CN110533816B - Remote encryption method and device for authorized fingerprint of electronic fingerprint lock - Google Patents

Remote encryption method and device for authorized fingerprint of electronic fingerprint lock Download PDF

Info

Publication number
CN110533816B
CN110533816B CN201910828057.3A CN201910828057A CN110533816B CN 110533816 B CN110533816 B CN 110533816B CN 201910828057 A CN201910828057 A CN 201910828057A CN 110533816 B CN110533816 B CN 110533816B
Authority
CN
China
Prior art keywords
fingerprint
encryption
iteration
authorized
encryption scheme
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910828057.3A
Other languages
Chinese (zh)
Other versions
CN110533816A (en
Inventor
王智明
冯立华
徐雷
陶冶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201910828057.3A priority Critical patent/CN110533816B/en
Publication of CN110533816A publication Critical patent/CN110533816A/en
Application granted granted Critical
Publication of CN110533816B publication Critical patent/CN110533816B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

The invention provides a remote encryption method and a remote encryption device for an authorized fingerprint of an electronic fingerprint lock, belongs to the technical field of data encryption, and can at least partially solve the problem that the existing encryption method for the authorized fingerprint of the electronic fingerprint lock is inconvenient to operate. The remote encryption method for the authorized fingerprint of the electronic fingerprint lock comprises the following steps: uploading electronic fingerprint lock data to a server through a remote terminal, wherein the electronic fingerprint lock data comprise a target electronic fingerprint lock identifier, an authorized fingerprint and an operator identifier; analyzing the authorized fingerprint to obtain an encryption scheme of the authorized fingerprint, and sending the encryption scheme to an edge server; and enabling the edge server to encrypt the authorization fingerprint according to the encryption scheme and returning the encrypted authorization fingerprint to the remote terminal.

Description

Remote encryption method and device for authorized fingerprint of electronic fingerprint lock
Technical Field
The invention belongs to the technical field of data encryption, and particularly relates to a remote encryption method and device for an authorized fingerprint of an electronic fingerprint lock.
Background
The electronic fingerprint lock is convenient, quick and high in safety, is accepted and used by more and more people, and plays an important role in protecting the property of people. The authorized fingerprint of the electronic fingerprint lock is a key of the electronic fingerprint lock, and the encryption of the authorized fingerprint of the electronic fingerprint lock is a main determining factor of the safety of the electronic fingerprint lock.
The fingerprint authorization encryption of the existing electronic fingerprint lock mostly depends on manual auxiliary operation, and an operator and the electronic fingerprint lock need to operate at the same place, so that the operation is inconvenient.
Disclosure of Invention
The invention at least partially solves the problem that the existing authorized fingerprint encryption method of the electronic fingerprint lock is inconvenient to operate, and provides a remote authorized fingerprint encryption method of the electronic fingerprint lock, which is convenient to operate.
One aspect of the present invention provides a remote encryption method for an authorized fingerprint of an electronic fingerprint lock, the method comprising:
uploading electronic fingerprint lock data to a server through a remote terminal, wherein the electronic fingerprint lock data comprise a target electronic fingerprint lock identifier, an authorized fingerprint and an operator identifier;
analyzing the authorized fingerprint to obtain an encryption scheme of the authorized fingerprint, and sending the encryption scheme to an edge server;
and enabling the edge server to encrypt the authorization fingerprint according to the encryption scheme and returning the encrypted authorization fingerprint to the remote terminal.
Optionally, the analyzing the authorized fingerprint to obtain an encryption scheme of the authorized fingerprint, and sending the encryption scheme to an edge server includes:
starting a new iteration loop, resetting the iteration times and setting an iteration initial parameter, wherein the iteration initial parameter comprises the maximum iteration times;
analyzing an authorized fingerprint through an encryption optimization analyzer to obtain an authorized fingerprint encryption scheme and encryption parameters of the encryption scheme;
judging whether the iteration times reach a threshold value, if so, ending the circulation and sending the iteration-obtained authorized fingerprint encryption scheme to an edge server;
if not, judging the encryption scheme according to the evaluation function, adding 1 to the iteration number when the evaluation function is not satisfied, and returning to the step of analyzing the authorized fingerprint by the encryption optimization analyzer to obtain the authorized fingerprint encryption scheme and the encryption parameters of the encryption scheme;
if the evaluation function is satisfied, ending the loop and sending the authorization fingerprint encryption scheme obtained by the iteration to the edge server.
Further optionally, the maximum number of iterations is between 45 and 55.
Further optionally, at the k-th iteration, the encryption parameter comprises a congestion delay of the authorization fingerprint
Figure BDA0002189750630000021
And authorizing fingerprint encryption time-consuming to bandwidth cost ratio
Figure BDA0002189750630000022
And i, j and t are coordinate items of random points in the authorized fingerprint.
Further optionally, the evaluation function at the k-th iteration is calculated according to the following formula:
Figure BDA0002189750630000023
wherein D is a variance function, m is the maximum value of all values of i, n is the maximum value of all values of j, and q is the maximum value of all values of t.
Further optionally, during the kth iteration, predicting the encryption parameter of the (k + 1) th iteration by using the encryption parameter is implemented according to the following formula:
Figure BDA0002189750630000024
wherein the content of the first and second substances,
Figure BDA0002189750630000025
Figure BDA0002189750630000026
is a deep unsupervised learning enhancement factor.
Further optionally, the deep unsupervised learning reinforcement factor is calculated using the following formula:
Figure BDA0002189750630000031
wherein H (X) is a hash function having a one-way property,
Figure BDA0002189750630000032
congestion delay for historical minimum grant fingerprintsThe latest time of the day is,
Figure BDA0002189750630000033
the minimum authorized fingerprint in history is encrypted by the ratio of time consumption to the cost of the consumed bandwidth.
Further optionally, the encryption parameter of the (k + 1) th iteration is used to instruct the encryption optimization analyzer to obtain a better authorized fingerprint encryption scheme.
Another aspect of the present invention provides an apparatus for remotely encrypting data of an electronic fingerprint lock, the apparatus comprising:
the system comprises an uploading unit, a server and a control unit, wherein the uploading unit is used for uploading electronic fingerprint lock data to the server through a remote terminal, and the electronic fingerprint lock data comprise a target electronic fingerprint lock identifier, an authorized fingerprint and an operator identifier;
the analysis unit is used for analyzing the authorized fingerprint to obtain an encryption scheme of the authorized fingerprint and sending the encryption scheme to an edge server;
and the processing unit is used for enabling the edge server to encrypt the authorization fingerprint according to the encryption scheme and returning the encrypted authorization fingerprint to the remote terminal.
Optionally, the analysis unit specifically includes the following modules:
the initial module is used for starting a new iteration cycle, resetting the iteration times and setting iteration initial parameters, wherein the iteration initial parameters comprise the maximum iteration times;
the encryption optimization analysis module is used for analyzing the authorized fingerprint through the encryption optimization analyzer to obtain an authorized fingerprint encryption scheme and encryption parameters of the encryption scheme;
the threshold comparison module is used for judging whether the iteration times reach a threshold value, if so, ending the circulation and sending the iteration-obtained authorized fingerprint encryption scheme to the edge server;
the evaluation function judging module is used for judging the encryption scheme according to the evaluation function when the iteration times do not reach the threshold value, adding 1 to the iteration times when the iteration times do not meet the evaluation function, and returning to the step of analyzing the authorized fingerprint by the encryption optimization analyzer to obtain the authorized fingerprint encryption scheme and the encryption parameters of the encryption scheme;
and the evaluation function processing module is used for ending the loop and sending the iteration-obtained authorized fingerprint encryption scheme to the edge server when the evaluation function is met.
The remote encryption method of the electronic fingerprint lock data can realize the encryption of the electronic fingerprint lock data through the remote terminal operation, and does not need to be simultaneously and simultaneously with the electronic fingerprint lock. Meanwhile, the server is used for optimizing the encryption scheme, the edge server is used for realizing encryption, a series of encryption processes are realized by the server, manual assistance is not needed, and the operation is convenient.
Drawings
Fig. 1 is a schematic flowchart of a remote encryption method for data of an electronic fingerprint lock according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating another method for remotely encrypting data of an electronic fingerprint lock according to an embodiment of the present invention;
fig. 3 is a block diagram of a remote encryption apparatus for data of an electronic fingerprint lock according to an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
It is to be understood that the specific embodiments and figures described herein are merely illustrative of the invention and are not limiting of the invention.
It is to be understood that the embodiments and features of the embodiments can be combined with each other without conflict.
It is to be understood that, for the convenience of description, only parts related to the present invention are shown in the drawings of the present invention, and parts not related to the present invention are not shown in the drawings.
It should be understood that each unit and module related in the embodiments of the present invention may correspond to only one physical structure, may also be composed of multiple physical structures, or multiple units and modules may also be integrated into one physical structure.
It will be understood that, without conflict, the functions, steps, etc. noted in the flowchart and block diagrams of the present invention may occur in an order different from that noted in the figures.
It is to be understood that the flowchart and block diagrams of the present invention illustrate the architecture, functionality, and operation of possible implementations of systems, apparatus, devices and methods according to various embodiments of the present invention. Each block in the flowchart or block diagrams may represent a unit, module, segment, code, which comprises executable instructions for implementing the specified function(s). Furthermore, each block or combination of blocks in the block diagrams and flowchart illustrations can be implemented by a hardware-based system that performs the specified functions or by a combination of hardware and computer instructions.
It is to be understood that the units and modules involved in the embodiments of the present invention may be implemented by software, and may also be implemented by hardware, for example, the units and modules may be located in a processor.
Example 1:
as shown in fig. 1, the present embodiment provides a remote encryption method for an authorized fingerprint of an electronic fingerprint lock, which includes:
s101, uploading electronic fingerprint lock data to a server through a remote terminal, wherein the electronic fingerprint lock data comprise a target electronic fingerprint lock identifier, an authorized fingerprint and an operator identifier.
S102, obtaining an encryption scheme of the authorized fingerprint by analyzing the authorized fingerprint, and sending the encryption scheme to an edge server.
S103, the edge server encrypts the authorization fingerprint according to the encryption scheme and returns the encrypted authorization fingerprint to the remote terminal.
The remote encryption method for the electronic fingerprint lock data can realize the encryption of the electronic fingerprint lock data through the remote terminal operation, and does not need to be simultaneously and simultaneously with the electronic fingerprint lock. Meanwhile, the server is used for optimizing the encryption scheme, the edge server is used for realizing encryption, a series of encryption processes are realized by the server, manual assistance is not needed, and the operation is convenient.
Example 2:
as shown in fig. 2, the present embodiment provides a remote encryption method for an authorized fingerprint of an electronic fingerprint lock, which includes:
s201, uploading electronic fingerprint lock data to a server through a remote terminal, wherein the electronic fingerprint lock data comprise a target electronic fingerprint lock identifier, an authorized fingerprint and an operator identifier.
An operator of the electronic lock uploads electronic fingerprint lock data of the electronic fingerprint lock with requirements to a server, such as a 5G communication base station, through a remote terminal (such as a mobile phone), and access and data transmission of an operator network are achieved. The electronic fingerprint lock data includes a target electronic fingerprint lock identification, an authorized fingerprint, and an operator identification.
And then, the 5G communication base station transmits the electronic fingerprint lock data to the electronic fingerprint lock data encryption optimization analyzer through the gateway.
Optionally, the target electronic fingerprint lock identifier and the indicated operator identifier are used to determine whether the authorized fingerprint is an authorized fingerprint corresponding to the electronic fingerprint lock.
And only when the operator identification and the electronic fingerprint lock identification are corresponding, namely the operator has the authority of operating the target electronic fingerprint lock, the authorized fingerprint in the electronic fingerprint lock data can be judged to be the authorized fingerprint of the target electronic fingerprint lock, the authorized fingerprint can be transmitted to the 5G communication base station, and otherwise, the uploading is given up and prompt information is sent to the terminal. Through the operation, mismatching of the electronic fingerprint lock and the authorized fingerprint caused by misoperation of an operator can be avoided, and the safety is improved.
S202, obtaining an encryption scheme of the authorized fingerprint by analyzing the authorized fingerprint, and sending the encryption scheme to the edge server.
And analyzing the authorized fingerprint in the electronic fingerprint lock data by (an electronic fingerprint lock data encryption optimization analyzer) to obtain an encryption scheme of the authorized fingerprint.
The method specifically comprises the following steps:
s2021, starting a new iteration loop, resetting the iteration times and setting an iteration initial parameter, wherein the iteration initial parameter comprises the maximum iteration times.
When the electronic fingerprint lock data encryption optimization analyzer receives new electronic fingerprint lock data, a new iteration loop is started. And starting a new iteration loop, resetting the iteration times and setting an iteration initial parameter, wherein the iteration initial parameter comprises the maximum iteration times.
Optionally, the maximum number of iterations is between 45 and 55.
Setting the maximum number of iterations between 44 and 55 may avoid that the encryption scheme is not optimized enough due to too few iterations, and may also avoid that resources and time are wasted due to too many iterations.
S2022, analyzing the authorized fingerprint through the encryption optimization analyzer to obtain an authorized fingerprint encryption scheme and encryption parameters of the encryption scheme.
And analyzing the authorized fingerprint by an encryption optimization analyzer (methods such as sparse matrix, hash function, singular point, shortest path, deep unsupervised learning and the like) to obtain a fingerprint encryption scheme and encryption parameters of the encryption scheme.
And S2023, judging whether the iteration number reaches a threshold value, if so, ending the loop and sending the encryption scheme of the authorized fingerprint obtained by the iteration to the edge server.
And judging whether the iteration number reaches a threshold value (maximum iteration number), if so, ending the iteration cycle and sending the iteration, namely the encryption scheme obtained by the last iteration, to the electronic fingerprint lock data encryption optimization edge server through the edge gateway.
S2024, if not, judging the encryption scheme according to the evaluation function, adding 1 to the iteration number when the evaluation function is not satisfied, and returning to the step of analyzing the authorized fingerprint by the encryption optimization analyzer to obtain the authorized fingerprint encryption scheme and the encryption parameters of the encryption scheme.
If the maximum iteration number is not reached, judging the encryption scheme according to the evaluation function, namely substituting the encryption parameters into the evaluation function, if the evaluation function cannot be met, adding 1 to the iteration number, returning to the step of analyzing the authorized fingerprint by the encryption optimization analyzer to obtain the authorized fingerprint encryption scheme and the encryption parameters of the encryption scheme, and continuing to circulate.
And S2025, if the evaluation function is met, ending the loop and sending the authorized fingerprint encryption scheme obtained by the iteration to the edge server.
If the evaluation function can be met, the loop is ended, and the encryption scheme obtained by iteration is sent to the electronic fingerprint lock data encryption optimization edge server through the edge gateway.
Optionally, at the k-th iteration, the encryption parameter includes a congestion delay of the authorized fingerprint
Figure BDA0002189750630000071
And authorizing fingerprint encryption time-consuming to bandwidth cost ratio
Figure BDA0002189750630000072
And i, j and t are coordinate items of random points in the authorized fingerprint.
Further optionally, the evaluation function at the k-th iteration is calculated according to the following formula:
Figure BDA0002189750630000081
wherein D is a variance function, m is the maximum value of all values of i, n is the maximum value of all values of j, and q is the maximum value of all values of t.
Further optionally, during the kth iteration, predicting the encryption parameter of the (k + 1) th iteration by using the encryption parameter is implemented according to the following formula:
Figure BDA0002189750630000082
wherein the content of the first and second substances,
Figure BDA0002189750630000083
Figure BDA0002189750630000084
is a deep unsupervised learning enhancement factor.
The deep unsupervised learning reinforcement factor is calculated using the following formula:
Figure BDA0002189750630000085
wherein H (X) is a hash function having a one-way property,
Figure BDA0002189750630000086
the congestion delay for the historical minimum grant fingerprint,
Figure BDA0002189750630000087
the minimum authorized fingerprint in history is encrypted by the ratio of time consumption to the cost of the consumed bandwidth.
The encryption parameters of the (k + 1) th iteration are used for guiding the encryption optimization analyzer to obtain a better authorized fingerprint encryption scheme.
S203, the edge server encrypts the authorization fingerprint according to the encryption scheme and returns the encrypted authorization fingerprint to the remote terminal.
And after receiving the encryption scheme, the electronic fingerprint lock data encryption optimizing edge server encrypts the authorized fingerprint according to the encryption scheme, and returns the encrypted authorized fingerprint to the remote terminal through a communication network (such as a 5G communication base station).
The remote encryption method for the electronic fingerprint lock data can realize the encryption of the electronic fingerprint lock data through the remote terminal operation, and does not need to be simultaneously and simultaneously with the electronic fingerprint lock. Meanwhile, the server is used for optimizing the encryption scheme, the edge server is used for realizing encryption, a series of encryption processes are realized by the server, manual assistance is not needed, and the operation is convenient.
Example 3:
as shown in fig. 3, the present embodiment provides a remote encryption device for data of an electronic fingerprint lock, which specifically includes:
the system comprises an uploading unit, a server and a control unit, wherein the uploading unit is used for uploading electronic fingerprint lock data to the server through a remote terminal, and the electronic fingerprint lock data comprise a target electronic fingerprint lock identifier, an authorized fingerprint and an operator identifier;
the analysis unit is used for obtaining an encryption scheme of the authorized fingerprint by analyzing the authorized fingerprint and sending the encryption scheme to the edge server;
and the processing unit is used for enabling the edge server to encrypt the authorization fingerprint according to the encryption scheme and returning the encrypted authorization fingerprint to the remote terminal.
Optionally, the analysis unit specifically includes the following modules:
the initial module is used for starting a new iteration cycle, resetting the iteration times and setting iteration initial parameters, wherein the iteration initial parameters comprise the maximum iteration times;
the encryption optimization analysis module is used for analyzing the authorized fingerprint through the encryption optimization analyzer to obtain an authorized fingerprint encryption scheme and encryption parameters of the encryption scheme;
the threshold comparison module is used for judging whether the iteration times reach a threshold value, if so, ending the circulation and sending the iteration-obtained authorized fingerprint encryption scheme to the edge server;
the evaluation function judgment module is used for judging the encryption scheme according to the evaluation function when the iteration times do not reach the threshold value, adding 1 to the iteration times when the iteration times do not meet the evaluation function, and returning to the step of analyzing the authorized fingerprint by the encryption optimization analyzer to obtain the authorized fingerprint encryption scheme and the encryption parameters of the encryption scheme;
and the evaluation function processing module is used for ending the loop and sending the iteration-obtained authorized fingerprint encryption scheme to the edge server when the evaluation function is met.
The remote encryption device for the electronic fingerprint lock data can realize the encryption of the electronic fingerprint lock data through the remote terminal operation, and does not need to be simultaneously and simultaneously with the electronic fingerprint lock. Meanwhile, the server is used for optimizing the encryption scheme, the edge server is used for realizing encryption, a series of encryption processes are realized by the server, manual assistance is not needed, and the operation is convenient.
It will be understood that the above embodiments are merely exemplary embodiments taken to illustrate the principles of the present invention, which is not limited thereto. It will be apparent to those skilled in the art that various modifications and improvements can be made without departing from the spirit and substance of the invention, and these modifications and improvements are also considered to be within the scope of the invention.

Claims (5)

1. A method for remotely encrypting an authorized fingerprint of an electronic fingerprint lock, the method comprising:
uploading electronic fingerprint lock data to a server through a remote terminal, wherein the electronic fingerprint lock data comprise a target electronic fingerprint lock identifier, an authorized fingerprint and an operator identifier;
analyzing the authorized fingerprint to obtain an encryption scheme of the authorized fingerprint, and sending the encryption scheme to an edge server;
enabling the edge server to encrypt the authorization fingerprint according to the encryption scheme and returning the encrypted authorization fingerprint to the remote terminal;
the obtaining of the encryption scheme of the authorized fingerprint by analyzing the authorized fingerprint and sending the encryption scheme to the edge server includes:
starting a new iteration loop, resetting the iteration times and setting an iteration initial parameter, wherein the iteration initial parameter comprises the maximum iteration times;
analyzing an authorized fingerprint through an encryption optimization analyzer to obtain an authorized fingerprint encryption scheme and encryption parameters of the encryption scheme;
judging whether the iteration times reach a threshold value, if so, ending the circulation and sending the iteration-obtained authorized fingerprint encryption scheme to an edge server;
if not, judging the encryption scheme according to the evaluation function, adding 1 to the iteration number when the evaluation function is not satisfied, and returning to the step of analyzing the authorized fingerprint by the encryption optimization analyzer to obtain the authorized fingerprint encryption scheme and the encryption parameters of the encryption scheme;
if the evaluation function is met, ending the loop and sending the iteration-obtained authorized fingerprint encryption scheme to the edge server;
at the k-th iteration, the encryption parameters comprise congestion delay of authorized fingerprints
Figure FDA0003085095550000011
And authorizing fingerprint encryption time-consuming to bandwidth cost ratio
Figure FDA0003085095550000012
Wherein, i, j, t is a coordinate item of a random point in the authorized fingerprint;
the merit function at the kth iteration is calculated according to the following formula:
Figure FDA0003085095550000021
wherein D is a variance function, m is the maximum value of all values of i, n is the maximum value of all values of j, and q is the maximum value of all values of t;
and in the k iteration, predicting the encryption parameter of the (k + 1) th iteration by using the encryption parameter according to the following formula:
Figure FDA0003085095550000022
wherein the content of the first and second substances,
Figure FDA0003085095550000023
Figure FDA0003085095550000024
is a deep unsupervised learning enhancement factor.
2. The method of claim 1,
the maximum number of iterations is between 45 and 55.
3. The method of claim 1,
the deep unsupervised learning reinforcement factor is calculated using the following formula:
Figure FDA0003085095550000025
π∈(0,1)
wherein H (X) is a hash function having a one-way property,
Figure FDA0003085095550000026
the congestion delay for the historical minimum grant fingerprint,
Figure FDA0003085095550000027
the minimum authorized fingerprint in history is encrypted by the ratio of time consumption to the cost of the consumed bandwidth.
4. The method of claim 1,
and the encryption parameter of the (k + 1) th iteration is used for guiding the encryption optimization analyzer to obtain a more optimal authorized fingerprint encryption scheme.
5. An apparatus for remotely encrypting data of an electronic fingerprint lock, the apparatus comprising:
the system comprises an uploading unit, a server and a control unit, wherein the uploading unit is used for uploading electronic fingerprint lock data to the server through a remote terminal, and the electronic fingerprint lock data comprise a target electronic fingerprint lock identifier, an authorized fingerprint and an operator identifier;
the analysis unit is used for analyzing the authorized fingerprint to obtain an encryption scheme of the authorized fingerprint and sending the encryption scheme to an edge server;
the processing unit is used for enabling the edge server to encrypt the authorization fingerprint according to the encryption scheme and returning the encrypted authorization fingerprint to the remote terminal;
the analysis unit specifically comprises the following modules:
the initial module is used for starting a new iteration cycle, resetting the iteration times and setting iteration initial parameters, wherein the iteration initial parameters comprise the maximum iteration times;
the encryption optimization analysis module is used for analyzing the authorized fingerprint through the encryption optimization analyzer to obtain an authorized fingerprint encryption scheme and encryption parameters of the encryption scheme;
the threshold comparison module is used for judging whether the iteration times reach a threshold value, if so, ending the circulation and sending the iteration-obtained authorized fingerprint encryption scheme to the edge server;
the evaluation function judging module is used for judging the encryption scheme according to the evaluation function when the iteration times do not reach the threshold value, adding 1 to the iteration times when the iteration times do not meet the evaluation function, and returning to the step of analyzing the authorized fingerprint by the encryption optimization analyzer to obtain the authorized fingerprint encryption scheme and the encryption parameters of the encryption scheme;
the evaluation function processing module is used for ending the circulation and sending the iteration-obtained authorized fingerprint encryption scheme to the edge server when the evaluation function is met;
at the k-th iteration, the encryption parameters comprise congestion delay of authorized fingerprints
Figure FDA0003085095550000031
And authorizing fingerprint encryption time-consuming to bandwidth cost ratio
Figure FDA0003085095550000032
Wherein, i, j, t is a coordinate item of a random point in the authorized fingerprint;
the merit function at the kth iteration is calculated according to the following formula:
Figure FDA0003085095550000033
wherein D is a variance function, m is the maximum value of all values of i, n is the maximum value of all values of j, and q is the maximum value of all values of t;
and in the k iteration, predicting the encryption parameter of the (k + 1) th iteration by using the encryption parameter according to the following formula:
Figure FDA0003085095550000041
CN201910828057.3A 2019-09-03 2019-09-03 Remote encryption method and device for authorized fingerprint of electronic fingerprint lock Active CN110533816B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910828057.3A CN110533816B (en) 2019-09-03 2019-09-03 Remote encryption method and device for authorized fingerprint of electronic fingerprint lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910828057.3A CN110533816B (en) 2019-09-03 2019-09-03 Remote encryption method and device for authorized fingerprint of electronic fingerprint lock

Publications (2)

Publication Number Publication Date
CN110533816A CN110533816A (en) 2019-12-03
CN110533816B true CN110533816B (en) 2021-07-27

Family

ID=68666505

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910828057.3A Active CN110533816B (en) 2019-09-03 2019-09-03 Remote encryption method and device for authorized fingerprint of electronic fingerprint lock

Country Status (1)

Country Link
CN (1) CN110533816B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112491862B (en) * 2020-11-23 2022-08-02 中国联合网络通信集团有限公司 Distributed encryption method and device
CN112437086B (en) * 2020-11-23 2022-07-29 中国联合网络通信集团有限公司 Method, device and system for acquiring monitoring data
CN112241547B (en) * 2020-11-23 2023-06-06 中国联合网络通信集团有限公司 Vehicle data encryption analysis method, edge server and storage medium
CN112364365B (en) * 2020-11-23 2023-05-23 中国联合网络通信集团有限公司 Industrial data encryption method, edge server and computer readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101374043A (en) * 2007-08-24 2009-02-25 管海明 Cipher key negotiating method, enciphering/deciphering method and signature/verification method
CN103605934A (en) * 2013-11-06 2014-02-26 北京深思数盾科技有限公司 Protection method and device for executable files
CN109448197A (en) * 2018-12-18 2019-03-08 杭州高锦科技有限公司 A kind of cloud intelligent lock system and key management method based on multi-enciphering mode
CN109766050A (en) * 2019-01-28 2019-05-17 努比亚技术有限公司 Fingerprint identification method, terminal and computer readable storage medium
CN109859350A (en) * 2018-11-19 2019-06-07 上海奥宜电子科技有限公司 A kind of self-service input method of the fingerprint of remote authorization and hotel self-service move in method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101374043A (en) * 2007-08-24 2009-02-25 管海明 Cipher key negotiating method, enciphering/deciphering method and signature/verification method
CN103605934A (en) * 2013-11-06 2014-02-26 北京深思数盾科技有限公司 Protection method and device for executable files
CN109859350A (en) * 2018-11-19 2019-06-07 上海奥宜电子科技有限公司 A kind of self-service input method of the fingerprint of remote authorization and hotel self-service move in method
CN109448197A (en) * 2018-12-18 2019-03-08 杭州高锦科技有限公司 A kind of cloud intelligent lock system and key management method based on multi-enciphering mode
CN109766050A (en) * 2019-01-28 2019-05-17 努比亚技术有限公司 Fingerprint identification method, terminal and computer readable storage medium

Also Published As

Publication number Publication date
CN110533816A (en) 2019-12-03

Similar Documents

Publication Publication Date Title
CN110533816B (en) Remote encryption method and device for authorized fingerprint of electronic fingerprint lock
CN107667369B (en) Use of a mobile device with a lock
EP3716227B1 (en) Identity verification method and device and electronic device
US9451454B2 (en) Mobile device identification for secure device access
EP3839774A1 (en) Continuous authentication system and related methods
US8234492B2 (en) Method, client and system for reversed access to management server using one-time password
CN111092899B (en) Information acquisition method, device, equipment and medium
US8707444B2 (en) Systems and methods for implementing application control security
GB2585170A (en) Oblivious pseudorandom function in a key management system
RU2007130340A (en) METHOD FOR CREATING A SAFE CODE, METHODS FOR ITS USE AND PROGRAMMABLE DEVICE FOR IMPLEMENTING THE METHOD
KR101410764B1 (en) Apparatus and method for remotely deleting important information
CN109685946A (en) Open method, device, equipment and the storage medium of lockset
CN110879879A (en) Internet of things identity authentication method and device, electronic equipment, system and storage medium
CN110661779A (en) Block chain network-based electronic certificate management method, system, device and medium
CN104853354A (en) Bluetooth authentication method and system thereof
CN115348037A (en) Identity authentication method, device and equipment of terminal equipment
AU2014256198A1 (en) Terminal, network side device, terminal application control method, and system
CN1494686A (en) User identification with improved password input method
US11133935B2 (en) System for integrity validation of authorization data using cryptographic hashes
CN104640112A (en) Authentication method, device and system
Yinhui et al. Research on a provable security RFID authentication protocol based on Hash function
Illakiya et al. E-voting system using biometric testament and cloud storage
US20210099281A1 (en) System for authorization and authentication using nonce values and hash algorithms
CN114299636B (en) Method and apparatus for processing device offline passwords
CN114697117A (en) Verification method, device, scrambler and system based on positioning information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant