CN112580082A - Data processing method and encryption lock equipment - Google Patents

Data processing method and encryption lock equipment Download PDF

Info

Publication number
CN112580082A
CN112580082A CN202011590928.1A CN202011590928A CN112580082A CN 112580082 A CN112580082 A CN 112580082A CN 202011590928 A CN202011590928 A CN 202011590928A CN 112580082 A CN112580082 A CN 112580082A
Authority
CN
China
Prior art keywords
ciphertext
data
request
target application
response data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011590928.1A
Other languages
Chinese (zh)
Other versions
CN112580082B (en
Inventor
孙吉平
杨友谊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Senseshield Technology Co Ltd
Original Assignee
Beijing Senseshield Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Senseshield Technology Co Ltd filed Critical Beijing Senseshield Technology Co Ltd
Priority to CN202011590928.1A priority Critical patent/CN112580082B/en
Publication of CN112580082A publication Critical patent/CN112580082A/en
Application granted granted Critical
Publication of CN112580082B publication Critical patent/CN112580082B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Abstract

The embodiment of the invention provides a data processing method and an encryption lock device, wherein the method is applied to the encryption lock device and comprises the following steps: obtaining a first request ciphertext based on the target application; analyzing and encrypting the first request ciphertext to form a second request ciphertext; sending the second request ciphertext to a target server based on the Internet of things so that the target server determines first response data based on the second request ciphertext; receiving a first encrypted response data ciphertext returned by the target server based on the Internet; and storing the first response data ciphertext and sending the first response data ciphertext to the target application. The data processing method is applied to the encryption lock equipment, and the encryption lock equipment can complete data receiving and sending under the condition of no networking.

Description

Data processing method and encryption lock equipment
Technical Field
The embodiment of the invention relates to the field of software protection, in particular to a data processing method and an encryption lock device.
Background
Currently, in the software protection industry, part of the license system is too dependent on internet implementation, for example, whether in the registration or use stage, the software on the host needs to be connected to the internet, otherwise the software cannot be used, however, in reality, not all hosts are connected to the internet, and the hosts which are not connected to the internet have no way to register the license or use the networking functions such as online license. The dongle as a license carrier usually does not have a secure internet access function, so that the host cannot use the function of the dongle that is used by networking when the host is not connected to the internet.
Disclosure of Invention
The invention provides a data processing method and electronic equipment applying the method, which are applied to encryption lock equipment, so that the encryption lock equipment can complete data receiving and sending without additionally arranging network equipment or under the networking condition.
Specifically, an embodiment of the present invention provides a data processing method, which is applied to an encryption lock device, and the method includes:
obtaining a first request ciphertext based on the target application;
analyzing and encrypting the first request ciphertext to form a second request ciphertext;
sending the second request ciphertext to a target server based on the Internet of things so that the target server determines first response data based on the second request ciphertext;
receiving a first encrypted response data ciphertext returned by the target server based on the Internet;
storing the device license ciphertext first response data ciphertext and sending the device license ciphertext to the target application
Preferably, the method further comprises the following steps:
obtaining a third request ciphertext based on the target application;
decrypting the third request ciphertext to obtain plaintext data, and verifying;
after the verification is passed, feeding back a second response data ciphertext to the target application so that the target application obtains second response data based on the second response data ciphertext.
Preferably, the encryption lock device and the target application both include a first key, the first request ciphertext is generated by the target application based on the first key, and the encryption lock device further includes a second key.
Preferably, the parsing and encrypting the first request ciphertext to form a second request ciphertext includes:
analyzing the first request ciphertext based on the first key;
and encrypting the analyzed request data based on the second key to generate the second request ciphertext.
Preferably, the request data comprises at least one of:
target application information, user identity information, and signature authentication information.
Preferably, the encryption lock device includes a narrowband internet of things module, and the sending the second request ciphertext to the target server based on the internet of things includes:
and the narrow-band Internet of things module sends the second request ciphertext to the target server based on a built-in communication address of the target server based on the Internet.
Preferably, the target server stores the second key therein, and the receiving, based on the internet, the encrypted first response data ciphertext returned by the target server includes:
and receiving a first response data ciphertext which is returned by the target server and is formed by encrypting the second secret key based on the Internet.
Another embodiment of the present invention further provides an encryption lock apparatus, including:
a body;
the main chip is arranged in the machine body, and a data interface is arranged on the main chip;
the narrow-band Internet of things module is arranged in the machine body, is provided with an antenna and a narrow-band Internet of things card, is connected with the communication interface and is used for receiving and transmitting data;
the main chip is used for obtaining a first request ciphertext from a target application in external equipment, and analyzing and encrypting the first request ciphertext to form a second request ciphertext;
the narrow-band Internet of things module is used for sending the second request ciphertext to a target server, so that the target server determines first response data based on the second request ciphertext, receives a first response data ciphertext formed by encryption returned by the target server, forwards the first response data ciphertext to the main chip through the data interface, and enables the main chip to store the first response data ciphertext and sends the first response data ciphertext to the target application through the data interface.
Preferably, the main chip and the narrowband internet of things module realize data interaction through the first interface, and the main chip and the target application of the external device realize data interaction through the second interface.
Preferably, after the target application implements local registration based on the device license cryptogram, the main chip is further configured to:
obtaining a third request ciphertext based on the target application;
decrypting the third request ciphertext to obtain plaintext data, and verifying;
after the verification is passed, feeding back a second response data ciphertext to the target application so that the target application obtains second response data based on the second response data ciphertext
Based on the disclosure of the embodiment, the embodiment of the invention has the beneficial effect that the encryption lock equipment is provided with the narrow-band internet of things module capable of receiving and sending data based on the internet of things, so that the encryption lock equipment can receive and send data without being additionally connected with other network equipment. Moreover, the power consumption for receiving and transmitting data based on the narrow-band internet of things module is lower, the energy consumption of the encryption lock equipment can be effectively saved, the encryption lock equipment is more convenient, the data can be received and transmitted even under the condition of no networking, the use range of a user is remarkably increased, and great use convenience is brought to the user.
Drawings
Fig. 1 is a flowchart of a data processing method in an embodiment of the present invention.
Fig. 2 is a flowchart of a data processing method according to another embodiment of the present invention.
Fig. 3 is a schematic structural diagram of an encryption lock device in an embodiment of the present invention.
Fig. 4 is a diagram illustrating a communication relationship between the encryption lock device and the host where the target application is located in the embodiment of the present invention.
Detailed Description
The following detailed description of specific embodiments of the present invention is provided in connection with the accompanying drawings, which are not intended to limit the invention.
It will be understood that various modifications may be made to the embodiments disclosed herein. The following description is, therefore, not to be taken in a limiting sense, but is made merely as an exemplification of embodiments. Other modifications will occur to those skilled in the art within the scope and spirit of the disclosure.
The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate embodiments of the disclosure and, together with a general description of the disclosure given above, and the detailed description of the embodiments given below, serve to explain the principles of the disclosure.
These and other characteristics of the invention will become apparent from the following description of a preferred form of embodiment, given as a non-limiting example, with reference to the accompanying drawings.
It should also be understood that, although the invention has been described with reference to some specific examples, a person of skill in the art shall certainly be able to achieve many other equivalent forms of the invention, having the characteristics as set forth in the claims and hence all coming within the field of protection defined thereby.
The above and other aspects, features and advantages of the present disclosure will become more apparent in view of the following detailed description when taken in conjunction with the accompanying drawings.
Specific embodiments of the present disclosure are described hereinafter with reference to the accompanying drawings; however, it is to be understood that the disclosed embodiments are merely examples of the disclosure that may be embodied in various forms. Well-known and/or repeated functions and structures have not been described in detail so as not to obscure the present disclosure with unnecessary or unnecessary detail. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a basis for the claims and as a representative basis for teaching one skilled in the art to variously employ the present disclosure in virtually any appropriately detailed structure.
The specification may use the phrases "in one embodiment," "in another embodiment," "in yet another embodiment," or "in other embodiments," which may each refer to one or more of the same or different embodiments in accordance with the disclosure.
Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
Currently, in the software protection industry, part of the license system is too dependent on internet implementation, for example, whether in the registration or use stage, the software on the host is not used, but in reality, not all hosts are internet-connected, and there is no way to register the license or use the online license without the host. The dongle as a license carrier usually does not have a secure internet access function, and further results in the host being unable to register and use the license when the host is not connected to the internet. In order to solve the problem that the host needs to access the internet to use the networking function of the encryption lock device, as shown in fig. 1, an embodiment of the present invention provides a data processing method applied to the encryption lock device, where the method includes:
obtaining a first request ciphertext based on the target application;
analyzing and encrypting the first request ciphertext to form a second request ciphertext;
sending the second request ciphertext to the target server based on the Internet of things so that the target server determines first response data based on the second request ciphertext;
receiving a first encrypted response data ciphertext returned by the target server based on the Internet;
and storing the first response data ciphertext and sending the first response data ciphertext to the target application.
For example, a narrowband internet of things module, such as an NB-IOT module (narrowband internet of things) based on a cellular) is disposed in the dongle device in this embodiment, and is configured to implement data transceiving based on the internet of things. Taking the local registration of the target application as an example, the user may input a request based on the target application and generate request data, such as registration request data, or may be other request data, which is not specific. And the target application encrypts the request data to generate a first request ciphertext and sends the first request ciphertext to the encryption lock equipment. And after receiving the first request ciphertext, the encryption lock equipment analyzes the first request ciphertext to obtain plaintext data of the request data, and then encrypts the analysis result again to generate a second request ciphertext. Then sending the second request ciphertext to a specified target server based on a narrow-band internet of things module, so that the target server determines device permission data based on the second request ciphertext, the device permission data is data for allowing the target application to be registered and used, after the target server determines the device permission data, the device permission data is sent to an encryption lock device through the internet, the encryption lock device stores the permission data ciphertext, so that when the next target application needs to obtain permission data again, the encryption lock device can check whether the permission data is stored locally, if the permission data is stored, the encryption lock device can directly feed the stored permission data back to the target application without requesting the permission data from the target server, namely, the encryption lock device inquires whether the permission data capable of meeting the request of the target application is stored in the encryption lock device when receiving the request data, and if the prestored permission data cannot meet the request of the target application, requesting to obtain the permission data corresponding to the request from the target server through the narrow-band Internet of things module. Finally, after the device license ciphertext is sent to the target application by the encryption lock device, the target application can complete functions such as registration based on the device license ciphertext, and the functions are not specific. The above-mentioned steps that the encryption lock device stores the obtained license data locally are not necessarily performed, but are merely an alternative, and other schemes may be adopted in actual application, for example, the encryption lock device does not store the license data, but obtains the license data required by the target application by interacting with the target server in real time or at regular time.
The embodiment of the invention has the beneficial effects that the encryption lock equipment is provided with the narrow-band Internet of things module capable of receiving and sending data based on the Internet of things, so that the encryption lock equipment can receive and send data without being additionally connected with other network equipment. Moreover, the power consumption for receiving and transmitting data based on the narrow-band internet of things module is lower, the energy consumption of the encryption lock equipment can be effectively saved, the encryption lock equipment is more convenient, the data can be received and transmitted even under the condition of no networking, the use range of a user is remarkably increased, and great use convenience is brought to the user.
Further, as shown in fig. 2, the method in this embodiment further includes:
obtaining a third request ciphertext based on the target application;
decrypting the third request ciphertext to obtain plaintext data, and verifying;
and after the verification is passed, feeding back a second response data ciphertext to the target application so that the target application obtains second response data based on the second response data ciphertext.
For example, continuing with the above embodiment, after the target application completes registration, it sends a permission request ciphertext to the encryption lock device, that is, a third request ciphertext, and the encryption lock device obtains the permission request ciphertext formed by processing the permission request ciphertext based on the target application, and then decrypts the permission request ciphertext to obtain plaintext data of the permission request, and performs verification. The permission request data in this embodiment includes information about the target application and the user of the target application. After the verification is passed, the encryption lock equipment distributes permission data to the current user, the distributed permission data are returned to the target application after being encrypted, namely second response data are fed back to the target application, the target application decrypts the returned data after receiving the permission request to obtain plaintext data, permission request success data are obtained based on the plaintext data, and the second response data returned by the encryption lock equipment are obtained, based on the data, the target application can be normally used by the user, namely the permission of the target application is successful, and the user can normally use the target application.
Further, the encryption lock device and the target application in this embodiment both include a first key, the first request ciphertext is generated by the target application based on the first key encryption, and the encryption lock device further includes a second key.
In this embodiment, parsing and encrypting the first request ciphertext to form a second request ciphertext includes:
analyzing the first request ciphertext based on the first key;
and encrypting the parsed request data based on the second key to generate a second request ciphertext.
Through encryption by different keys, the data security can be increased, and the data is not easy to steal in the communication process.
The request data in this embodiment may be registration request data, or other types of request data, and the request data may include at least one of the following data, but is not limited to the following data:
target application information, user identity information, and signature authentication information.
For example, the name, version number, user name, user password, signature authentication information of the user, signature authentication information of the target application, etc. of the target application are included.
Further, because the encryption lock device in this embodiment includes the narrowband internet of things module, sending the second request ciphertext to the target server based on the internet of things includes:
and the narrow-band Internet of things module sends the second request ciphertext to the target server based on the communication address of the built-in target server based on the narrow-band Internet of things.
The method comprises the following steps that a second secret key is stored in a target server, and when the encryption lock equipment receives a first response data ciphertext formed by encryption returned by the target server based on the Internet, the method comprises the following steps:
and receiving a first response data ciphertext which is returned by the target server and is formed by encrypting through a second secret key based on the Internet. The first response data cryptogram may be a license data cryptogram, as described above.
As shown in fig. 3, another embodiment of the present invention provides a dongle device, including:
a body;
the main chip is arranged in the machine body, and a data interface is arranged on the main chip;
the narrow-band Internet of things module is arranged in the machine body, is provided with an antenna and a narrow-band Internet of things card, is connected with the communication interface and is used for receiving and transmitting data;
the main chip is used for obtaining a first request ciphertext from a target application in the external equipment, and analyzing and encrypting the first request ciphertext to form a second request ciphertext;
the narrow-band Internet of things module is used for sending the second request ciphertext to the target server, enabling the target server to determine first response data based on the second request ciphertext, receiving the encrypted first response data ciphertext returned by the target server, forwarding the encrypted first response data ciphertext to the main chip through the data interface, enabling the main chip to store the first response data ciphertext, and sending the first response data ciphertext to the target application through the data interface.
For example, the main chip is a smart card chip, and has data operation and processing functions as well as a data storage function. And the COS system runs in the main chip, and can receive the request data sent by the target application and return the data to the target application. The narrowband internet of things module in the encryption lock device in this embodiment is an NB-IOT module (narrowband internet of things (navrowbandinternetworks) based on a honeycomb), and is configured to implement data transceiving based on the internet of things and the internet. Taking the local registration of the target application as an example, the user may input a request based on the target application and generate request data, such as registration request data, or may be other request data, which is not specific. And the target application encrypts the request data to generate a first request ciphertext and sends the first request ciphertext to the encryption lock equipment. And after receiving the first request ciphertext, the encryption lock equipment analyzes the first request ciphertext to obtain plaintext data of the request data, and then encrypts the analysis result again to generate a second request ciphertext. And then, sending the second request ciphertext to a specified target server based on the narrowband internet of things module, so that the target server determines first response data based on the second request ciphertext, for example, the first response data can be device permission data, which is data for allowing the target application to be registered and used, and after determining the first response data, the target server sends the first response data to the encryption lock device, so that the encryption lock device stores the first response data ciphertext, so that the subsequent target application can inquire whether the first response data ciphertext is stored or not when the subsequent target application needs to be used, and if so, the first response data ciphertext can be directly given to the target application, does not need to be requested from the target server, and only obtains the first response data from the target server when the subsequent target application is not locally stored. Finally, the encryption lock device sends the device license ciphertext to the target application, so that the target application can complete functions such as registration and the like based on the device license ciphertext, and the functions are not specific. The above-mentioned steps that the encryption lock device stores the obtained license data locally are not necessarily performed, but are merely an alternative, and other schemes may be adopted in actual application, for example, the encryption lock device does not store the license data, but obtains the license data required by the target application by interacting with the target server in real time or at regular time.
The embodiment of the invention has the beneficial effects that the encryption lock equipment is provided with the narrow-band Internet of things module capable of receiving and sending data based on the Internet of things, so that the encryption lock equipment can receive and send data without being additionally connected with other network equipment. Moreover, the power consumption for receiving and transmitting data based on the narrow-band internet of things module is lower, the energy consumption of the encryption lock equipment can be effectively saved, the encryption lock equipment is more convenient, the data can be received and transmitted even under the condition of no networking, the use range of a user is remarkably increased, and great use convenience is brought to the user.
Specifically, the encryption lock device in this embodiment has a first interface and a second interface, which may be a USB interface and a UART serial port, respectively, and the main chip and the narrowband internet of things module realize data interaction through the first interface, and meanwhile, the main chip and the target application of the external device can realize data interaction through the second interface.
Further, in this embodiment, after the target application implements local registration based on the device license ciphertext, the main chip is further configured to:
obtaining a third request ciphertext based on the target application;
decrypting the third request ciphertext to obtain plaintext data, and verifying and analyzing;
and after the verification is passed, feeding back a second response data ciphertext to the target application, so that the target application obtains second response data based on the second response data ciphertext.
For example, the master chip obtains a permission request ciphertext, namely a third request ciphertext, formed by processing the master chip based on the target application, then decrypts the permission request ciphertext to obtain plaintext data of the permission request, and verifies the plaintext data. The third request data in this embodiment includes the target application and the user-related information of the target application. After the verification is passed, the encryption lock device distributes permission data to a current user, namely the user, encrypts the distributed permission data and returns the encrypted permission data to the target application, namely distributes second response data to the target application, the target application decrypts the permission request returned data after receiving the permission request returned data to obtain plaintext data, and permission request success data, namely the second response data, is obtained based on the plaintext data, the user can normally use the target application based on the data, namely the target application is permitted successfully, and the user can normally use the target application.
Specifically, the following is illustrated by specific examples:
for example, the encryption lock device includes a smart card chip (main chip) and a narrowband internet of things module, which is abbreviated as NB-IOT module. The smart card chip has data operation and processing functions and a data storage function, a USB communication interface and a UART serial port are arranged on the encryption lock device, and the smart card chip can be directly connected with the USB interface and the UART serial port. The NB-IOT module is connected with the main chip through a UART serial port to realize data interaction. The COS system runs in the main chip, can receive request data sent by the target application through the USB interface, and can also return the data to the target application. Meanwhile, the COS system can also send data to the NB-IOT module or receive data returned from the NB-IOT module. The NB-IOT module is provided with an antenna and an NB-IOT card, namely the NB card, and an IP address of a target server is preset in the NB-IOT module so that data interaction with the target server can be realized in the environment of the Internet of things based on the address.
In actual use, as shown in fig. 4, the target application sends the license registration request ciphertext encrypted by AES using the key a to the encryption lock device through the USB interface. The main chip of the encryption lock device receives the permission registration request ciphertext (equivalent to the first request ciphertext) through the USB interface, and the main chip uses the key A stored inside to carry out AES decryption on the permission registration request ciphertext and verifies data. The license registration request data may include target application information, user and device related information for the target application, and signature authentication information.
Further, the permission registration request data after being analyzed and processed by the main chip is encrypted by a key B in the main chip to obtain a new permission registration request ciphertext (equivalent to a second request ciphertext) which is transmitted to the NB-IOT module through the UART serial port. And the NB-IOT module converts the data into wireless data after receiving the second request ciphertext and transmits the wireless data to the target server based on the built-in IP address.
And after receiving the second request ciphertext, the target server decrypts the ciphertext by using the key B stored in the target server to obtain permission registration request plaintext data, verifies the permission registration request plaintext data, obtains the communication address of the encryption lock equipment from the plaintext data or the target server after the verification is passed, encrypts the permission data of the equipment by using the key B to obtain equipment permission ciphertext, sends the equipment permission ciphertext to the obtained specified encryption lock equipment address through the Internet, and forwards the equipment permission ciphertext to the main chip by the NB-IOT module through the UART serial port. And after receiving the equipment permission ciphertext, the main chip decrypts the ciphertext by using the key B stored inside to obtain the permission plaintext, then verifies the permission plaintext, and stores the permission plaintext in a data storage area inside the main chip for subsequent use of the target application without acquiring the permission plaintext from a target server.
After the storage of the device permission data is finished, the permission related information is encrypted by the internal key A and then returned to the target application, and the target application receives the permission data ciphertext and then decrypts the permission data ciphertext through the key A to obtain the permission data plaintext, which represents the successful registration. In contrast, no permission data is obtained, representing a registration failure. After the user finishes registering the target application, the user can start to use the target application when the license needs to be acquired.
Further, after the target application encrypts the permission request data through the key a and sends the encrypted permission request data to the encryption lock device through the USB interface, the master chip decrypts the permission request ciphertext by using the internal key a to obtain a permission request data plaintext, which includes the target application and information related to a user of the target application, and verifies the data plaintext. After the verification is passed, the main chip distributes the permission to the current user, the distributed permission data is encrypted through the internal key A and returned to the target application, the target application receives the data ciphertext returned by the permission request, the key A is used for decryption, the permission request success data is obtained, at the moment, the permission is completed, and the user can normally use the target application.
The above embodiments are only exemplary embodiments of the present invention, and are not intended to limit the present invention, and the scope of the present invention is defined by the claims. Various modifications and equivalents may be made by those skilled in the art within the spirit and scope of the present invention, and such modifications and equivalents should also be considered as falling within the scope of the present invention.

Claims (10)

1. A data processing method is applied to a encryption lock device, and comprises the following steps:
obtaining a first request ciphertext based on the target application;
analyzing and encrypting the first request ciphertext to form a second request ciphertext;
sending the second request ciphertext to a target server based on the Internet of things so that the target server determines first response data based on the second request ciphertext;
receiving a first encrypted response data ciphertext returned by the target server based on the Internet;
and storing the first response data ciphertext and sending the first response data ciphertext to the target application.
2. The method of claim 1, further comprising:
obtaining a third request ciphertext based on the target application;
decrypting the third request ciphertext to obtain plaintext data, and verifying;
after the verification is passed, feeding back a second response data ciphertext to the target application so that the target application obtains second response data based on the second response data ciphertext.
3. The method according to claim 1, wherein the encryption lock device and the target application each include a first key, the first request ciphertext is generated for the target application based on the encryption of the first key, and the encryption lock device further includes a second key.
4. The method of claim 3, wherein parsing and encrypting the first request ciphertext to form a second request ciphertext comprises:
analyzing the first request ciphertext based on the first key;
and encrypting the analyzed request data based on the second key to generate the second request ciphertext.
5. The method of claim 4, wherein the request data comprises at least one of:
target application information, user identity information, and signature authentication information.
6. The method according to claim 1, wherein the dongle device includes a narrowband internet of things module therein, and the sending the second request ciphertext to the target server based on the internet of things comprises:
and the narrow-band Internet of things module sends the second request ciphertext to the target server based on the built-in communication address of the target server based on the Internet of things.
7. The method of claim 3, wherein the target server stores the second key therein, and wherein the receiving the encrypted first response data ciphertext returned by the target server based on the internet comprises:
and receiving the first response data ciphertext which is returned by the target server and is formed by encrypting the second key based on the Internet.
8. A dongle device, comprising:
a body;
the main chip is arranged in the machine body, and a data interface is arranged on the main chip;
the narrow-band Internet of things module is arranged in the machine body, is provided with an antenna and a narrow-band Internet of things card, is connected with the communication interface and is used for receiving and transmitting data;
the main chip is used for obtaining a first request ciphertext from a target application in external equipment, and analyzing and encrypting the first request ciphertext to form a second request ciphertext;
the narrow-band Internet of things module is used for sending the second request ciphertext to a target server, so that the target server determines first response data based on the second request ciphertext, receives a first response data ciphertext formed by encryption returned by the target server, forwards the first response data ciphertext to the main chip through the data interface, and enables the main chip to store the first response data ciphertext and sends the first response data ciphertext to the target application through the data interface.
9. The encryption lock device of claim 8, wherein the main chip and the narrowband internet of things module realize data interaction through the first interface, and the main chip and a target application of the external device realize data interaction through the second interface.
10. The encryption lock apparatus of claim 7, wherein said master chip is further configured to:
obtaining a third request ciphertext based on the target application;
decrypting the third request ciphertext to obtain plaintext data, and verifying;
after the verification is passed, feeding back a second response data ciphertext to the target application so that the target application obtains second response data based on the second response data ciphertext.
CN202011590928.1A 2020-12-29 2020-12-29 Data processing method and encryption lock equipment Active CN112580082B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011590928.1A CN112580082B (en) 2020-12-29 2020-12-29 Data processing method and encryption lock equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011590928.1A CN112580082B (en) 2020-12-29 2020-12-29 Data processing method and encryption lock equipment

Publications (2)

Publication Number Publication Date
CN112580082A true CN112580082A (en) 2021-03-30
CN112580082B CN112580082B (en) 2022-04-05

Family

ID=75143933

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011590928.1A Active CN112580082B (en) 2020-12-29 2020-12-29 Data processing method and encryption lock equipment

Country Status (1)

Country Link
CN (1) CN112580082B (en)

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103906054A (en) * 2012-12-28 2014-07-02 上海农业信息有限公司 Method and system for authorization of software function modules of internet of things
CN104580086A (en) * 2013-10-17 2015-04-29 腾讯科技(深圳)有限公司 Information transmission method, client side, server and system
CN106603485A (en) * 2016-10-31 2017-04-26 美的智慧家居科技有限公司 Secret key negotiation method and device
CN106789845A (en) * 2015-11-23 2017-05-31 天津九洲云物联科技有限公司 A kind of method of network data security transmission
CN107733994A (en) * 2017-09-20 2018-02-23 美的智慧家居科技有限公司 Control method, intelligent door lock and the readable storage medium storing program for executing of intelligent door lock
CN108091009A (en) * 2017-12-08 2018-05-29 深圳达实信息技术有限公司 A kind of control of bluetooth access system and its application method based on narrowband Internet of Things
CN108540332A (en) * 2018-05-18 2018-09-14 广东赛诺梵信息技术有限公司 A kind of intelligent encryption dog
CN109167733A (en) * 2018-11-01 2019-01-08 深圳市恒诺物联科技有限公司 A kind of Internet of Things router and its control system
CN109743206A (en) * 2018-12-28 2019-05-10 南京工程学院 A kind of softdog and application method based on EtherCAT
CN109902481A (en) * 2019-03-07 2019-06-18 北京深思数盾科技股份有限公司 A kind of encryption lock authentication method and encryption equipment for encrypting equipment
CN110544081A (en) * 2019-05-29 2019-12-06 陕西航天动力高科技股份有限公司 internet of things payment method and system suitable for IC card prepayment gas meter
CN110632875A (en) * 2019-09-24 2019-12-31 武汉亚为电子科技有限公司 Equipment health monitoring method and device based on AIoT intelligent Internet of things
CN110738764A (en) * 2019-10-22 2020-01-31 佛山市艾温特智能科技有限公司 Security control system and method based on intelligent lock
US20200133925A1 (en) * 2017-03-15 2020-04-30 Carrier Corporation Internet of things architecture with a cloud-based integration platform
CN112002043A (en) * 2020-09-03 2020-11-27 云南电网有限责任公司信息中心 Intelligent lock control method and system based on NB-IOT

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103906054A (en) * 2012-12-28 2014-07-02 上海农业信息有限公司 Method and system for authorization of software function modules of internet of things
CN104580086A (en) * 2013-10-17 2015-04-29 腾讯科技(深圳)有限公司 Information transmission method, client side, server and system
CN106789845A (en) * 2015-11-23 2017-05-31 天津九洲云物联科技有限公司 A kind of method of network data security transmission
CN106603485A (en) * 2016-10-31 2017-04-26 美的智慧家居科技有限公司 Secret key negotiation method and device
US20200133925A1 (en) * 2017-03-15 2020-04-30 Carrier Corporation Internet of things architecture with a cloud-based integration platform
CN107733994A (en) * 2017-09-20 2018-02-23 美的智慧家居科技有限公司 Control method, intelligent door lock and the readable storage medium storing program for executing of intelligent door lock
CN108091009A (en) * 2017-12-08 2018-05-29 深圳达实信息技术有限公司 A kind of control of bluetooth access system and its application method based on narrowband Internet of Things
CN108540332A (en) * 2018-05-18 2018-09-14 广东赛诺梵信息技术有限公司 A kind of intelligent encryption dog
CN109167733A (en) * 2018-11-01 2019-01-08 深圳市恒诺物联科技有限公司 A kind of Internet of Things router and its control system
CN109743206A (en) * 2018-12-28 2019-05-10 南京工程学院 A kind of softdog and application method based on EtherCAT
CN109902481A (en) * 2019-03-07 2019-06-18 北京深思数盾科技股份有限公司 A kind of encryption lock authentication method and encryption equipment for encrypting equipment
CN110544081A (en) * 2019-05-29 2019-12-06 陕西航天动力高科技股份有限公司 internet of things payment method and system suitable for IC card prepayment gas meter
CN110632875A (en) * 2019-09-24 2019-12-31 武汉亚为电子科技有限公司 Equipment health monitoring method and device based on AIoT intelligent Internet of things
CN110738764A (en) * 2019-10-22 2020-01-31 佛山市艾温特智能科技有限公司 Security control system and method based on intelligent lock
CN112002043A (en) * 2020-09-03 2020-11-27 云南电网有限责任公司信息中心 Intelligent lock control method and system based on NB-IOT

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
闫宏强等: "物联网中认证技术研究", 《通信学报》 *
黄俊杰等: "基于NB-IoT的智能门禁系统", 《信息通信》 *

Also Published As

Publication number Publication date
CN112580082B (en) 2022-04-05

Similar Documents

Publication Publication Date Title
CN108809659B (en) Dynamic password generation method, dynamic password verification method, dynamic password system and dynamic password verification system
CN106657152B (en) Authentication method, server and access control device
CN102217277B (en) Method and system for token-based authentication
CN110084017A (en) A kind of ID authentication device, system, method, apparatus and storage medium
JP2004304751A5 (en)
CN101243438A (en) Distributed single sign-on service
CN110278180B (en) Financial information interaction method, device, equipment and storage medium
CN112632521B (en) Request response method and device, electronic equipment and storage medium
US6839838B2 (en) Data management system, information processing apparatus, authentification management apparatus, method and storage medium
CN111131300B (en) Communication method, terminal and server
US20120124378A1 (en) Method for personal identity authentication utilizing a personal cryptographic device
US20090276622A1 (en) Secret authentication system
US7805611B1 (en) Method for secure communication from chip card and system for performing the same
EP1243097A1 (en) Method and apparatus for a revolving encrypting and decrypting process
CN104753879B (en) Method and system, the method and system of cloud service provider certification terminal of terminal authentication cloud service provider
CN102208980A (en) Communication method and system
CN112580082B (en) Data processing method and encryption lock equipment
US8261088B2 (en) Secret authentication system
CN106972928B (en) Bastion machine private key management method, device and system
CN111259363B (en) Service access information processing method, system, device, equipment and storage medium
CN112995090B (en) Authentication method, device and system for terminal application and computer readable storage medium
JP2001265731A (en) Method and system for authenticating client
CN109936522B (en) Equipment authentication method and equipment authentication system
JP2003244136A5 (en)
JP3923229B2 (en) Authentication processing method and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Patentee after: Beijing Shendun Technology Co.,Ltd.

Address before: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Patentee before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.

CP01 Change in the name or title of a patent holder