CN110533816B - Remote encryption method and device for authorized fingerprint of electronic fingerprint lock - Google Patents
Remote encryption method and device for authorized fingerprint of electronic fingerprint lock Download PDFInfo
- Publication number
- CN110533816B CN110533816B CN201910828057.3A CN201910828057A CN110533816B CN 110533816 B CN110533816 B CN 110533816B CN 201910828057 A CN201910828057 A CN 201910828057A CN 110533816 B CN110533816 B CN 110533816B
- Authority
- CN
- China
- Prior art keywords
- fingerprint
- encryption
- iteration
- authorized
- encryption scheme
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 29
- 238000013475 authorization Methods 0.000 claims abstract description 19
- 230000006870 function Effects 0.000 claims description 43
- 238000011156 evaluation Methods 0.000 claims description 30
- 238000005457 optimization Methods 0.000 claims description 22
- 238000012545 processing Methods 0.000 claims description 6
- 239000000126 substance Substances 0.000 claims description 4
- 238000013433 optimization analysis Methods 0.000 claims description 3
- 230000002787 reinforcement Effects 0.000 claims description 3
- 238000004891 communication Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 5
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Abstract
The invention provides a remote encryption method and a remote encryption device for an authorized fingerprint of an electronic fingerprint lock, belongs to the technical field of data encryption, and can at least partially solve the problem that the existing encryption method for the authorized fingerprint of the electronic fingerprint lock is inconvenient to operate. The remote encryption method for the authorized fingerprint of the electronic fingerprint lock comprises the following steps: uploading electronic fingerprint lock data to a server through a remote terminal, wherein the electronic fingerprint lock data comprise a target electronic fingerprint lock identifier, an authorized fingerprint and an operator identifier; analyzing the authorized fingerprint to obtain an encryption scheme of the authorized fingerprint, and sending the encryption scheme to an edge server; and enabling the edge server to encrypt the authorization fingerprint according to the encryption scheme and returning the encrypted authorization fingerprint to the remote terminal.
Description
Technical Field
The invention belongs to the technical field of data encryption, and particularly relates to a remote encryption method and device for an authorized fingerprint of an electronic fingerprint lock.
Background
The electronic fingerprint lock is convenient, quick and high in safety, is accepted and used by more and more people, and plays an important role in protecting the property of people. The authorized fingerprint of the electronic fingerprint lock is a key of the electronic fingerprint lock, and the encryption of the authorized fingerprint of the electronic fingerprint lock is a main determining factor of the safety of the electronic fingerprint lock.
The fingerprint authorization encryption of the existing electronic fingerprint lock mostly depends on manual auxiliary operation, and an operator and the electronic fingerprint lock need to operate at the same place, so that the operation is inconvenient.
Disclosure of Invention
The invention at least partially solves the problem that the existing authorized fingerprint encryption method of the electronic fingerprint lock is inconvenient to operate, and provides a remote authorized fingerprint encryption method of the electronic fingerprint lock, which is convenient to operate.
One aspect of the present invention provides a remote encryption method for an authorized fingerprint of an electronic fingerprint lock, the method comprising:
uploading electronic fingerprint lock data to a server through a remote terminal, wherein the electronic fingerprint lock data comprise a target electronic fingerprint lock identifier, an authorized fingerprint and an operator identifier;
analyzing the authorized fingerprint to obtain an encryption scheme of the authorized fingerprint, and sending the encryption scheme to an edge server;
and enabling the edge server to encrypt the authorization fingerprint according to the encryption scheme and returning the encrypted authorization fingerprint to the remote terminal.
Optionally, the analyzing the authorized fingerprint to obtain an encryption scheme of the authorized fingerprint, and sending the encryption scheme to an edge server includes:
starting a new iteration loop, resetting the iteration times and setting an iteration initial parameter, wherein the iteration initial parameter comprises the maximum iteration times;
analyzing an authorized fingerprint through an encryption optimization analyzer to obtain an authorized fingerprint encryption scheme and encryption parameters of the encryption scheme;
judging whether the iteration times reach a threshold value, if so, ending the circulation and sending the iteration-obtained authorized fingerprint encryption scheme to an edge server;
if not, judging the encryption scheme according to the evaluation function, adding 1 to the iteration number when the evaluation function is not satisfied, and returning to the step of analyzing the authorized fingerprint by the encryption optimization analyzer to obtain the authorized fingerprint encryption scheme and the encryption parameters of the encryption scheme;
if the evaluation function is satisfied, ending the loop and sending the authorization fingerprint encryption scheme obtained by the iteration to the edge server.
Further optionally, the maximum number of iterations is between 45 and 55.
Further optionally, at the k-th iteration, the encryption parameter comprises a congestion delay of the authorization fingerprintAnd authorizing fingerprint encryption time-consuming to bandwidth cost ratioAnd i, j and t are coordinate items of random points in the authorized fingerprint.
Further optionally, the evaluation function at the k-th iteration is calculated according to the following formula:
wherein D is a variance function, m is the maximum value of all values of i, n is the maximum value of all values of j, and q is the maximum value of all values of t.
Further optionally, during the kth iteration, predicting the encryption parameter of the (k + 1) th iteration by using the encryption parameter is implemented according to the following formula:
wherein the content of the first and second substances, is a deep unsupervised learning enhancement factor.
Further optionally, the deep unsupervised learning reinforcement factor is calculated using the following formula:
wherein H (X) is a hash function having a one-way property,congestion delay for historical minimum grant fingerprintsThe latest time of the day is,the minimum authorized fingerprint in history is encrypted by the ratio of time consumption to the cost of the consumed bandwidth.
Further optionally, the encryption parameter of the (k + 1) th iteration is used to instruct the encryption optimization analyzer to obtain a better authorized fingerprint encryption scheme.
Another aspect of the present invention provides an apparatus for remotely encrypting data of an electronic fingerprint lock, the apparatus comprising:
the system comprises an uploading unit, a server and a control unit, wherein the uploading unit is used for uploading electronic fingerprint lock data to the server through a remote terminal, and the electronic fingerprint lock data comprise a target electronic fingerprint lock identifier, an authorized fingerprint and an operator identifier;
the analysis unit is used for analyzing the authorized fingerprint to obtain an encryption scheme of the authorized fingerprint and sending the encryption scheme to an edge server;
and the processing unit is used for enabling the edge server to encrypt the authorization fingerprint according to the encryption scheme and returning the encrypted authorization fingerprint to the remote terminal.
Optionally, the analysis unit specifically includes the following modules:
the initial module is used for starting a new iteration cycle, resetting the iteration times and setting iteration initial parameters, wherein the iteration initial parameters comprise the maximum iteration times;
the encryption optimization analysis module is used for analyzing the authorized fingerprint through the encryption optimization analyzer to obtain an authorized fingerprint encryption scheme and encryption parameters of the encryption scheme;
the threshold comparison module is used for judging whether the iteration times reach a threshold value, if so, ending the circulation and sending the iteration-obtained authorized fingerprint encryption scheme to the edge server;
the evaluation function judging module is used for judging the encryption scheme according to the evaluation function when the iteration times do not reach the threshold value, adding 1 to the iteration times when the iteration times do not meet the evaluation function, and returning to the step of analyzing the authorized fingerprint by the encryption optimization analyzer to obtain the authorized fingerprint encryption scheme and the encryption parameters of the encryption scheme;
and the evaluation function processing module is used for ending the loop and sending the iteration-obtained authorized fingerprint encryption scheme to the edge server when the evaluation function is met.
The remote encryption method of the electronic fingerprint lock data can realize the encryption of the electronic fingerprint lock data through the remote terminal operation, and does not need to be simultaneously and simultaneously with the electronic fingerprint lock. Meanwhile, the server is used for optimizing the encryption scheme, the edge server is used for realizing encryption, a series of encryption processes are realized by the server, manual assistance is not needed, and the operation is convenient.
Drawings
Fig. 1 is a schematic flowchart of a remote encryption method for data of an electronic fingerprint lock according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating another method for remotely encrypting data of an electronic fingerprint lock according to an embodiment of the present invention;
fig. 3 is a block diagram of a remote encryption apparatus for data of an electronic fingerprint lock according to an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
It is to be understood that the specific embodiments and figures described herein are merely illustrative of the invention and are not limiting of the invention.
It is to be understood that the embodiments and features of the embodiments can be combined with each other without conflict.
It is to be understood that, for the convenience of description, only parts related to the present invention are shown in the drawings of the present invention, and parts not related to the present invention are not shown in the drawings.
It should be understood that each unit and module related in the embodiments of the present invention may correspond to only one physical structure, may also be composed of multiple physical structures, or multiple units and modules may also be integrated into one physical structure.
It will be understood that, without conflict, the functions, steps, etc. noted in the flowchart and block diagrams of the present invention may occur in an order different from that noted in the figures.
It is to be understood that the flowchart and block diagrams of the present invention illustrate the architecture, functionality, and operation of possible implementations of systems, apparatus, devices and methods according to various embodiments of the present invention. Each block in the flowchart or block diagrams may represent a unit, module, segment, code, which comprises executable instructions for implementing the specified function(s). Furthermore, each block or combination of blocks in the block diagrams and flowchart illustrations can be implemented by a hardware-based system that performs the specified functions or by a combination of hardware and computer instructions.
It is to be understood that the units and modules involved in the embodiments of the present invention may be implemented by software, and may also be implemented by hardware, for example, the units and modules may be located in a processor.
Example 1:
as shown in fig. 1, the present embodiment provides a remote encryption method for an authorized fingerprint of an electronic fingerprint lock, which includes:
s101, uploading electronic fingerprint lock data to a server through a remote terminal, wherein the electronic fingerprint lock data comprise a target electronic fingerprint lock identifier, an authorized fingerprint and an operator identifier.
S102, obtaining an encryption scheme of the authorized fingerprint by analyzing the authorized fingerprint, and sending the encryption scheme to an edge server.
S103, the edge server encrypts the authorization fingerprint according to the encryption scheme and returns the encrypted authorization fingerprint to the remote terminal.
The remote encryption method for the electronic fingerprint lock data can realize the encryption of the electronic fingerprint lock data through the remote terminal operation, and does not need to be simultaneously and simultaneously with the electronic fingerprint lock. Meanwhile, the server is used for optimizing the encryption scheme, the edge server is used for realizing encryption, a series of encryption processes are realized by the server, manual assistance is not needed, and the operation is convenient.
Example 2:
as shown in fig. 2, the present embodiment provides a remote encryption method for an authorized fingerprint of an electronic fingerprint lock, which includes:
s201, uploading electronic fingerprint lock data to a server through a remote terminal, wherein the electronic fingerprint lock data comprise a target electronic fingerprint lock identifier, an authorized fingerprint and an operator identifier.
An operator of the electronic lock uploads electronic fingerprint lock data of the electronic fingerprint lock with requirements to a server, such as a 5G communication base station, through a remote terminal (such as a mobile phone), and access and data transmission of an operator network are achieved. The electronic fingerprint lock data includes a target electronic fingerprint lock identification, an authorized fingerprint, and an operator identification.
And then, the 5G communication base station transmits the electronic fingerprint lock data to the electronic fingerprint lock data encryption optimization analyzer through the gateway.
Optionally, the target electronic fingerprint lock identifier and the indicated operator identifier are used to determine whether the authorized fingerprint is an authorized fingerprint corresponding to the electronic fingerprint lock.
And only when the operator identification and the electronic fingerprint lock identification are corresponding, namely the operator has the authority of operating the target electronic fingerprint lock, the authorized fingerprint in the electronic fingerprint lock data can be judged to be the authorized fingerprint of the target electronic fingerprint lock, the authorized fingerprint can be transmitted to the 5G communication base station, and otherwise, the uploading is given up and prompt information is sent to the terminal. Through the operation, mismatching of the electronic fingerprint lock and the authorized fingerprint caused by misoperation of an operator can be avoided, and the safety is improved.
S202, obtaining an encryption scheme of the authorized fingerprint by analyzing the authorized fingerprint, and sending the encryption scheme to the edge server.
And analyzing the authorized fingerprint in the electronic fingerprint lock data by (an electronic fingerprint lock data encryption optimization analyzer) to obtain an encryption scheme of the authorized fingerprint.
The method specifically comprises the following steps:
s2021, starting a new iteration loop, resetting the iteration times and setting an iteration initial parameter, wherein the iteration initial parameter comprises the maximum iteration times.
When the electronic fingerprint lock data encryption optimization analyzer receives new electronic fingerprint lock data, a new iteration loop is started. And starting a new iteration loop, resetting the iteration times and setting an iteration initial parameter, wherein the iteration initial parameter comprises the maximum iteration times.
Optionally, the maximum number of iterations is between 45 and 55.
Setting the maximum number of iterations between 44 and 55 may avoid that the encryption scheme is not optimized enough due to too few iterations, and may also avoid that resources and time are wasted due to too many iterations.
S2022, analyzing the authorized fingerprint through the encryption optimization analyzer to obtain an authorized fingerprint encryption scheme and encryption parameters of the encryption scheme.
And analyzing the authorized fingerprint by an encryption optimization analyzer (methods such as sparse matrix, hash function, singular point, shortest path, deep unsupervised learning and the like) to obtain a fingerprint encryption scheme and encryption parameters of the encryption scheme.
And S2023, judging whether the iteration number reaches a threshold value, if so, ending the loop and sending the encryption scheme of the authorized fingerprint obtained by the iteration to the edge server.
And judging whether the iteration number reaches a threshold value (maximum iteration number), if so, ending the iteration cycle and sending the iteration, namely the encryption scheme obtained by the last iteration, to the electronic fingerprint lock data encryption optimization edge server through the edge gateway.
S2024, if not, judging the encryption scheme according to the evaluation function, adding 1 to the iteration number when the evaluation function is not satisfied, and returning to the step of analyzing the authorized fingerprint by the encryption optimization analyzer to obtain the authorized fingerprint encryption scheme and the encryption parameters of the encryption scheme.
If the maximum iteration number is not reached, judging the encryption scheme according to the evaluation function, namely substituting the encryption parameters into the evaluation function, if the evaluation function cannot be met, adding 1 to the iteration number, returning to the step of analyzing the authorized fingerprint by the encryption optimization analyzer to obtain the authorized fingerprint encryption scheme and the encryption parameters of the encryption scheme, and continuing to circulate.
And S2025, if the evaluation function is met, ending the loop and sending the authorized fingerprint encryption scheme obtained by the iteration to the edge server.
If the evaluation function can be met, the loop is ended, and the encryption scheme obtained by iteration is sent to the electronic fingerprint lock data encryption optimization edge server through the edge gateway.
Optionally, at the k-th iteration, the encryption parameter includes a congestion delay of the authorized fingerprintAnd authorizing fingerprint encryption time-consuming to bandwidth cost ratioAnd i, j and t are coordinate items of random points in the authorized fingerprint.
Further optionally, the evaluation function at the k-th iteration is calculated according to the following formula:
wherein D is a variance function, m is the maximum value of all values of i, n is the maximum value of all values of j, and q is the maximum value of all values of t.
Further optionally, during the kth iteration, predicting the encryption parameter of the (k + 1) th iteration by using the encryption parameter is implemented according to the following formula:
wherein the content of the first and second substances, is a deep unsupervised learning enhancement factor.
The deep unsupervised learning reinforcement factor is calculated using the following formula:
wherein H (X) is a hash function having a one-way property,the congestion delay for the historical minimum grant fingerprint,the minimum authorized fingerprint in history is encrypted by the ratio of time consumption to the cost of the consumed bandwidth.
The encryption parameters of the (k + 1) th iteration are used for guiding the encryption optimization analyzer to obtain a better authorized fingerprint encryption scheme.
S203, the edge server encrypts the authorization fingerprint according to the encryption scheme and returns the encrypted authorization fingerprint to the remote terminal.
And after receiving the encryption scheme, the electronic fingerprint lock data encryption optimizing edge server encrypts the authorized fingerprint according to the encryption scheme, and returns the encrypted authorized fingerprint to the remote terminal through a communication network (such as a 5G communication base station).
The remote encryption method for the electronic fingerprint lock data can realize the encryption of the electronic fingerprint lock data through the remote terminal operation, and does not need to be simultaneously and simultaneously with the electronic fingerprint lock. Meanwhile, the server is used for optimizing the encryption scheme, the edge server is used for realizing encryption, a series of encryption processes are realized by the server, manual assistance is not needed, and the operation is convenient.
Example 3:
as shown in fig. 3, the present embodiment provides a remote encryption device for data of an electronic fingerprint lock, which specifically includes:
the system comprises an uploading unit, a server and a control unit, wherein the uploading unit is used for uploading electronic fingerprint lock data to the server through a remote terminal, and the electronic fingerprint lock data comprise a target electronic fingerprint lock identifier, an authorized fingerprint and an operator identifier;
the analysis unit is used for obtaining an encryption scheme of the authorized fingerprint by analyzing the authorized fingerprint and sending the encryption scheme to the edge server;
and the processing unit is used for enabling the edge server to encrypt the authorization fingerprint according to the encryption scheme and returning the encrypted authorization fingerprint to the remote terminal.
Optionally, the analysis unit specifically includes the following modules:
the initial module is used for starting a new iteration cycle, resetting the iteration times and setting iteration initial parameters, wherein the iteration initial parameters comprise the maximum iteration times;
the encryption optimization analysis module is used for analyzing the authorized fingerprint through the encryption optimization analyzer to obtain an authorized fingerprint encryption scheme and encryption parameters of the encryption scheme;
the threshold comparison module is used for judging whether the iteration times reach a threshold value, if so, ending the circulation and sending the iteration-obtained authorized fingerprint encryption scheme to the edge server;
the evaluation function judgment module is used for judging the encryption scheme according to the evaluation function when the iteration times do not reach the threshold value, adding 1 to the iteration times when the iteration times do not meet the evaluation function, and returning to the step of analyzing the authorized fingerprint by the encryption optimization analyzer to obtain the authorized fingerprint encryption scheme and the encryption parameters of the encryption scheme;
and the evaluation function processing module is used for ending the loop and sending the iteration-obtained authorized fingerprint encryption scheme to the edge server when the evaluation function is met.
The remote encryption device for the electronic fingerprint lock data can realize the encryption of the electronic fingerprint lock data through the remote terminal operation, and does not need to be simultaneously and simultaneously with the electronic fingerprint lock. Meanwhile, the server is used for optimizing the encryption scheme, the edge server is used for realizing encryption, a series of encryption processes are realized by the server, manual assistance is not needed, and the operation is convenient.
It will be understood that the above embodiments are merely exemplary embodiments taken to illustrate the principles of the present invention, which is not limited thereto. It will be apparent to those skilled in the art that various modifications and improvements can be made without departing from the spirit and substance of the invention, and these modifications and improvements are also considered to be within the scope of the invention.
Claims (5)
1. A method for remotely encrypting an authorized fingerprint of an electronic fingerprint lock, the method comprising:
uploading electronic fingerprint lock data to a server through a remote terminal, wherein the electronic fingerprint lock data comprise a target electronic fingerprint lock identifier, an authorized fingerprint and an operator identifier;
analyzing the authorized fingerprint to obtain an encryption scheme of the authorized fingerprint, and sending the encryption scheme to an edge server;
enabling the edge server to encrypt the authorization fingerprint according to the encryption scheme and returning the encrypted authorization fingerprint to the remote terminal;
the obtaining of the encryption scheme of the authorized fingerprint by analyzing the authorized fingerprint and sending the encryption scheme to the edge server includes:
starting a new iteration loop, resetting the iteration times and setting an iteration initial parameter, wherein the iteration initial parameter comprises the maximum iteration times;
analyzing an authorized fingerprint through an encryption optimization analyzer to obtain an authorized fingerprint encryption scheme and encryption parameters of the encryption scheme;
judging whether the iteration times reach a threshold value, if so, ending the circulation and sending the iteration-obtained authorized fingerprint encryption scheme to an edge server;
if not, judging the encryption scheme according to the evaluation function, adding 1 to the iteration number when the evaluation function is not satisfied, and returning to the step of analyzing the authorized fingerprint by the encryption optimization analyzer to obtain the authorized fingerprint encryption scheme and the encryption parameters of the encryption scheme;
if the evaluation function is met, ending the loop and sending the iteration-obtained authorized fingerprint encryption scheme to the edge server;
at the k-th iteration, the encryption parameters comprise congestion delay of authorized fingerprintsAnd authorizing fingerprint encryption time-consuming to bandwidth cost ratioWherein, i, j, t is a coordinate item of a random point in the authorized fingerprint;
the merit function at the kth iteration is calculated according to the following formula:
wherein D is a variance function, m is the maximum value of all values of i, n is the maximum value of all values of j, and q is the maximum value of all values of t;
and in the k iteration, predicting the encryption parameter of the (k + 1) th iteration by using the encryption parameter according to the following formula:
2. The method of claim 1,
the maximum number of iterations is between 45 and 55.
3. The method of claim 1,
the deep unsupervised learning reinforcement factor is calculated using the following formula:
4. The method of claim 1,
and the encryption parameter of the (k + 1) th iteration is used for guiding the encryption optimization analyzer to obtain a more optimal authorized fingerprint encryption scheme.
5. An apparatus for remotely encrypting data of an electronic fingerprint lock, the apparatus comprising:
the system comprises an uploading unit, a server and a control unit, wherein the uploading unit is used for uploading electronic fingerprint lock data to the server through a remote terminal, and the electronic fingerprint lock data comprise a target electronic fingerprint lock identifier, an authorized fingerprint and an operator identifier;
the analysis unit is used for analyzing the authorized fingerprint to obtain an encryption scheme of the authorized fingerprint and sending the encryption scheme to an edge server;
the processing unit is used for enabling the edge server to encrypt the authorization fingerprint according to the encryption scheme and returning the encrypted authorization fingerprint to the remote terminal;
the analysis unit specifically comprises the following modules:
the initial module is used for starting a new iteration cycle, resetting the iteration times and setting iteration initial parameters, wherein the iteration initial parameters comprise the maximum iteration times;
the encryption optimization analysis module is used for analyzing the authorized fingerprint through the encryption optimization analyzer to obtain an authorized fingerprint encryption scheme and encryption parameters of the encryption scheme;
the threshold comparison module is used for judging whether the iteration times reach a threshold value, if so, ending the circulation and sending the iteration-obtained authorized fingerprint encryption scheme to the edge server;
the evaluation function judging module is used for judging the encryption scheme according to the evaluation function when the iteration times do not reach the threshold value, adding 1 to the iteration times when the iteration times do not meet the evaluation function, and returning to the step of analyzing the authorized fingerprint by the encryption optimization analyzer to obtain the authorized fingerprint encryption scheme and the encryption parameters of the encryption scheme;
the evaluation function processing module is used for ending the circulation and sending the iteration-obtained authorized fingerprint encryption scheme to the edge server when the evaluation function is met;
at the k-th iteration, the encryption parameters comprise congestion delay of authorized fingerprintsAnd authorizing fingerprint encryption time-consuming to bandwidth cost ratioWherein, i, j, t is a coordinate item of a random point in the authorized fingerprint;
the merit function at the kth iteration is calculated according to the following formula:
wherein D is a variance function, m is the maximum value of all values of i, n is the maximum value of all values of j, and q is the maximum value of all values of t;
and in the k iteration, predicting the encryption parameter of the (k + 1) th iteration by using the encryption parameter according to the following formula:
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910828057.3A CN110533816B (en) | 2019-09-03 | 2019-09-03 | Remote encryption method and device for authorized fingerprint of electronic fingerprint lock |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910828057.3A CN110533816B (en) | 2019-09-03 | 2019-09-03 | Remote encryption method and device for authorized fingerprint of electronic fingerprint lock |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110533816A CN110533816A (en) | 2019-12-03 |
CN110533816B true CN110533816B (en) | 2021-07-27 |
Family
ID=68666505
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910828057.3A Active CN110533816B (en) | 2019-09-03 | 2019-09-03 | Remote encryption method and device for authorized fingerprint of electronic fingerprint lock |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110533816B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112491862B (en) * | 2020-11-23 | 2022-08-02 | 中国联合网络通信集团有限公司 | Distributed encryption method and device |
CN112437086B (en) * | 2020-11-23 | 2022-07-29 | 中国联合网络通信集团有限公司 | Method, device and system for acquiring monitoring data |
CN112241547B (en) * | 2020-11-23 | 2023-06-06 | 中国联合网络通信集团有限公司 | Vehicle data encryption analysis method, edge server and storage medium |
CN112364365B (en) * | 2020-11-23 | 2023-05-23 | 中国联合网络通信集团有限公司 | Industrial data encryption method, edge server and computer readable storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101374043A (en) * | 2007-08-24 | 2009-02-25 | 管海明 | Cipher key negotiating method, enciphering/deciphering method and signature/verification method |
CN103605934A (en) * | 2013-11-06 | 2014-02-26 | 北京深思数盾科技有限公司 | Protection method and device for executable files |
CN109448197A (en) * | 2018-12-18 | 2019-03-08 | 杭州高锦科技有限公司 | A kind of cloud intelligent lock system and key management method based on multi-enciphering mode |
CN109766050A (en) * | 2019-01-28 | 2019-05-17 | 努比亚技术有限公司 | Fingerprint identification method, terminal and computer readable storage medium |
CN109859350A (en) * | 2018-11-19 | 2019-06-07 | 上海奥宜电子科技有限公司 | A kind of self-service input method of the fingerprint of remote authorization and hotel self-service move in method |
-
2019
- 2019-09-03 CN CN201910828057.3A patent/CN110533816B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101374043A (en) * | 2007-08-24 | 2009-02-25 | 管海明 | Cipher key negotiating method, enciphering/deciphering method and signature/verification method |
CN103605934A (en) * | 2013-11-06 | 2014-02-26 | 北京深思数盾科技有限公司 | Protection method and device for executable files |
CN109859350A (en) * | 2018-11-19 | 2019-06-07 | 上海奥宜电子科技有限公司 | A kind of self-service input method of the fingerprint of remote authorization and hotel self-service move in method |
CN109448197A (en) * | 2018-12-18 | 2019-03-08 | 杭州高锦科技有限公司 | A kind of cloud intelligent lock system and key management method based on multi-enciphering mode |
CN109766050A (en) * | 2019-01-28 | 2019-05-17 | 努比亚技术有限公司 | Fingerprint identification method, terminal and computer readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110533816A (en) | 2019-12-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110533816B (en) | Remote encryption method and device for authorized fingerprint of electronic fingerprint lock | |
CN107667369B (en) | Use of a mobile device with a lock | |
EP3716227B1 (en) | Identity verification method and device and electronic device | |
US9451454B2 (en) | Mobile device identification for secure device access | |
EP3839774A1 (en) | Continuous authentication system and related methods | |
US8234492B2 (en) | Method, client and system for reversed access to management server using one-time password | |
CN111092899B (en) | Information acquisition method, device, equipment and medium | |
US8707444B2 (en) | Systems and methods for implementing application control security | |
GB2585170A (en) | Oblivious pseudorandom function in a key management system | |
RU2007130340A (en) | METHOD FOR CREATING A SAFE CODE, METHODS FOR ITS USE AND PROGRAMMABLE DEVICE FOR IMPLEMENTING THE METHOD | |
KR101410764B1 (en) | Apparatus and method for remotely deleting important information | |
CN109685946A (en) | Open method, device, equipment and the storage medium of lockset | |
CN110879879A (en) | Internet of things identity authentication method and device, electronic equipment, system and storage medium | |
CN110661779A (en) | Block chain network-based electronic certificate management method, system, device and medium | |
CN104853354A (en) | Bluetooth authentication method and system thereof | |
CN115348037A (en) | Identity authentication method, device and equipment of terminal equipment | |
AU2014256198A1 (en) | Terminal, network side device, terminal application control method, and system | |
CN1494686A (en) | User identification with improved password input method | |
US11133935B2 (en) | System for integrity validation of authorization data using cryptographic hashes | |
CN104640112A (en) | Authentication method, device and system | |
Yinhui et al. | Research on a provable security RFID authentication protocol based on Hash function | |
Illakiya et al. | E-voting system using biometric testament and cloud storage | |
US20210099281A1 (en) | System for authorization and authentication using nonce values and hash algorithms | |
CN114299636B (en) | Method and apparatus for processing device offline passwords | |
CN114697117A (en) | Verification method, device, scrambler and system based on positioning information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |