is for being described
Password is arranged in network lock;And the operation code by receiving user's input, to the operation code parsed to obtain with it is described
The corresponding cryptographic parameter of operation code;According to the cryptographic parameter parsed, password is set.It is efficiently solved by the above method
The problem of in the case where no connection network password can not be arranged in network lock.
Detailed description of the invention
It in order to more clearly explain the technical solutions in the embodiments of the present application, below will be to embodiment or description of the prior art
Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only some of the application
Embodiment for those of ordinary skill in the art without any creative labor, can also be according to these
Attached drawing obtains other attached drawings.
Fig. 1 is the schematic block diagram of network access system provided by the embodiments of the present application;
Fig. 2 is the implementation process schematic diagram of the cipher set-up method of network lock provided by the embodiments of the present application;
Fig. 3 is the implementation process schematic diagram of the cipher set-up method for the network lock that the another embodiment of the application provides;
Fig. 4 is a kind of schematic diagram of server provided by the embodiments of the present application;
Fig. 5 is a kind of schematic diagram of network lock provided by the embodiments of the present application;
Fig. 6 is the operational flowchart of the cipher set-up method of network lock provided by the embodiments of the present application.
Specific embodiment
In being described below, for illustration and not for limitation, the tool of such as particular system structure, technology etc is proposed
Body details, so as to provide a thorough understanding of the present application embodiment.However, it will be clear to one skilled in the art that there is no these specific
The application also may be implemented in the other embodiments of details.In other situations, it omits to well-known system, device, electricity
The detailed description of road and method, so as not to obscure the description of the present application with unnecessary details.
It should be appreciated that ought use in this specification and in the appended claims, term " includes " instruction is described special
Sign, entirety, step, operation, the presence of element and/or component, but be not precluded one or more of the other feature, entirety, step,
Operation, the presence or addition of element, component and/or its set.
It is also understood that mesh of the term used in this present specification merely for the sake of description specific embodiment
And be not intended to limit the application.As present specification and it is used in the attached claims, unless on
Other situations are hereafter clearly indicated, otherwise " one " of singular, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in present specification and the appended claims is
Refer to any combination and all possible combinations of one or more of associated item listed, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt
Be construed to " when ... " or " once " or " in response to determination " or " in response to detecting ".Similarly, phrase " if it is determined that " or
" if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true
It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In order to illustrate technical solution described herein, the following is a description of specific embodiments.
Fig. 1 is the schematic block diagram of network access system provided by the embodiments of the present application, for ease of description, illustrate only with
The relevant part of the embodiment of the present application.As described in Figure, the network access system includes:
Server, at least one network lock, each network lock keep the synchronous of the cryptographic parameter with the server.
Network access system and terminal device are shown in Fig. 1, wherein network access system includes a server, until
A few network lock.Terminal device is connect with the server in network access system, and with the network lock in network access system
Connection.
In practical applications, the cipher set-up method of network lock described herein needs that terminal device is cooperated to use.
The terminal device can be the terminal device for being equipped with default application software, such as mobile phone, iPad, computer, Portable hand
Computer, bracelet etc..Wherein, default application software can be the application software for remote control network lock.It needs to illustrate
It is to be one embodiment of network access system in the application shown in Fig. 1, specific limit is not done to the quantity of network lock
It is fixed.One terminal device can be connect with a network lock, can also be connect with multiple network locks.Server can connect at least
One mobile device.
Illustratively, user inputs cryptographic parameter in terminal device, and terminal device will by connecting with server communication
Cryptographic parameter is sent to server, and server generates corresponding operation code according to cryptographic parameter, and operation code is returned to terminal
Equipment, user input network lock according to the operation code shown on terminal device, by the operation code, and network lock inputs user
Operation code is parsed to obtain cryptographic parameter, and carries out password setting according to the cryptographic parameter parsed.It should be noted that with
After the operation code shown on terminal device is seen at family, operation code directly can be inputted into network lock, it can also be defeated by operation code
Enter terminal device, and network lock is sent to by terminal device, is not specifically limited here.
Wherein, server and the concrete function of network lock can be found in the associated description of Fig. 2, Fig. 3 corresponding embodiment.
Switch password can be arranged by network remote in network lock at present, necessarily require network lock to connect when password is arranged
Server, user set password, App or web page by cell phone application or web page and password are sent to server, clothes
Password is issued to network lock again by business device, and the password setting operation of network lock is completed with this.It can not connect with server in network lock
In the case where connecing, can not usually password setting be carried out to network lock, not can guarantee the cryptosync of server and network lock.This Shen
Please network access system in embodiment, network lock do not need to connect with server, can realize same with the password of server
Step.
Fig. 2 is the implementation process schematic diagram of the cipher set-up method of network lock provided by the embodiments of the present application, and the application is real
Example is applied applied to the server in the network access system, this method as shown in the figure may comprise steps of:
Step S201 receives the cryptographic parameter that user is sent by terminal device.
Step S202 generates operation code corresponding with the cryptographic parameter according to the cryptographic parameter.
The operation code of generation is returned to the terminal device by step S203, and the operation code is used to be the network lock
Password is set.
In one embodiment, the cryptographic parameter includes:
The effective time of the password of the network lock, the access times of the password, the password.
In practical applications, cryptographic parameter includes but is not limited to the above-mentioned parameters listed, and is not specifically limited herein.
It is the operational flowchart of the cipher set-up method of network lock provided by the embodiments of the present application referring to Fig. 6, Fig. 6.Step
S201-S203 describes the interactive process between terminal device and server.
It is in another embodiment, described that operation code corresponding with the cryptographic parameter is generated according to the cryptographic parameter,
Include:
The cryptographic parameter is parsed to obtain the first instruction character string.
One is randomly selected from preset transfer algorithm and is used as target transfer algorithm, and according to the target transfer algorithm
The first instruction character string is carried out to be converted to the second instruction character string, the second instruction character string includes the target
The mark of transfer algorithm.
According to predetermined encryption algorithm, the second instruction character string is encrypted, operation code is obtained.
In practical applications, the cryptographic parameter that server receiving terminal equipment is sent, it is necessary first to which cryptographic parameter is carried out
Parsing, because cryptographic parameter is user by terminal device input, meets the parameter of user language, such as natural language, still
Cryptographic parameter tends not to directly be identified by server, that is, machine language is not belonging to, so first parse by cryptographic parameter
To the first instruction character string, the first instruction character string can be the machine languages such as binary code, not do specific limit herein
It is fixed.In one embodiment, terminal device can be encrypted the cryptographic parameter that user inputs to obtain encrypted password ginseng
Number, after server receives encrypted cryptographic parameter, first cryptographic parameter is decrypted, then to the cryptographic parameter after decryption into
Row parsing obtains the first instruction character string.
It is stored in advance in the server there are many transfer algorithm, server can be random from pre-stored transfer algorithm
A kind of transfer algorithm is chosen the first instruction character string convert as target transfer algorithm, and according to target transfer algorithm
To the second instruction character string.Illustratively, the second instruction character string can be with " * " beginning, and back is 0~9 number composition
Character string is not specifically limited herein.It include the mark of target transfer algorithm in the second instruction character string.Illustratively,
It can be the mark of target transfer algorithm taking human as the 1st after presetting No. *, it is assumed that the second instruction character string is *
123456789, the 1st after No. * is 1, then it represents that target transfer algorithm is that first in pre-stored transfer algorithm turns
Scaling method.It here is an example of the mark of target transfer algorithm in the second instruction character string, not to mark character, mark
Knowledge method is specifically limited.Wherein, first, second here is only intended to distinguish different instruction character strings, is not used to count
Number, specifically, the first instruction character string is used to indicate the instruction character by server parsing but the conversion of unconverted algorithm
String, the second instruction character string are used to indicate the instruction character string by transfer algorithm conversion.Certainly, to the first instruction character string
Before being converted, the first instruction character string can also be formatted, being converted to the format of the first instruction character string can
The format identified by target transfer algorithm.
After obtaining the second instruction character string, the second instruction character string is encrypted according to predetermined encryption algorithm, is obtained
Operation code.Wherein, predetermined encryption algorithm can be artificial preset, can be and is stored in advance in the server.
The embodiment of the present application receives the cryptographic parameter that user is sent by terminal device, and so that server is obtained user will
The cryptographic parameter of the network lock of setting;Operation code corresponding with the cryptographic parameter, the behaviour are generated according to the cryptographic parameter
Make code generating process have passed through algorithm conversion and predetermined encryption algorithm encryption, that is, have passed through and encrypt twice, safety compared with
It is high;The operation code of generation is returned into the terminal device, the operation code is used to that password to be arranged for the network lock, makes terminal
Equipment can receive operation code.
Fig. 3 is the implementation process schematic diagram of the cipher set-up method for the network lock that the another embodiment of the application provides, this Shen
Please embodiment be applied to the network lock in the network access system, this method as shown in the figure may comprise steps of:
Step S301, receives the operation code of user's input, and is parsed to obtain and the behaviour to the operation code
Make the corresponding cryptographic parameter of code.
Password is arranged according to the cryptographic parameter parsed in step S302.
It is the operational flowchart of the cipher set-up method of network lock provided by the embodiments of the present application referring to Fig. 6, Fig. 6.Step
S301-S302 describes the interactive process between terminal device and network lock.
In one embodiment, described that the operation code is parsed to obtain password ginseng corresponding with the operation code
Number, comprising:
The operation code is decrypted according to default decipherment algorithm to obtain the second instruction character string.
The target transfer algorithm is obtained, and the second instruction character string is turned based on the target transfer algorithm
It gets in return to the first instruction character string.
Concatenate into the cryptographic parameter based on first instruction character.
In practical applications, default decipherment algorithm is corresponding with predetermined encryption algorithm, in other words, utilizes default solution
Close algorithm can be decrypted the information encrypted using predetermined encryption algorithm.Default decipherment algorithm is pre-stored in network lock
In.Illustratively, server by utilizing predetermined encryption algorithm A is encrypted to obtain operation code, network lock to the second instruction character string
After receiving operation code, operation code is decrypted using pre-stored default decipherment algorithm A '.It can be only pre- in server
A predetermined encryption algorithm is first stored, a default decipherment algorithm is accordingly also only stored in advance in network lock;Certainly, in server
Multiple predetermined encryption algorithms can also be stored in advance, network lock can also accordingly store multiple default decipherment algorithms, operation code
In include preset characters, preset characters are used to indicate the mark of predetermined encryption algorithm, in this way, network lock receives operation code
Afterwards, the preset characters in operation code are obtained, predetermined encryption algorithm used in server can be obtained according to preset characters, in turn
Choose default decipherment algorithm corresponding with predetermined encryption algorithm used in server.
After carrying out being converted to the first instruction character string to the second instruction character string according to target transfer algorithm, due to
First instruction character string is machine language, is generally inconvenient to be recognized by the user, so needing to be converted to the first instruction character string
The natural language that can be recognized by the user, i.e. cryptographic parameter.After according to cryptographic parameter, password is set, setting result can also be returned
Back to terminal device, make user's awareness network lock cipher update status.
It is in another embodiment, described to obtain the target transfer algorithm, comprising:
The mark of target transfer algorithm is obtained from the second instruction character string.
Based on the mark of the target transfer algorithm obtained from the second instruction character string, from preset transfer algorithm
Obtain target transfer algorithm.
In practical applications, include the mark of target transfer algorithm in the second instruction character string, be based on from the second coding line
The mark of the target transfer algorithm obtained in symbol string, obtains target transfer algorithm from preset transfer algorithm.It is specific how
The process for obtaining target transfer algorithm can be found in the embodiment of step S202.
The embodiment of the present application receives the operation code of user's input, so that network lock is in the case where no connection network
The cryptographic parameter for needing to be arranged can be got;And the operation code is parsed to obtain password corresponding with the operation code
Password is arranged according to the cryptographic parameter parsed, so that network lock with server the case where not being attached in parameter
Under, the synchronous of password can be kept with server, enhance the applicability of network lock cipher setting;In addition, by operation
The secondary decryption of code, enhances the safety of password.
Embodiment shown in Fig. 3 and embodiment shown in Fig. 2 are the cipher set-up methods to network lock from different angles
It is described, Fig. 2 the embodiment described is described using server as executing subject, and embodiment shown in Fig. 3 is with net
Network lock is described as executing subject.Pass through the method in the embodiment of the present application, it is ensured that network lock is in not connected network
In the case where with server keep password setting information it is consistent, thus reduce because in network lock and server password setting not
Consistent bring complexity and security risk.In practical applications, it is related to method in the application Fig. 2, Fig. 3 embodiment not only to fit
Password for network lock is arranged, i.e., network lock keeps the synchronous of password with server in the case where not connected network, may be used also
Make to be suitable for other information for needing network lock synchronous with server holding.In other words, feelings of the network lock in not connected network
Under condition, by the technical solution in the embodiment of the present application, not only the synchronous of password can be kept with server, it can also be with service
Device keeps the synchronization of the other information in addition to password.If network lock only to be needed to the type of the information synchronous with server holding
It is replaced, still within the scope of protection of this application.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process
Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present application constitutes any limit
It is fixed.
Fig. 4 is a kind of schematic block diagram of server provided by the embodiments of the present application.As shown in figure 4, the service of the embodiment
Device 4 includes: one or more processors 40, memory 41 and is stored in the memory 41 and can be in the processor 40
The computer program 42 of upper operation.The processor 40 realizes above-mentioned each data communication side when executing the computer program 42
Step in method embodiment, such as step S201 to S203 shown in Fig. 2.
The computer program 42 can be divided into one or more module/units, and one or more of modules/
Unit is stored in the memory 41, and is executed by the processor 40, to complete the application.One or more of moulds
Block/unit can be the series of computation machine program instruction section that can complete specific function, the instruction segment by describe it is described based on
Implementation procedure of the calculation machine program 42 in the relay node 4.For example, the computer program 42 can be divided into reception list
Member, generation unit, return unit.
Receiving unit, the cryptographic parameter sent for receiving user by terminal device.
Generation unit, for generating operation code corresponding with the cryptographic parameter according to the cryptographic parameter.
Return unit, for the operation code of generation to be returned to the terminal device, the operation code is used to be the net
Network lock setting password.
Wherein, the cryptographic parameter includes:
The effective time of the password of the network lock, the access times of the password, the password.
Optionally, the generation unit includes:
Parsing module obtains the first instruction character string for being parsed to the cryptographic parameter.
Conversion module is used as target transfer algorithm for randomly selecting one from preset transfer algorithm, and according to institute
Target transfer algorithm is stated the first instruction character string is carried out to be converted to the second instruction character string, second instruction character
String includes the mark of the target transfer algorithm.
Encrypting module, for encrypting, being operated to the second instruction character string according to predetermined encryption algorithm
Code.
Fig. 5 is a kind of schematic block diagram of network lock provided by the embodiments of the present application.As shown in figure 5, the network of the embodiment
Lock 5 includes: one or more processors 50, memory 51 and is stored in the memory 51 and can be in the processor 50
The computer program 52 of upper operation.The processor 50 realizes above-mentioned each data communication side when executing the computer program 52
Step in method embodiment, such as step S301 to S303 shown in Fig. 3.
The computer program 52 can be divided into one or more module/units, and one or more of modules/
Unit is stored in the memory 51, and is executed by the processor 50, to complete the application.One or more of moulds
Block/unit can be the series of computation machine program instruction section that can complete specific function, the instruction segment by describe it is described based on
Implementation procedure of the calculation machine program 52 in the terminal node 4.For example, the computer program 42 can be divided into parsing list
Member, setting unit.
Resolution unit for receiving the operation code of user's input, and is parsed to obtain and institute to the operation code
State the corresponding cryptographic parameter of operation code.
Setting unit, for password to be arranged according to the cryptographic parameter parsed.
Optionally, the resolution unit includes:
Deciphering module obtains the second instruction character string for the operation code to be decrypted according to default decipherment algorithm.
Module is obtained, is referred to for obtaining the target transfer algorithm, and based on the target transfer algorithm to described second
Character string is enabled to carry out being converted to the first instruction character string.
Generation module, for concatenating into the cryptographic parameter based on first instruction character.
Optionally, the acquisition module includes:
Labeling submodule is obtained, for obtaining the mark of target transfer algorithm from the second instruction character string.
Acquisition algorithm submodule, for the mark based on the target transfer algorithm obtained from the second instruction character string
Know, target transfer algorithm is obtained from preset transfer algorithm.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function
Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different
Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing
The all or part of function of description.Each functional unit in embodiment, module can integrate in one processing unit, can also
To be that each unit physically exists alone, can also be integrated in one unit with two or more units, it is above-mentioned integrated
Unit both can take the form of hardware realization, can also realize in the form of software functional units.In addition, each function list
Member, the specific name of module are also only for convenience of distinguishing each other, the protection scope being not intended to limit this application.Above system
The specific work process of middle unit, module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
The server/network lock includes but are not limited to processor, memory.It will be understood by those skilled in the art that
Fig. 4/5 are only an example of server/network lock, do not constitute to the restriction of relay node/terminal node, may include
Than illustrating more or fewer components, certain components or different components, such as the relay node/terminal are perhaps combined
Node can also include input equipment, output equipment, network access equipment, bus etc..
Alleged processor can be central processing unit (Central Processing Unit, CPU), can also be it
His general processor, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit
(Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor
Deng.
The memory can be the internal storage unit of server/network lock, such as server/network lock is hard
Disk or memory.The memory is also possible to the External memory equipment of the server/network lock, such as the server/net
Network locks the plug-in type hard disk of outfit, intelligent memory card (Smart Media Card, SMC), secure digital (Secure
Digital, SD) card, flash card (Flash Card) etc..Further, the memory can also both include the server/
The internal storage unit of network lock also includes External memory equipment.The memory is for storing the computer program and institute
State other programs and data needed for terminal device.The memory, which can be also used for temporarily storing, have been exported or will
The data of output.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodiment
The part of load may refer to the associated description of other embodiments.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
Scope of the present application.
In embodiment provided herein, it should be understood that disclosed device/terminal device and method, it can be with
It realizes by another way.For example, device described above/terminal device embodiment is only schematical, for example, institute
The division of module or unit is stated, only a kind of logical function partition, there may be another division manner in actual implementation, such as
Multiple units or components can be combined or can be integrated into another system, or some features can be ignored or not executed.Separately
A bit, shown or discussed mutual coupling or direct-coupling or communication connection can be through some interfaces, device
Or the INDIRECT COUPLING or communication connection of unit, it can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or
In use, can store in a computer readable storage medium.Based on this understanding, the application realizes above-mentioned implementation
All or part of the process in example method, can also instruct relevant hardware to complete, the meter by computer program
Calculation machine program can be stored in a computer readable storage medium, the computer program when being executed by processor, it can be achieved that on
The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generation
Code can be source code form, object identification code form, executable file or certain intermediate forms etc..The computer-readable medium
It may include: any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic that can carry the computer program code
Dish, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM,
Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that described
The content that computer-readable medium includes can carry out increasing appropriate according to the requirement made laws in jurisdiction with patent practice
Subtract, such as in certain jurisdictions, according to legislation and patent practice, computer-readable medium do not include be electric carrier signal and
Telecommunication signal.
Embodiment described above is only to illustrate the technical solution of the application, rather than its limitations;Although referring to aforementioned reality
Example is applied the application is described in detail, those skilled in the art should understand that: it still can be to aforementioned each
Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified
Or replacement, the spirit and scope of each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution should all
Comprising within the scope of protection of this application.
Claims (10)
1. a kind of cipher set-up method of network lock, which is characterized in that applied to the server in network access system, the net
Network lock cipher set-up method include:
Receive the cryptographic parameter that user is sent by terminal device;
Operation code corresponding with the cryptographic parameter is generated according to the cryptographic parameter;
The operation code of generation is returned into the terminal device, the operation code is used to that password to be arranged for the network lock.
2. the cipher set-up method of network lock as described in claim 1, which is characterized in that the cryptographic parameter includes:
The effective time of the password of the network lock, the access times of the password, the password.
3. the cipher set-up method of network lock as claimed in claim 1 or 2, which is characterized in that described to be joined according to the password
Number generates operation code corresponding with the cryptographic parameter, comprising:
The cryptographic parameter is parsed to obtain the first instruction character string;
One is randomly selected from preset transfer algorithm and is used as target transfer algorithm, and according to the target transfer algorithm to institute
It states the first instruction character string to carry out being converted to the second instruction character string, the second instruction character string is converted comprising the target
The mark of algorithm;
According to predetermined encryption algorithm, the second instruction character string is encrypted, operation code is obtained.
4. a kind of cipher set-up method of network lock, which is characterized in that be applied to net as described in any one of claims 1 to 3
The cipher set-up method of network lock in network access control system, the network lock includes:
The operation code of user's input is received, and the operation code is parsed to obtain password corresponding with the operation code
Parameter;
According to the cryptographic parameter parsed, password is set.
5. the cipher set-up method of network lock as claimed in claim 4, which is characterized in that described to be solved to the operation code
Analysis obtains cryptographic parameter corresponding with the operation code, comprising:
The operation code is decrypted according to default decipherment algorithm to obtain the second instruction character string;
The target transfer algorithm is obtained, and the second instruction character string convert based on the target transfer algorithm
To the first instruction character string;
Concatenate into the cryptographic parameter based on first instruction character.
6. the cipher set-up method of network lock as claimed in claim 5, which is characterized in that described to obtain the target conversion calculation
Method, comprising:
The mark of target transfer algorithm is obtained from the second instruction character string;
Based on the mark of the target transfer algorithm obtained from the second instruction character string, obtained from preset transfer algorithm
Target transfer algorithm.
7. a kind of server, including memory, processor and storage can transport in the memory and on the processor
Capable computer program, which is characterized in that the processor realizes that claims 1 to 3 such as is appointed when executing the computer program
The step of one the method.
8. a kind of network lock, including memory, processor and storage can transport in the memory and on the processor
Capable computer program, which is characterized in that the processor realizes such as claim 4 to 6 times when executing the computer program
The step of one the method.
9. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists
In when the computer program is executed by processor the step of any one of such as claims 1 to 3 of realization the method and/or such as
The step of any one of claim 4 to 6 the method.
10. a kind of network access system characterized by comprising
As claimed in claim 7 server, at least one network lock as claimed in claim 8, each network lock with it is described
Server keeps the synchronization of the cryptographic parameter.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810284667.7A CN109658545A (en) | 2018-04-02 | 2018-04-02 | A kind of cipher set-up method and network access system of network lock |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810284667.7A CN109658545A (en) | 2018-04-02 | 2018-04-02 | A kind of cipher set-up method and network access system of network lock |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109658545A true CN109658545A (en) | 2019-04-19 |
Family
ID=66110141
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810284667.7A Pending CN109658545A (en) | 2018-04-02 | 2018-04-02 | A kind of cipher set-up method and network access system of network lock |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109658545A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110766840A (en) * | 2019-10-12 | 2020-02-07 | 中国银行股份有限公司 | Access control password setting method and device |
CN110853194A (en) * | 2019-11-14 | 2020-02-28 | 广东科徕尼智能科技有限公司 | Sound setting method, intelligent lock and storage medium |
CN113536285A (en) * | 2020-04-13 | 2021-10-22 | 成都鼎桥通信技术有限公司 | Special password encryption method and device for terminal equipment |
CN116527258A (en) * | 2023-06-30 | 2023-08-01 | 深圳市旭子科技有限公司 | Unlocking method, device, equipment and storage medium of coded lock |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102412967A (en) * | 2011-09-29 | 2012-04-11 | 用友软件股份有限公司 | Data transmission system and method |
CN105225304A (en) * | 2014-05-30 | 2016-01-06 | 由田新技股份有限公司 | Access control device and registration system and method thereof |
CN107067502A (en) * | 2016-12-28 | 2017-08-18 | 江苏启泰物联网科技有限公司 | It is a kind of can remotely modifying door lock password method |
CN107274532A (en) * | 2017-07-11 | 2017-10-20 | 广东能兴科技发展有限公司 | The temporary password gate control system that encryption parameter dynamically updates |
CN107492173A (en) * | 2017-08-15 | 2017-12-19 | 青岛易方德物联科技有限公司 | A kind of cloud password access control system and method |
-
2018
- 2018-04-02 CN CN201810284667.7A patent/CN109658545A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102412967A (en) * | 2011-09-29 | 2012-04-11 | 用友软件股份有限公司 | Data transmission system and method |
CN105225304A (en) * | 2014-05-30 | 2016-01-06 | 由田新技股份有限公司 | Access control device and registration system and method thereof |
CN107067502A (en) * | 2016-12-28 | 2017-08-18 | 江苏启泰物联网科技有限公司 | It is a kind of can remotely modifying door lock password method |
CN107274532A (en) * | 2017-07-11 | 2017-10-20 | 广东能兴科技发展有限公司 | The temporary password gate control system that encryption parameter dynamically updates |
CN107492173A (en) * | 2017-08-15 | 2017-12-19 | 青岛易方德物联科技有限公司 | A kind of cloud password access control system and method |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110766840A (en) * | 2019-10-12 | 2020-02-07 | 中国银行股份有限公司 | Access control password setting method and device |
CN110853194A (en) * | 2019-11-14 | 2020-02-28 | 广东科徕尼智能科技有限公司 | Sound setting method, intelligent lock and storage medium |
CN113536285A (en) * | 2020-04-13 | 2021-10-22 | 成都鼎桥通信技术有限公司 | Special password encryption method and device for terminal equipment |
CN116527258A (en) * | 2023-06-30 | 2023-08-01 | 深圳市旭子科技有限公司 | Unlocking method, device, equipment and storage medium of coded lock |
CN116527258B (en) * | 2023-06-30 | 2023-09-22 | 深圳市旭子科技有限公司 | Unlocking method, device, equipment and storage medium of coded lock |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109658545A (en) | A kind of cipher set-up method and network access system of network lock | |
CN102572314B (en) | Image sensor and payment authentication method | |
CN104717198B (en) | Oftware updating method and equipment on safety element | |
CN104488219A (en) | Methods and system for secure communication between an rfid tag and a reader | |
CN109428710A (en) | Data transmission method, device, storage medium and processor | |
CN109547201A (en) | A kind of encryption method of root key, computer readable storage medium and terminal device | |
CN107358441A (en) | Method, system and the mobile device and safety certificate equipment of payment verification | |
CN107707347A (en) | The backup method and device of user key, the introduction method and device of user key | |
CN110232021A (en) | The method and device of page test | |
CN110505066A (en) | A kind of data transmission method, device, equipment and storage medium | |
CN110210591A (en) | A kind of wiring method, computer installation and the computer readable storage medium of intellective IC card personal data | |
CN110210211A (en) | A kind of method of data protection and calculate equipment | |
CN109787754A (en) | A kind of data encryption/decryption method, computer readable storage medium and server | |
CN105978693B (en) | A kind of method and system of terminal association | |
EP2950229B1 (en) | Method for facilitating transactions, computer program product and mobile device | |
CN110245520A (en) | A kind of file enciphering method, file encryption device and terminal device | |
CN108965315A (en) | A kind of authentic authentication method of terminal device, device and terminal device | |
CN111368322B (en) | File decryption method and device, electronic equipment and storage medium | |
CN102662483A (en) | A method for cloud computing business intelligent terminal users to safely input information | |
CN106341384A (en) | Methods for facilitating secure communication | |
CN109547203A (en) | A kind of backup method of private key, back-up device and terminal device | |
CN115758432A (en) | Omnibearing data encryption method and system based on machine learning algorithm | |
CN115909560A (en) | Data encryption method, data decryption method and door lock system | |
CN103942484A (en) | Security auxiliary device using mobile phone as carrier and identity authentication method | |
Naija et al. | Implementation of a secured digital ultralight 14443-type A RFID tag with an FPGA platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190419 |
|
RJ01 | Rejection of invention patent application after publication |