CN111415441A - Method and device for managing key data - Google Patents

Method and device for managing key data Download PDF

Info

Publication number
CN111415441A
CN111415441A CN202010111906.6A CN202010111906A CN111415441A CN 111415441 A CN111415441 A CN 111415441A CN 202010111906 A CN202010111906 A CN 202010111906A CN 111415441 A CN111415441 A CN 111415441A
Authority
CN
China
Prior art keywords
encryption algorithm
key
encryption
data packet
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010111906.6A
Other languages
Chinese (zh)
Inventor
洪志加
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hongxin Technology Guangzhou Co ltd
Original Assignee
Hongxin Technology Guangzhou Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hongxin Technology Guangzhou Co ltd filed Critical Hongxin Technology Guangzhou Co ltd
Priority to CN202010111906.6A priority Critical patent/CN111415441A/en
Publication of CN111415441A publication Critical patent/CN111415441A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00857Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00825Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00841Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed by a portable device
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00857Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
    • G07C2009/00865Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed remotely by wireless communication
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00857Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
    • G07C2009/00873Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed by code input from the lock

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to the field of key management, and discloses a method and a device for managing key data, wherein the method comprises the following steps: A) collecting key information of a user in a first door lock; B) encrypting the key information by adopting an encryption algorithm in the first door lock to generate an encryption key data packet, and sending the encryption key data packet to a mobile phone key APP in a wireless mode, wherein the mobile phone key APP stores the encryption key data packet locally and generates a decryption key corresponding to the encryption key data packet; C) the mobile phone key APP sends the encryption key data packet to a second door lock in a wireless mode; D) and inputting a decryption key corresponding to the encryption key data packet into the second door lock for decryption, and storing decrypted key information in the second door lock. The method and the device for managing the key data have the following beneficial effects: convenient operation and high safety.

Description

Method and device for managing key data
Technical Field
The present invention relates to the field of key management, and in particular, to a method and an apparatus for managing key data.
Background
The intelligent door lock is an improved lock which is different from the traditional mechanical lock and is more intelligent, simple and convenient in the aspects of user safety, identification and manageability. The intelligent door lock is an execution component for locking a door in an access control system. A non-mechanical key is used as the user identification ID. The current intelligent lock application scene that needs to type in key data in batches, for example hotel, school's dormitory, residential quarter, office building etc. prior art's key type mode is mostly types one by one on every lock, and it is very inconvenient to operate, and the security is low.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a method and an apparatus for key data management with convenient operation and high security, aiming at the above-mentioned defects in the prior art.
The technical scheme adopted by the invention for solving the technical problems is as follows: a method of constructing a key data management comprising the steps of:
A) collecting key information of a user in a first door lock;
B) encrypting the key information by adopting an encryption algorithm in the first door lock to generate an encryption key data packet, and sending the encryption key data packet to a mobile phone key APP in a wireless mode, wherein the mobile phone key APP stores the encryption key data packet locally and generates a decryption key corresponding to the encryption key data packet;
C) the mobile phone key APP sends the encryption key data packet to a second door lock in a wireless mode;
D) and inputting a decryption key corresponding to the encryption key data packet into the second door lock for decryption, and storing decrypted key information in the second door lock.
In the method for managing the key data, the encryption algorithm is a DES encryption algorithm, a 3DES encryption algorithm, an RC2 encryption algorithm, an RC4 encryption algorithm, an IDEA encryption algorithm, an RSA encryption algorithm, a DSA encryption algorithm, an AES encryption algorithm, a B L FISH encryption algorithm, an ElGamal encryption algorithm, a Deffe-Hellman encryption algorithm, an ECC encryption algorithm or an MD5 encryption algorithm.
In the method for managing the key data, the wireless mode is any one or combination of any more of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and an L oRa module.
The invention also relates to a device for realizing the method for managing the key data, which comprises the following steps:
a key information acquisition unit: the key information acquisition device is used for acquiring key information of a user in a first door lock;
decryption key generation unit: the mobile phone key APP is used for encrypting the key information by adopting an encryption algorithm in the first door lock to generate an encryption key data packet and sending the encryption key data packet to a mobile phone key APP in a wireless mode, and the mobile phone key APP stores the encryption key data packet locally and generates a decryption key corresponding to the encryption key data packet;
encryption key packet transmitting unit: the mobile phone key APP is used for sending the encryption key data packet to a second door lock in a wireless mode;
decrypting the storage unit: and the second door lock is used for inputting a decryption key corresponding to the encryption key data packet into the second door lock for decryption, and storing decrypted key information in the second door lock.
In the device, the encryption algorithm is DES encryption algorithm, 3DES encryption algorithm, RC2 encryption algorithm, RC4 encryption algorithm, IDEA encryption algorithm, RSA encryption algorithm, DSA encryption algorithm, AES encryption algorithm, B L OWFISH encryption algorithm, ElGamal encryption algorithm, Deffee-Hellman encryption algorithm, ECC encryption algorithm or MD5 encryption algorithm.
In the device of the invention, the wireless mode is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and an L oRa module.
The method and the device for managing the key data have the following beneficial effects: the key information of the user is collected in the first door lock; encrypting the key information by adopting an encryption algorithm in the first door lock to generate an encryption key data packet, and sending the encryption key data packet to a mobile phone key APP in a wireless mode, wherein the mobile phone key APP stores the encryption key data packet locally and generates a decryption key corresponding to the encryption key data packet; the mobile phone key APP sends the encryption key data packet to the second door lock in a wireless mode; inputting a decryption key corresponding to the encryption key data packet into the second door lock for decryption, and storing decrypted key information in the second door lock; the invention has convenient operation and higher safety.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flow chart of a method in one embodiment of the method and apparatus for key data management of the present invention;
fig. 2 is a schematic structural diagram of the device in the embodiment.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the embodiments of the method and apparatus for managing key data of the present invention, a flowchart of the method for managing key data is shown in fig. 1. In fig. 1, the method for managing key data includes the following steps:
step S01 collects key information of the user in the first door lock: in this step, key information of the user is collected in the first door lock. The collected key information can be one or more of face information, fingerprint information, password information or induction card information.
Step S02 encrypts the key information in the first door lock using an encryption algorithm to generate an encryption key data packet, and sends the encryption key data packet to the mobile phone key APP in a wireless manner, where the mobile phone key APP stores the encryption key data packet locally, and generates a decryption key corresponding to the encryption key data packet: in the step, after the key information is collected, the key information is encrypted by adopting an encryption algorithm in the first door lock to generate an encryption key data packet, the security is improved, then the encryption key data packet is sent to the mobile phone key APP in a wireless mode, the mobile phone key APP stores the encryption key data packet locally, and a decryption key corresponding to the encryption key data packet is generated.
It is worth mentioning that in the method for key data management of the present invention, the encryption algorithm may be a DES encryption algorithm, a 3DES encryption algorithm, an RC2 encryption algorithm, an RC4 encryption algorithm, an IDEA encryption algorithm, an RSA encryption algorithm, a DSA encryption algorithm, an AES encryption algorithm, a B L OWFISH encryption algorithm, an ElGamal encryption algorithm, a Deffie-Hellman encryption algorithm, an ECC encryption algorithm, or an MD5 encryption algorithm.
The Encryption algorithm is based on DES, and three times encrypts a block of data by three different keys with higher strength, RC2 and RC4 encrypt a large amount of data by using variable-length keys, which is faster than DES (international data Encryption algorithm), and the Encryption algorithm provides very strong security by using 128-bit keys, RSA is a public key algorithm supporting variable-length keys invented by RSA company, and the length of a file block to be encrypted is also variable DSA (digital Signature algorithm), which is a standard DSS (digital Signature standard) advanced Encryption standard, which is a next generation Encryption standard, and the speed of the Encryption algorithm is high, the security level is high, one of the current AES standards is a RijOW standard, the Encryption standard is an advanced Encryption standard, and the Encryption algorithm is a new type of Encryption algorithm which is generally applied to a new type of Encryption algorithm, such as FISH (Encryption algorithm), the Encryption algorithm can reach 448, and the algorithm is generally applied to a new type of Encryption algorithm, such as a FISH (data Encryption algorithm), and a data Encryption algorithm which can be applied to a new type of Encryption algorithm, such as a FISH (data Encryption algorithm), a rapid Encryption algorithm, a data Encryption algorithm which can be applied to a data Encryption algorithm, a data Encryption algorithm which can be applied to a data Encryption standard, a data Encryption algorithm which is applied to a data Encryption standard, a data Encryption algorithm which can be applied to a data Encryption algorithm, a.
The invention relates to a method for managing key data, wherein the wireless mode is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a L oRa module, through setting a plurality of wireless communication modes, the flexibility of the wireless communication mode can be increased, and the requirements of different users and different occasions can be met.
Step S03, the mobile phone key APP sends the encryption key data packet to the second door lock in a wireless manner: in this step, the user sends the encryption key data packet generated by the first door lock stored in the mobile phone to the second door lock in a wireless mode by adopting a mobile phone key APP or a remote operation mode.
Step S04 is to input the decryption key corresponding to the encryption key data packet into the second door lock for decryption, and store the decrypted key information in the second door lock: in this step, the decryption key that the input corresponds encryption key data package in the second door lock is deciphered, and the key information storage after the decryption is in the second door lock, be used for comparing the data of input when unblanking, can conveniently set up the family of compriseing a plurality of locks through such mode, the business, the dormitory of school, residential quarter, office access control management system, even door lock self can not network to high in the clouds, also can realize typing in key data in batches, and convenient for operation, and through the form of encryption and key decryption, and is safe and reliable more. The method for managing the key data is convenient to operate and high in safety.
The embodiment also relates to a device for implementing the method for managing the key data, and the structural schematic diagram of the device is shown in fig. 2. In fig. 2, the apparatus includes a key information acquisition unit 1, a decryption key generation unit 2, an encryption key packet transmission unit 3, and a decryption storage unit 4; the key information acquisition unit 1 is used for acquiring key information of a user in a first door lock; the collected key information can be one or more of face information, fingerprint information, password information or induction card information.
Decryption key generation unit 2 is arranged in adopting the encryption algorithm to encrypt the key information in first lock, generates encryption key data package, improves the security to send encryption key data package to cell-phone key APP through wireless mode, cell-phone key APP stores the encryption key data package locally, and the decryption key that generates corresponding encryption key data package.
It is worth mentioning that in the apparatus of the present invention, the encryption algorithm may be a DES encryption algorithm, a 3DES encryption algorithm, an RC2 encryption algorithm, an RC4 encryption algorithm, an IDEA encryption algorithm, an RSA encryption algorithm, a DSA encryption algorithm, an AES encryption algorithm, a B L OWFISH encryption algorithm, an ElGamal encryption algorithm, a Deffie-Hellman encryption algorithm, an ECC encryption algorithm, or an MD5 encryption algorithm.
The Encryption algorithm is based on DES, and three times encrypts a block of data by three different keys with higher strength, RC2 and RC4 encrypt a large amount of data by using variable-length keys, which is faster than DES (international data Encryption algorithm), and the Encryption algorithm provides very strong security by using 128-bit keys, RSA is a public key algorithm supporting variable-length keys invented by RSA company, and the length of a file block to be encrypted is also variable DSA (digital Signature algorithm), which is a standard DSS (digital Signature standard) advanced Encryption standard, which is a next generation Encryption standard, and the speed of the Encryption algorithm is high, the security level is high, one of the current AES standards is a RijOW standard, the Encryption standard is an advanced Encryption standard, and the Encryption algorithm is a new type of Encryption algorithm which is generally applied to a new type of Encryption algorithm, such as FISH (Encryption algorithm), the Encryption algorithm can reach 448, and the algorithm is generally applied to a new type of Encryption algorithm, such as a FISH (data Encryption algorithm), and a data Encryption algorithm which can be applied to a new type of Encryption algorithm, such as a FISH (data Encryption algorithm), a rapid Encryption algorithm, a data Encryption algorithm which can be applied to a data Encryption algorithm, a data Encryption algorithm which can be applied to a data Encryption standard, a data Encryption algorithm which is applied to a data Encryption standard, a data Encryption algorithm which can be applied to a data Encryption algorithm, a.
The wireless mode is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a L oRa module, and by setting various wireless communication modes, the flexibility of the wireless communication mode can be increased, and the requirements of different users and different occasions can be met.
The encryption key data packet sending unit 3 is used for sending the encryption key data packet to the second door lock in a wireless mode through the mobile phone key APP; the decryption storage unit 4 is configured to input a decryption key corresponding to the encryption key data packet in the second door lock for decryption, and store the decrypted key information in the second door lock.
In summary, in the present embodiment, the key information of the user is collected in the first door lock; encrypting the key information by adopting an encryption algorithm in the first door lock to generate an encryption key data packet, and sending the encryption key data packet to a mobile phone key APP in a wireless mode, wherein the mobile phone key APP stores the encryption key data packet locally and generates a decryption key corresponding to the encryption key data packet; the mobile phone key APP sends the encryption key data packet to the second door lock in a wireless mode; inputting a decryption key corresponding to the encryption key data packet into the second door lock for decryption, and storing decrypted key information in the second door lock; the invention has convenient operation and higher safety.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (6)

1. A method of key data management, comprising the steps of:
A) collecting key information of a user in a first door lock;
B) encrypting the key information by adopting an encryption algorithm in the first door lock to generate an encryption key data packet, and sending the encryption key data packet to a mobile phone key APP in a wireless mode, wherein the mobile phone key APP stores the encryption key data packet locally and generates a decryption key corresponding to the encryption key data packet;
C) the mobile phone key APP sends the encryption key data packet to a second door lock in a wireless mode;
D) and inputting a decryption key corresponding to the encryption key data packet into the second door lock for decryption, and storing decrypted key information in the second door lock.
2. The method of key data management according to claim 1, wherein the encryption algorithm is a DES encryption algorithm, a 3DES encryption algorithm, an RC2 encryption algorithm, an RC4 encryption algorithm, an IDEA encryption algorithm, an RSA encryption algorithm, a DSA encryption algorithm, an AES encryption algorithm, a B L OWFISH encryption algorithm, an ElGamal encryption algorithm, a Deffie-Hellman encryption algorithm, an ECC encryption algorithm, or an MD5 encryption algorithm.
3. The method of claim 2, wherein the wireless mode is any one or a combination of any several of a 5G communication module, a 4G communication module, a bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module, and an L oRa module.
4. An apparatus implementing the method of key data management of claim 1, comprising:
a key information acquisition unit: the key information acquisition device is used for acquiring key information of a user in a first door lock;
decryption key generation unit: the mobile phone key APP is used for encrypting the key information by adopting an encryption algorithm in the first door lock to generate an encryption key data packet and sending the encryption key data packet to a mobile phone key APP in a wireless mode, and the mobile phone key APP stores the encryption key data packet locally and generates a decryption key corresponding to the encryption key data packet;
encryption key packet transmitting unit: the mobile phone key APP is used for sending the encryption key data packet to a second door lock in a wireless mode;
decrypting the storage unit: and the second door lock is used for inputting a decryption key corresponding to the encryption key data packet into the second door lock for decryption, and storing decrypted key information in the second door lock.
5. The apparatus of claim 4, wherein the encryption algorithm is a DES encryption algorithm, a 3DES encryption algorithm, an RC2 encryption algorithm, an RC4 encryption algorithm, an IDEA encryption algorithm, an RSA encryption algorithm, a DSA encryption algorithm, an AES encryption algorithm, a B L FISH encryption algorithm, an ElGamal encryption algorithm, a Deffe-Hellman encryption algorithm, an ECC encryption algorithm, or an MD5 encryption algorithm.
6. The apparatus of claim 5, wherein the wireless mode is any one or a combination of any more of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and an L oRa module.
CN202010111906.6A 2020-02-24 2020-02-24 Method and device for managing key data Pending CN111415441A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010111906.6A CN111415441A (en) 2020-02-24 2020-02-24 Method and device for managing key data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010111906.6A CN111415441A (en) 2020-02-24 2020-02-24 Method and device for managing key data

Publications (1)

Publication Number Publication Date
CN111415441A true CN111415441A (en) 2020-07-14

Family

ID=71492778

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010111906.6A Pending CN111415441A (en) 2020-02-24 2020-02-24 Method and device for managing key data

Country Status (1)

Country Link
CN (1) CN111415441A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101075866A (en) * 2006-12-26 2007-11-21 腾讯科技(深圳)有限公司 Method and system for loading message on Internet
CN101997682A (en) * 2009-08-10 2011-03-30 北京多思科技发展有限公司 Secure communication system and method
CN101997834A (en) * 2009-08-10 2011-03-30 北京多思科技发展有限公司 Device for supporting high-performance safety protocol
CN102013975A (en) * 2010-06-29 2011-04-13 北京飞天诚信科技有限公司 Secret key management method and system
CN102682506A (en) * 2012-05-25 2012-09-19 北京华大信安科技有限公司 Intelligent Bluetooth door access control method and device based on symmetric cryptographic technique
CN109215202A (en) * 2018-09-21 2019-01-15 广东汇泰龙科技有限公司 A kind of highly-safe key data management method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101075866A (en) * 2006-12-26 2007-11-21 腾讯科技(深圳)有限公司 Method and system for loading message on Internet
CN101997682A (en) * 2009-08-10 2011-03-30 北京多思科技发展有限公司 Secure communication system and method
CN101997834A (en) * 2009-08-10 2011-03-30 北京多思科技发展有限公司 Device for supporting high-performance safety protocol
CN102013975A (en) * 2010-06-29 2011-04-13 北京飞天诚信科技有限公司 Secret key management method and system
CN102682506A (en) * 2012-05-25 2012-09-19 北京华大信安科技有限公司 Intelligent Bluetooth door access control method and device based on symmetric cryptographic technique
CN109215202A (en) * 2018-09-21 2019-01-15 广东汇泰龙科技有限公司 A kind of highly-safe key data management method and system

Similar Documents

Publication Publication Date Title
CN105184935B (en) It is a kind of can wechat share the blue-tooth intelligence lock system of password
CN103124269B (en) Based on the Bidirectional identity authentication method of dynamic password and biological characteristic under cloud environment
US9253167B2 (en) Device and system for facilitating communication and networking within a secure mobile environment
CN100576792C (en) The method that file encryption is shared
CN109151053A (en) Anti- quantum calculation cloud storage method and system based on public asymmetric key pond
CN113364760A (en) Data encryption processing method and device, computer equipment and storage medium
CN109150519A (en) Anti- quantum calculation cloud storage method of controlling security and system based on public keys pond
US20130145169A1 (en) Efficient authentication for mobile and pervasive computing
CN109951513B (en) Quantum-resistant computing smart home quantum cloud storage method and system based on quantum key card
EP3337088A1 (en) Data encryption method, decryption method, apparatus, and system
KR20180119201A (en) Electronic device for authentication system
CN103036674B (en) Computer permission control method based on mobile dynamic password
CN110084054A (en) A kind of data privacy device, method, electronic equipment and storage medium
CN109462608A (en) Data encryption processing method, apparatus and system
CN113282944B (en) Intelligent lock unlocking method and device, electronic equipment and storage medium
CN107094138A (en) A kind of smart home safe communication system and communication means
KR20200135157A (en) Network security symmetric quantum cryptography key based encryption device
EP4300874A1 (en) Secure file sharing method and system based on domestic cryptographic algorithm
US10999073B2 (en) Secure network communication method
CN109995527B (en) Key interaction method and device, upper computer, lower computer and storage medium
CN111415441A (en) Method and device for managing key data
CN115776413A (en) Data transmission method and system based on iris encryption
CN113836546B (en) Key management method, device, equipment and storage medium
CN109302283A (en) Cloud storage method and system is acted on behalf of in anti-quantum calculation based on public asymmetric key pond
CN110048920B (en) Anti-quantum-computation intelligent home near-distance energy-saving communication method and system based on key fob

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200714