CN111415441A - Method and device for managing key data - Google Patents
Method and device for managing key data Download PDFInfo
- Publication number
- CN111415441A CN111415441A CN202010111906.6A CN202010111906A CN111415441A CN 111415441 A CN111415441 A CN 111415441A CN 202010111906 A CN202010111906 A CN 202010111906A CN 111415441 A CN111415441 A CN 111415441A
- Authority
- CN
- China
- Prior art keywords
- encryption algorithm
- key
- encryption
- data packet
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00857—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
- G07C2009/00825—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
- G07C2009/00841—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed by a portable device
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00857—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
- G07C2009/00865—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed remotely by wireless communication
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00857—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
- G07C2009/00873—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed by code input from the lock
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to the field of key management, and discloses a method and a device for managing key data, wherein the method comprises the following steps: A) collecting key information of a user in a first door lock; B) encrypting the key information by adopting an encryption algorithm in the first door lock to generate an encryption key data packet, and sending the encryption key data packet to a mobile phone key APP in a wireless mode, wherein the mobile phone key APP stores the encryption key data packet locally and generates a decryption key corresponding to the encryption key data packet; C) the mobile phone key APP sends the encryption key data packet to a second door lock in a wireless mode; D) and inputting a decryption key corresponding to the encryption key data packet into the second door lock for decryption, and storing decrypted key information in the second door lock. The method and the device for managing the key data have the following beneficial effects: convenient operation and high safety.
Description
Technical Field
The present invention relates to the field of key management, and in particular, to a method and an apparatus for managing key data.
Background
The intelligent door lock is an improved lock which is different from the traditional mechanical lock and is more intelligent, simple and convenient in the aspects of user safety, identification and manageability. The intelligent door lock is an execution component for locking a door in an access control system. A non-mechanical key is used as the user identification ID. The current intelligent lock application scene that needs to type in key data in batches, for example hotel, school's dormitory, residential quarter, office building etc. prior art's key type mode is mostly types one by one on every lock, and it is very inconvenient to operate, and the security is low.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a method and an apparatus for key data management with convenient operation and high security, aiming at the above-mentioned defects in the prior art.
The technical scheme adopted by the invention for solving the technical problems is as follows: a method of constructing a key data management comprising the steps of:
A) collecting key information of a user in a first door lock;
B) encrypting the key information by adopting an encryption algorithm in the first door lock to generate an encryption key data packet, and sending the encryption key data packet to a mobile phone key APP in a wireless mode, wherein the mobile phone key APP stores the encryption key data packet locally and generates a decryption key corresponding to the encryption key data packet;
C) the mobile phone key APP sends the encryption key data packet to a second door lock in a wireless mode;
D) and inputting a decryption key corresponding to the encryption key data packet into the second door lock for decryption, and storing decrypted key information in the second door lock.
In the method for managing the key data, the encryption algorithm is a DES encryption algorithm, a 3DES encryption algorithm, an RC2 encryption algorithm, an RC4 encryption algorithm, an IDEA encryption algorithm, an RSA encryption algorithm, a DSA encryption algorithm, an AES encryption algorithm, a B L FISH encryption algorithm, an ElGamal encryption algorithm, a Deffe-Hellman encryption algorithm, an ECC encryption algorithm or an MD5 encryption algorithm.
In the method for managing the key data, the wireless mode is any one or combination of any more of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and an L oRa module.
The invention also relates to a device for realizing the method for managing the key data, which comprises the following steps:
a key information acquisition unit: the key information acquisition device is used for acquiring key information of a user in a first door lock;
decryption key generation unit: the mobile phone key APP is used for encrypting the key information by adopting an encryption algorithm in the first door lock to generate an encryption key data packet and sending the encryption key data packet to a mobile phone key APP in a wireless mode, and the mobile phone key APP stores the encryption key data packet locally and generates a decryption key corresponding to the encryption key data packet;
encryption key packet transmitting unit: the mobile phone key APP is used for sending the encryption key data packet to a second door lock in a wireless mode;
decrypting the storage unit: and the second door lock is used for inputting a decryption key corresponding to the encryption key data packet into the second door lock for decryption, and storing decrypted key information in the second door lock.
In the device, the encryption algorithm is DES encryption algorithm, 3DES encryption algorithm, RC2 encryption algorithm, RC4 encryption algorithm, IDEA encryption algorithm, RSA encryption algorithm, DSA encryption algorithm, AES encryption algorithm, B L OWFISH encryption algorithm, ElGamal encryption algorithm, Deffee-Hellman encryption algorithm, ECC encryption algorithm or MD5 encryption algorithm.
In the device of the invention, the wireless mode is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and an L oRa module.
The method and the device for managing the key data have the following beneficial effects: the key information of the user is collected in the first door lock; encrypting the key information by adopting an encryption algorithm in the first door lock to generate an encryption key data packet, and sending the encryption key data packet to a mobile phone key APP in a wireless mode, wherein the mobile phone key APP stores the encryption key data packet locally and generates a decryption key corresponding to the encryption key data packet; the mobile phone key APP sends the encryption key data packet to the second door lock in a wireless mode; inputting a decryption key corresponding to the encryption key data packet into the second door lock for decryption, and storing decrypted key information in the second door lock; the invention has convenient operation and higher safety.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flow chart of a method in one embodiment of the method and apparatus for key data management of the present invention;
fig. 2 is a schematic structural diagram of the device in the embodiment.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the embodiments of the method and apparatus for managing key data of the present invention, a flowchart of the method for managing key data is shown in fig. 1. In fig. 1, the method for managing key data includes the following steps:
step S01 collects key information of the user in the first door lock: in this step, key information of the user is collected in the first door lock. The collected key information can be one or more of face information, fingerprint information, password information or induction card information.
Step S02 encrypts the key information in the first door lock using an encryption algorithm to generate an encryption key data packet, and sends the encryption key data packet to the mobile phone key APP in a wireless manner, where the mobile phone key APP stores the encryption key data packet locally, and generates a decryption key corresponding to the encryption key data packet: in the step, after the key information is collected, the key information is encrypted by adopting an encryption algorithm in the first door lock to generate an encryption key data packet, the security is improved, then the encryption key data packet is sent to the mobile phone key APP in a wireless mode, the mobile phone key APP stores the encryption key data packet locally, and a decryption key corresponding to the encryption key data packet is generated.
It is worth mentioning that in the method for key data management of the present invention, the encryption algorithm may be a DES encryption algorithm, a 3DES encryption algorithm, an RC2 encryption algorithm, an RC4 encryption algorithm, an IDEA encryption algorithm, an RSA encryption algorithm, a DSA encryption algorithm, an AES encryption algorithm, a B L OWFISH encryption algorithm, an ElGamal encryption algorithm, a Deffie-Hellman encryption algorithm, an ECC encryption algorithm, or an MD5 encryption algorithm.
The Encryption algorithm is based on DES, and three times encrypts a block of data by three different keys with higher strength, RC2 and RC4 encrypt a large amount of data by using variable-length keys, which is faster than DES (international data Encryption algorithm), and the Encryption algorithm provides very strong security by using 128-bit keys, RSA is a public key algorithm supporting variable-length keys invented by RSA company, and the length of a file block to be encrypted is also variable DSA (digital Signature algorithm), which is a standard DSS (digital Signature standard) advanced Encryption standard, which is a next generation Encryption standard, and the speed of the Encryption algorithm is high, the security level is high, one of the current AES standards is a RijOW standard, the Encryption standard is an advanced Encryption standard, and the Encryption algorithm is a new type of Encryption algorithm which is generally applied to a new type of Encryption algorithm, such as FISH (Encryption algorithm), the Encryption algorithm can reach 448, and the algorithm is generally applied to a new type of Encryption algorithm, such as a FISH (data Encryption algorithm), and a data Encryption algorithm which can be applied to a new type of Encryption algorithm, such as a FISH (data Encryption algorithm), a rapid Encryption algorithm, a data Encryption algorithm which can be applied to a data Encryption algorithm, a data Encryption algorithm which can be applied to a data Encryption standard, a data Encryption algorithm which is applied to a data Encryption standard, a data Encryption algorithm which can be applied to a data Encryption algorithm, a.
The invention relates to a method for managing key data, wherein the wireless mode is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a L oRa module, through setting a plurality of wireless communication modes, the flexibility of the wireless communication mode can be increased, and the requirements of different users and different occasions can be met.
Step S03, the mobile phone key APP sends the encryption key data packet to the second door lock in a wireless manner: in this step, the user sends the encryption key data packet generated by the first door lock stored in the mobile phone to the second door lock in a wireless mode by adopting a mobile phone key APP or a remote operation mode.
Step S04 is to input the decryption key corresponding to the encryption key data packet into the second door lock for decryption, and store the decrypted key information in the second door lock: in this step, the decryption key that the input corresponds encryption key data package in the second door lock is deciphered, and the key information storage after the decryption is in the second door lock, be used for comparing the data of input when unblanking, can conveniently set up the family of compriseing a plurality of locks through such mode, the business, the dormitory of school, residential quarter, office access control management system, even door lock self can not network to high in the clouds, also can realize typing in key data in batches, and convenient for operation, and through the form of encryption and key decryption, and is safe and reliable more. The method for managing the key data is convenient to operate and high in safety.
The embodiment also relates to a device for implementing the method for managing the key data, and the structural schematic diagram of the device is shown in fig. 2. In fig. 2, the apparatus includes a key information acquisition unit 1, a decryption key generation unit 2, an encryption key packet transmission unit 3, and a decryption storage unit 4; the key information acquisition unit 1 is used for acquiring key information of a user in a first door lock; the collected key information can be one or more of face information, fingerprint information, password information or induction card information.
Decryption key generation unit 2 is arranged in adopting the encryption algorithm to encrypt the key information in first lock, generates encryption key data package, improves the security to send encryption key data package to cell-phone key APP through wireless mode, cell-phone key APP stores the encryption key data package locally, and the decryption key that generates corresponding encryption key data package.
It is worth mentioning that in the apparatus of the present invention, the encryption algorithm may be a DES encryption algorithm, a 3DES encryption algorithm, an RC2 encryption algorithm, an RC4 encryption algorithm, an IDEA encryption algorithm, an RSA encryption algorithm, a DSA encryption algorithm, an AES encryption algorithm, a B L OWFISH encryption algorithm, an ElGamal encryption algorithm, a Deffie-Hellman encryption algorithm, an ECC encryption algorithm, or an MD5 encryption algorithm.
The Encryption algorithm is based on DES, and three times encrypts a block of data by three different keys with higher strength, RC2 and RC4 encrypt a large amount of data by using variable-length keys, which is faster than DES (international data Encryption algorithm), and the Encryption algorithm provides very strong security by using 128-bit keys, RSA is a public key algorithm supporting variable-length keys invented by RSA company, and the length of a file block to be encrypted is also variable DSA (digital Signature algorithm), which is a standard DSS (digital Signature standard) advanced Encryption standard, which is a next generation Encryption standard, and the speed of the Encryption algorithm is high, the security level is high, one of the current AES standards is a RijOW standard, the Encryption standard is an advanced Encryption standard, and the Encryption algorithm is a new type of Encryption algorithm which is generally applied to a new type of Encryption algorithm, such as FISH (Encryption algorithm), the Encryption algorithm can reach 448, and the algorithm is generally applied to a new type of Encryption algorithm, such as a FISH (data Encryption algorithm), and a data Encryption algorithm which can be applied to a new type of Encryption algorithm, such as a FISH (data Encryption algorithm), a rapid Encryption algorithm, a data Encryption algorithm which can be applied to a data Encryption algorithm, a data Encryption algorithm which can be applied to a data Encryption standard, a data Encryption algorithm which is applied to a data Encryption standard, a data Encryption algorithm which can be applied to a data Encryption algorithm, a.
The wireless mode is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a L oRa module, and by setting various wireless communication modes, the flexibility of the wireless communication mode can be increased, and the requirements of different users and different occasions can be met.
The encryption key data packet sending unit 3 is used for sending the encryption key data packet to the second door lock in a wireless mode through the mobile phone key APP; the decryption storage unit 4 is configured to input a decryption key corresponding to the encryption key data packet in the second door lock for decryption, and store the decrypted key information in the second door lock.
In summary, in the present embodiment, the key information of the user is collected in the first door lock; encrypting the key information by adopting an encryption algorithm in the first door lock to generate an encryption key data packet, and sending the encryption key data packet to a mobile phone key APP in a wireless mode, wherein the mobile phone key APP stores the encryption key data packet locally and generates a decryption key corresponding to the encryption key data packet; the mobile phone key APP sends the encryption key data packet to the second door lock in a wireless mode; inputting a decryption key corresponding to the encryption key data packet into the second door lock for decryption, and storing decrypted key information in the second door lock; the invention has convenient operation and higher safety.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.
Claims (6)
1. A method of key data management, comprising the steps of:
A) collecting key information of a user in a first door lock;
B) encrypting the key information by adopting an encryption algorithm in the first door lock to generate an encryption key data packet, and sending the encryption key data packet to a mobile phone key APP in a wireless mode, wherein the mobile phone key APP stores the encryption key data packet locally and generates a decryption key corresponding to the encryption key data packet;
C) the mobile phone key APP sends the encryption key data packet to a second door lock in a wireless mode;
D) and inputting a decryption key corresponding to the encryption key data packet into the second door lock for decryption, and storing decrypted key information in the second door lock.
2. The method of key data management according to claim 1, wherein the encryption algorithm is a DES encryption algorithm, a 3DES encryption algorithm, an RC2 encryption algorithm, an RC4 encryption algorithm, an IDEA encryption algorithm, an RSA encryption algorithm, a DSA encryption algorithm, an AES encryption algorithm, a B L OWFISH encryption algorithm, an ElGamal encryption algorithm, a Deffie-Hellman encryption algorithm, an ECC encryption algorithm, or an MD5 encryption algorithm.
3. The method of claim 2, wherein the wireless mode is any one or a combination of any several of a 5G communication module, a 4G communication module, a bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module, and an L oRa module.
4. An apparatus implementing the method of key data management of claim 1, comprising:
a key information acquisition unit: the key information acquisition device is used for acquiring key information of a user in a first door lock;
decryption key generation unit: the mobile phone key APP is used for encrypting the key information by adopting an encryption algorithm in the first door lock to generate an encryption key data packet and sending the encryption key data packet to a mobile phone key APP in a wireless mode, and the mobile phone key APP stores the encryption key data packet locally and generates a decryption key corresponding to the encryption key data packet;
encryption key packet transmitting unit: the mobile phone key APP is used for sending the encryption key data packet to a second door lock in a wireless mode;
decrypting the storage unit: and the second door lock is used for inputting a decryption key corresponding to the encryption key data packet into the second door lock for decryption, and storing decrypted key information in the second door lock.
5. The apparatus of claim 4, wherein the encryption algorithm is a DES encryption algorithm, a 3DES encryption algorithm, an RC2 encryption algorithm, an RC4 encryption algorithm, an IDEA encryption algorithm, an RSA encryption algorithm, a DSA encryption algorithm, an AES encryption algorithm, a B L FISH encryption algorithm, an ElGamal encryption algorithm, a Deffe-Hellman encryption algorithm, an ECC encryption algorithm, or an MD5 encryption algorithm.
6. The apparatus of claim 5, wherein the wireless mode is any one or a combination of any more of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and an L oRa module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010111906.6A CN111415441A (en) | 2020-02-24 | 2020-02-24 | Method and device for managing key data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010111906.6A CN111415441A (en) | 2020-02-24 | 2020-02-24 | Method and device for managing key data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111415441A true CN111415441A (en) | 2020-07-14 |
Family
ID=71492778
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010111906.6A Pending CN111415441A (en) | 2020-02-24 | 2020-02-24 | Method and device for managing key data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111415441A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101075866A (en) * | 2006-12-26 | 2007-11-21 | 腾讯科技(深圳)有限公司 | Method and system for loading message on Internet |
CN101997682A (en) * | 2009-08-10 | 2011-03-30 | 北京多思科技发展有限公司 | Secure communication system and method |
CN101997834A (en) * | 2009-08-10 | 2011-03-30 | 北京多思科技发展有限公司 | Device for supporting high-performance safety protocol |
CN102013975A (en) * | 2010-06-29 | 2011-04-13 | 北京飞天诚信科技有限公司 | Secret key management method and system |
CN102682506A (en) * | 2012-05-25 | 2012-09-19 | 北京华大信安科技有限公司 | Intelligent Bluetooth door access control method and device based on symmetric cryptographic technique |
CN109215202A (en) * | 2018-09-21 | 2019-01-15 | 广东汇泰龙科技有限公司 | A kind of highly-safe key data management method and system |
-
2020
- 2020-02-24 CN CN202010111906.6A patent/CN111415441A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101075866A (en) * | 2006-12-26 | 2007-11-21 | 腾讯科技(深圳)有限公司 | Method and system for loading message on Internet |
CN101997682A (en) * | 2009-08-10 | 2011-03-30 | 北京多思科技发展有限公司 | Secure communication system and method |
CN101997834A (en) * | 2009-08-10 | 2011-03-30 | 北京多思科技发展有限公司 | Device for supporting high-performance safety protocol |
CN102013975A (en) * | 2010-06-29 | 2011-04-13 | 北京飞天诚信科技有限公司 | Secret key management method and system |
CN102682506A (en) * | 2012-05-25 | 2012-09-19 | 北京华大信安科技有限公司 | Intelligent Bluetooth door access control method and device based on symmetric cryptographic technique |
CN109215202A (en) * | 2018-09-21 | 2019-01-15 | 广东汇泰龙科技有限公司 | A kind of highly-safe key data management method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105184935B (en) | It is a kind of can wechat share the blue-tooth intelligence lock system of password | |
CN103124269B (en) | Based on the Bidirectional identity authentication method of dynamic password and biological characteristic under cloud environment | |
US9253167B2 (en) | Device and system for facilitating communication and networking within a secure mobile environment | |
CN100576792C (en) | The method that file encryption is shared | |
CN109151053A (en) | Anti- quantum calculation cloud storage method and system based on public asymmetric key pond | |
CN113364760A (en) | Data encryption processing method and device, computer equipment and storage medium | |
CN109150519A (en) | Anti- quantum calculation cloud storage method of controlling security and system based on public keys pond | |
US20130145169A1 (en) | Efficient authentication for mobile and pervasive computing | |
CN109951513B (en) | Quantum-resistant computing smart home quantum cloud storage method and system based on quantum key card | |
EP3337088A1 (en) | Data encryption method, decryption method, apparatus, and system | |
KR20180119201A (en) | Electronic device for authentication system | |
CN103036674B (en) | Computer permission control method based on mobile dynamic password | |
CN110084054A (en) | A kind of data privacy device, method, electronic equipment and storage medium | |
CN109462608A (en) | Data encryption processing method, apparatus and system | |
CN113282944B (en) | Intelligent lock unlocking method and device, electronic equipment and storage medium | |
CN107094138A (en) | A kind of smart home safe communication system and communication means | |
KR20200135157A (en) | Network security symmetric quantum cryptography key based encryption device | |
EP4300874A1 (en) | Secure file sharing method and system based on domestic cryptographic algorithm | |
US10999073B2 (en) | Secure network communication method | |
CN109995527B (en) | Key interaction method and device, upper computer, lower computer and storage medium | |
CN111415441A (en) | Method and device for managing key data | |
CN115776413A (en) | Data transmission method and system based on iris encryption | |
CN113836546B (en) | Key management method, device, equipment and storage medium | |
CN109302283A (en) | Cloud storage method and system is acted on behalf of in anti-quantum calculation based on public asymmetric key pond | |
CN110048920B (en) | Anti-quantum-computation intelligent home near-distance energy-saving communication method and system based on key fob |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200714 |