CN113656792B - Electronic detonator password verification method and device and terminal equipment - Google Patents

Electronic detonator password verification method and device and terminal equipment Download PDF

Info

Publication number
CN113656792B
CN113656792B CN202110865484.6A CN202110865484A CN113656792B CN 113656792 B CN113656792 B CN 113656792B CN 202110865484 A CN202110865484 A CN 202110865484A CN 113656792 B CN113656792 B CN 113656792B
Authority
CN
China
Prior art keywords
electronic detonator
verification code
nth
password information
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110865484.6A
Other languages
Chinese (zh)
Other versions
CN113656792A (en
Inventor
管泓
李辉涛
向静
陈海锋
邓竹文
王鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Xuefeng Electronics Co ltd
Original Assignee
Shenzhen Xuefeng Electronics Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Xuefeng Electronics Co ltd filed Critical Shenzhen Xuefeng Electronics Co ltd
Priority to CN202110865484.6A priority Critical patent/CN113656792B/en
Publication of CN113656792A publication Critical patent/CN113656792A/en
Application granted granted Critical
Publication of CN113656792B publication Critical patent/CN113656792B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Lock And Its Accessories (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application is applicable to the field of password verification, and particularly relates to a method, a device and terminal equipment for verifying an electronic detonator password. The method comprises the steps of obtaining password information of an Nth electronic detonator; generating a second encryption verification code of the N electronic detonator according to the password information of the N electronic detonator and the first encryption verification code of the N-1 electronic detonator; and sending the password information of the Nth electronic detonator and the second encryption verification code to the second terminal equipment, wherein the password information of the Nth electronic detonator and the second encryption verification code are used for verifying the password information of the Nth electronic detonator by the second terminal equipment. The encryption method and the encryption device can generate the second encryption verification code of the N-1 electronic detonator according to the password information of the N-1 electronic detonator and the first encryption verification code of the N-1 electronic detonator, so that the password information is encrypted, and the safety of using the electronic detonator is improved.

Description

Electronic detonator password verification method and device and terminal equipment
Technical Field
The application belongs to the field of password verification, and particularly relates to a method and a device for verifying an electronic detonator password and terminal equipment.
Background
The electronic detonators are detonators which adopt an electronic control module to control the detonation process, and each electronic detonator is provided with an independent password, and the password is compared with the passing square energy to detonate. The electronic detonator priming system comprises two parts, namely an electronic detonator and a primer. The work flow of the electronic detonator priming system is as follows: injecting a detonation password in the generation stage of the electronic detonator, uploading the detonation password to a national industrial electronic detonator password management and control center, applying the detonation password by the detonator, downloading the applied detonation password into the detonator by the detonator, decoding by the detonator, comparing and verifying the detonation password with the detonator, and detonating the electronic detonator after verification is successful.
The lawless persons may acquire the initiation password at each stage of the workflow, so that the initiation password is revealed, and the safety of using the electronic detonator is reduced.
Disclosure of Invention
The embodiment of the application provides a method and a device for verifying a password of an electronic detonator and terminal equipment, which can improve the safety of using the electronic detonator.
In a first aspect, an embodiment of the present application provides a method for verifying a password of an electronic detonator, which is applied to a first terminal device, and the method includes:
acquiring password information of an Nth electronic detonator, wherein N is an integer greater than or equal to 1;
generating a second encryption verification code of the Nth electronic detonator according to the password information of the Nth electronic detonator and the first encryption verification code of the N-1 th electronic detonator;
and sending the password information and the second encryption verification code of the Nth electronic detonator to a second terminal device, wherein the password information and the second encryption verification code of the Nth electronic detonator are used for verifying the password information of the Nth electronic detonator by the second terminal device.
In a possible implementation manner of the first aspect, after the generating the second encrypted verification code of the nth electronic detonator, the method includes:
generating signature information of the Nth electronic detonator according to the second encryption verification code of the Nth electronic detonator.
The sending the password information and the second encryption verification code of the nth electronic detonator to the second terminal device comprises the following steps:
and sending the password information, the second encryption verification code and the signature information of the Nth electronic detonator to the second terminal equipment.
The generating the second encryption verification code of the nth electronic detonator according to the password information of the nth electronic detonator and the first encryption verification code of the nth-1 electronic detonator comprises the following steps:
acquiring a preset time period sequence of the Nth electronic detonator, wherein the preset time period sequence of the Nth electronic detonator is a continuous time period taking the moment corresponding to the password information of the Nth electronic detonator as a starting point;
generating a dynamic encryption verification code of the N-th electronic detonator according to the preset time period sequence and the password information of the N-th electronic detonator and the first encryption verification code of the N-1-th electronic detonator, wherein the dynamic encryption verification code of the N-th electronic detonator comprises a second encryption verification code of the N-th electronic detonator.
The sending the password information and the second encryption verification code of the nth electronic detonator to the second terminal device comprises the following steps:
and sending the preset time period sequence, the password information and the dynamic encryption verification code of the Nth electronic detonator to the second terminal equipment.
Wherein the generating the second encrypted verification code of the nth electronic detonator according to the password information of the nth electronic detonator and the first encrypted verification code of the nth-1 electronic detonator comprises:
acquiring the preset time delay of the Nth electronic detonator, wherein the preset time delay of the Nth electronic detonator is the time for delay initiation of the Nth electronic detonator;
determining a target time period of the Nth electronic detonator according to the preset time delay of the Nth electronic detonator, wherein the target time period of the Nth electronic detonator is one of the preset time period sequences of the Nth electronic detonator;
generating a second encryption verification code of the N-th electronic detonator according to the target time period and the password information of the N-th electronic detonator and the first encryption verification code of the N-1-th electronic detonator, wherein the second encryption verification code of the N-th electronic detonator is one of the dynamic encryption verification codes of the N-th electronic detonator.
In a second aspect, an embodiment of the present application provides an electronic detonator password verification method, which is applied to a second terminal device, where the method includes:
acquiring password information and a second encryption verification code of an N-th electronic detonator and a first encryption verification code of an N-1-th electronic detonator, wherein N is an integer greater than or equal to 1;
Generating a first decryption verification code of the Nth electronic detonator according to the password information of the Nth electronic detonator and the first encryption verification code of the N-1 th electronic detonator;
and if the second encryption verification code of the Nth electronic detonator is consistent with the first decryption verification code, taking the password information of the Nth electronic detonator as an effective initiation password of the Nth electronic detonator.
The generating the first decryption verification code of the nth electronic detonator according to the password information of the nth electronic detonator and the first encryption verification code of the nth-1 electronic detonator comprises the following steps:
acquiring a preset time period sequence of the Nth electronic detonator;
generating a dynamic decryption verification code of the Nth electronic detonator according to the preset time period sequence and the password information of the Nth electronic detonator and the first encryption verification code of the N-1 th electronic detonator, wherein the dynamic decryption verification code of the Nth electronic detonator comprises the first decryption verification code of the Nth electronic detonator.
The taking the password information of the nth electronic detonator as the effective initiation password of the nth electronic detonator comprises the following steps:
acquiring signature information of the Nth electronic detonator;
generating a second decryption verification code of the Nth electronic detonator according to the signature information of the Nth electronic detonator;
If the second decryption verification code and the first decryption verification code of the Nth electronic detonator are determined to be consistent, the password information of the Nth electronic detonator is used as an effective initiation password of the Nth electronic detonator;
or alternatively
Acquiring a dynamic encryption verification code of the Nth electronic detonator;
and if the dynamic encryption verification and the dynamic decryption verification code of the Nth electronic detonator are consistent, taking the password information of the Nth electronic detonator as an effective initiation password of the Nth electronic detonator.
In a third aspect, an embodiment of the present application provides an electronic detonator password verification device, applied to a first terminal device, where the device includes:
the acquisition module is used for acquiring the password information of the Nth electronic detonator, wherein N is an integer greater than or equal to 1;
the generation module is used for generating a second encryption verification code of the Nth electronic detonator according to the password information of the Nth electronic detonator and the first encryption verification code of the N-1 th electronic detonator;
the transmission module is used for transmitting the password information and the second encryption verification code of the Nth electronic detonator to the second terminal equipment, wherein the password information and the second encryption verification code of the Nth electronic detonator are used for verifying the password information of the Nth electronic detonator by the second terminal equipment.
In a fourth aspect, an embodiment of the present application provides an electronic detonator password verification device applied to a second terminal device, where the device includes:
the acquisition module is used for acquiring the password information and the second encryption verification code of the N-th electronic detonator and the first encryption verification code of the N-1-th electronic detonator, wherein N is an integer greater than or equal to 1;
the generation module is used for generating a first decryption verification code of the Nth electronic detonator according to the password information of the Nth electronic detonator and the first encryption verification code of the N-1 th electronic detonator;
and the verification module is used for taking the password information of the Nth electronic detonator as the effective initiation password of the Nth electronic detonator if the second encryption verification code of the Nth electronic detonator is identical to the first decryption verification code.
In a fifth aspect, an embodiment of the present application provides a terminal device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the electronic detonator password verification method as in the first aspect or as in the second aspect when the processor executes the computer program.
Compared with the prior art, the embodiment of the application has the beneficial effects that: the method comprises the steps of obtaining password information of an Nth electronic detonator; generating a second encryption verification code of the N electronic detonator according to the password information of the N electronic detonator and the first encryption verification code of the N-1 electronic detonator; and sending the password information of the Nth electronic detonator and the second encryption verification code to the second terminal equipment, wherein the password information of the Nth electronic detonator and the second encryption verification code are used for verifying the password information of the Nth electronic detonator by the second terminal equipment. The method and the device can generate the second encryption verification code of the N-1 electronic detonator according to the password information of the N-1 electronic detonator and the first encryption verification code of the N-1 electronic detonator, so that the password information is encrypted, and the safety of using the electronic detonator is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the following description will briefly introduce the drawings that are needed in the embodiments or the description of the prior art, it is obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of an application scenario of an electronic detonator password verification method according to an embodiment of the present application;
FIG. 2 is a schematic flow chart of a method for verifying a password of an electronic detonator according to an embodiment of the present application;
FIG. 3 is a schematic flow chart of a method for generating a second encrypted validation code for an Nth electronic detonator provided in an embodiment of the present application;
FIG. 4 is a schematic flow chart diagram of another method for generating a second encrypted validation code for an Nth electronic detonator provided in an embodiment of the present application;
FIG. 5 is a schematic flow chart of an electronic detonator password verification method provided in an embodiment of the present application;
FIG. 6 is a schematic flow chart diagram of another method for verifying an electronic detonator password provided in an embodiment of the present application;
FIG. 7 is a schematic flow chart diagram of another method for verifying an electronic detonator password provided in an embodiment of the present application;
FIG. 8 is a schematic flow chart diagram of a method for generating a dynamic decryption validation code for an Nth electronic detonator provided in an embodiment of the application;
fig. 9 is a schematic structural diagram of an electronic detonator password verification device according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of another electronic detonator password verification device according to an embodiment of the present application;
fig. 11 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system configurations, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. However, it will be apparent to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail, and in other instances, specific technical details of the various embodiments may be referenced to each other and specific systems not described in one embodiment may be referenced to other embodiments.
It should be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should also be understood that the term "and/or" as used in this specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations.
References to "an embodiment of the present application" or "some embodiments" or the like, described in this specification, mean that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application. Thus, appearances of the phrases "in other embodiments," "in an embodiment of the application," "other embodiments of the application," and the like in various places throughout this specification are not necessarily all referring to the same embodiment, but mean "one or more, but not all, embodiments" unless expressly specified otherwise. The terms "comprising," "including," "having," and variations thereof mean "including but not limited to," unless expressly specified otherwise.
Furthermore, the terms first, second and the like in the description and in the claims, are used for distinguishing between the descriptions and not necessarily for indicating or implying relative importance.
The electronic detonator priming system comprises two parts, namely an electronic detonator and a primer. The work flow of the electronic detonator priming system is as follows: injecting a detonation password in the generation stage of the electronic detonator, uploading the detonation password to a national industrial electronic detonator password management and control center, applying the detonation password by the detonator, downloading the applied detonation password into the detonator by the detonator, decoding by the detonator, comparing and verifying the detonation password with the detonator, and detonating the electronic detonator after verification is successful.
The lawless persons may acquire the initiation password at each stage of the workflow, so that the initiation password is revealed, and the safety of using the electronic detonator is reduced.
In order to solve the above-mentioned defect, the inventive concept of the present application is:
according to the embodiment of the application, after the initiation password is injected in the generation stage of the electronic detonator, the second encryption verification code of the N-1 electronic detonator is generated according to the password information of the N-1 electronic detonator and the first encryption verification code of the N-1 electronic detonator, so that the password information is encrypted in each stage of the workflow of the electronic detonator initiation system, and the safety of using the electronic detonator is improved.
In order to illustrate the technical solution of the present application, the following description is made by specific examples.
Referring to fig. 1, fig. 1 is a schematic diagram of an application scenario of an electronic detonator password verification method according to an embodiment of the present application. For convenience of explanation, only the portions relevant to the present application are shown. The application scene comprises: the first terminal device and the second terminal device are in data communication through a wired or wireless mode. For example: wiFi, wireless channel, etc., the communication mode between the first terminal device and the second terminal device is not limited in this embodiment.
In this application scenario, the first terminal device and the second terminal device may include, but are not limited to, a detonation password encryption device, a detonator, an electronic detonator, and the like.
In this embodiment of the present application, the first terminal device may be a detonation password encryption device, and after the detonation password is injected in the generation stage of the electronic detonator, the detonation password encryption device is configured to generate the second encryption verification code of the nth electronic detonator according to the password information of the nth electronic detonator and the first encryption verification code of the N-1 electronic detonator.
The second terminal device may be an initiator, where the initiator is configured to apply for an initiation password from a national industrial electronic detonator password management and control center, and obtain a second encryption verification code of the nth electronic detonator, so as to verify the password information of the nth electronic detonator according to the password information of the nth electronic detonator and the second encryption verification code.
Referring to fig. 2, fig. 2 is a schematic flowchart of an electronic detonator password verification method according to an embodiment of the present application. The execution subject of the method in fig. 2 may be the first terminal device in fig. 1. As shown in fig. 2, the method includes: s201 to S203.
S201, the first terminal equipment acquires the password information of the Nth electronic detonator.
Specifically, N is an integer greater than or equal to 1.
In the embodiment of the application, when the industrial electronic detonator production line needs to generate 10 power generation electronic detonators, the produced first power generation electronic detonator may be called a first electronic detonator, the produced second power generation electronic detonator may be called a second electronic detonator, and the like, the produced 10 th power generation electronic detonator may be called a tenth electronic detonator, that is, the produced nth power generation electronic detonator may be called an nth electronic detonator.
Each time an industrial electronic detonator production line produces an electronic detonator, a user identification code (User Identification code, UID code), a detonation password and a detonator shell code of the electronic detonator need to be written.
In the embodiment of the application, the first terminal equipment is detonation password encryption equipment, and each time the UID code, the detonation password and the detonator shell code of an electronic detonator are written into the industrial electronic detonator production line, namely the UID code, the detonation password and the detonator shell code of the electronic detonator are uploaded to the detonation password encryption equipment until all the UID code, the detonation password and the detonator shell code of the N electronic detonator are uploaded, and the detonation password encryption equipment can acquire the password information of the N electronic detonator.
In other embodiments, after the UID code, the detonation password and the detonator shell code are all written in all N power generation electronic detonators, the industrial electronic detonator production line uniformly uploads the UID code, the detonation password and the detonator shell code to the detonation password encryption equipment, and the detonation password encryption equipment can obtain the password information of the N power generation electronic detonators.
In other embodiments of the present application, the first terminal device is an initiator, the initiator applies for a detonation password to the national industrial electronic detonator password management and control center according to the application information such as UID code, detonator shell code, etc. of the N-generator detonator or some of the N-generator detonators, after the national industrial electronic detonator password management and control center verifies that the application information is qualified, the detonation initiator automatically issues the password information of the electronic detonator to the initiator, and the detonator can obtain the password information of the N-generator detonator.
S202, the first terminal equipment generates a second encryption verification code of the N electronic detonator according to the password information of the N electronic detonator and the first encryption verification code of the N-1 electronic detonator.
Specifically, in the embodiment of the present application, after the first terminal device obtains the password information of the N power generation electronic detonators, a hash function may be used to encrypt the password information of the first electronic detonator, so as to generate summary information of the password information, where the summary information is called a first encrypted verification code of the first electronic detonator. For example: the plaintext (the cipher information of the first electronic detonator) to be encrypted is encrypted into a string of ciphertext (i.e. the Digest information of the cipher information) by using a hash function (Message-Digest algoritm 5, MD5), the string of ciphertext is also called a digital fingerprint, the digital fingerprint has a fixed length, different plaintext can be encrypted into different Digest information by using the MD5, the Digest information obtained by encrypting the same plaintext is consistent, and based on the Digest information obtained by encrypting becomes important information for verifying whether the plaintext has been tampered with or has been leaked by a person. In this embodiment of the present application, other types of hash functions may be further used to encrypt the cryptographic information of the first electronic detonator, for example: secure hash algorithm 1 (Secure Hash Algorithm, sha1), MD4, SHA2, SHA256, etc., embodiments of the present application do not limit the type of hash function.
In this embodiment of the present application, the first terminal device may store the password information of the first electronic detonator and the first encrypted verification code in a block, and for convenience of description, the block is referred to as a first block.
In this embodiment of the present invention, after the first terminal device stores the password information of the first electronic detonator and the first encryption verification code in the first block, the first terminal device may encrypt the password information of the second electronic detonator and the first encryption verification code of the first electronic detonator by using the same hash function as that used for encrypting the password information of the first electronic detonator, so as to generate summary information of the password information of the second electronic detonator, where the summary information is referred to as a second encryption verification code of the second electronic detonator. For example: and encrypting the password information of the second electronic detonator and the first encryption verification code into a string of ciphertext by adopting the MD5, wherein the string of ciphertext is the second encryption verification code of the second electronic detonator. The first terminal device stores the first encryption verification code of the first electronic detonator, the password information of the second electronic detonator and the second encryption verification code in the second block. Based on the above, the second block not only contains the password information of the second electronic detonator and the second encryption verification code, but also indirectly contains the information of the first block.
According to the encryption method, the first terminal device may encrypt the password information of the nth electronic detonator and the first encryption verification code of the nth-1 electronic detonator (in order to distinguish the second encryption verification code of the nth-1 electronic detonator from the second encryption verification code of the nth electronic detonator), by using the same hash function as that used for encrypting the password information of the first electronic detonator, and the second encryption verification code of the nth-1 electronic detonator is referred to as the first encryption verification code of the nth-1 in the embodiment of the application, so as to generate summary information of the password information of the nth electronic detonator, where the summary information is referred to as the second encryption verification code of the nth electronic detonator. The first terminal device stores the first encryption verification code of the N-1 electronic detonator, the password information of the N electronic detonator and the second encryption verification code in the N block. Based on this, the nth block contains information of all the previous blocks.
In this embodiment, the first terminal device combines all the blocks from the first block to the nth block to form the blockchain. The leakage or modification of the password information of any one electronic detonator on the blockchain can change the abstract information of the following block, namely the second encryption verification code, so that when the password information in the blockchain is verified, whether the password information of all electronic detonators are leaked or modified can be verified only by verifying the abstract information of the Nth block, namely the second encryption verification code of the Nth electronic detonator, and the password information of all electronic detonators is conveniently verified.
It should be noted that, when the first terminal device in the embodiment of the present application encrypts the N electronic detonators respectively, the hash functions used may be the same or different, and the above embodiment is to use the same hash function to encrypt the N electronic detonators respectively for illustration.
In this embodiment of the present application, after the first terminal device generates the second encrypted verification code of the nth electronic detonator, the signature information of the nth electronic detonator may also be generated according to the second encrypted verification code of the nth electronic detonator.
Specifically, in the embodiment of the present application, in order to ensure that the password information sent by the first terminal device to the second terminal device is actually sent by the first terminal device and further ensure that the password information sent by the first terminal device is not revealed, so as to cause modification, after the first terminal device generates the first encryption verification code of the first electronic detonator (the first encryption verification code for generating the first electronic detonator is described in the above embodiment, and is not described herein), the first terminal device encrypts the first encryption verification code again, so as to generate signature information of the first electronic detonator. In the embodiment of the application, the first encryption verification code is encrypted again, and the method for generating the signature information of the first electronic detonator is not limited.
Illustratively, the first terminal device may re-encrypt the first encrypted authentication code using an asymmetric encryption algorithm. For example: the asymmetric encryption algorithm may be an elliptic curve digital signature algorithm, a DSA (Digital Signature Algorithm, DSA) encryption/decryption algorithm, or the like, and the embodiment of the present application does not limit the type of the asymmetric encryption algorithm.
In this embodiment of the present application, the asymmetric encryption algorithm in the first terminal device may generate a set of a public key and a private key, where the public key and the private key are in pairs, and the public key corresponding to the private key may be calculated by using the private key. The method for generating the public key and the private key by the asymmetric encryption algorithm is not limited in the embodiment of the application.
In the embodiment of the application, the first terminal device encrypts the first encryption verification code again by using the private key to generate signature information of the first electronic detonator.
In the embodiment of the application, the terminal device stores the password information, the first encryption verification code and the signature information of the first electronic detonator in the first block.
In this embodiment, after the first terminal device generates the second encrypted verification code of the second electronic detonator (the second encrypted verification code for generating the second electronic detonator has been described in the foregoing embodiment, which is not described herein again), the first terminal device may also encrypt the second encrypted verification code of the second electronic detonator again by using the asymmetric encryption algorithm, so as to generate the signature information of the second electronic detonator. The asymmetric encryption algorithm used by the first terminal device to encrypt the second encrypted verification code of the second electronic detonator again may be the same as the asymmetric encryption algorithm used to encrypt the first encrypted verification code of the first electronic detonator again, or may be different from the asymmetric encryption algorithm used to encrypt the first encrypted verification code of the first electronic detonator again.
In one embodiment, if the asymmetric encryption algorithm used by the first terminal device to encrypt the second encrypted verification code of the second electronic detonator is the same as the asymmetric encryption algorithm used to encrypt the first encrypted verification code of the first electronic detonator, the private key used when encrypting the second encrypted verification code of the second electronic detonator again is different from the private key used to generate the signature information of the first electronic detonator.
In one embodiment, if the asymmetric encryption algorithm used by the first terminal device to encrypt the second encrypted verification code of the second electronic detonator is different from the asymmetric encryption algorithm used to encrypt the first encrypted verification code of the first electronic detonator, the private key used when encrypting the first encrypted verification code of the second electronic detonator is definitely different from the private key used when generating the signature information of the first electronic detonator.
In the embodiment of the application, the first terminal device stores the first encryption verification code and the signature information of the first electronic detonator, and the password information, the second encryption verification code and the signature information of the second electronic detonator in the second block.
In this embodiment of the present application, after the first terminal device generates the second encryption verification code of the nth electronic detonator according to the method for encrypting by using the asymmetric encryption algorithm (the second encryption verification code for generating the nth electronic detonator is described in the foregoing embodiment, which is not described herein in detail), the second encryption verification code of the nth electronic detonator is encrypted again by using the asymmetric encryption algorithm which is the same as or different from the signature information for generating the N-1 electronic detonator, so as to generate the signature information of the nth electronic detonator.
In the embodiment of the application, the first terminal equipment stores the first encryption verification code and signature information of the N-1 electronic detonator, and the password information, the second encryption verification code and signature information of the N electronic detonator in the N block.
Referring to fig. 3, fig. 3 is a schematic flowchart of a method for generating a second encrypted verification code of an nth electronic detonator according to an embodiment of the present application. The execution subject of the method in fig. 3 may be the first terminal device in fig. 1. As shown in fig. 3, the method includes: s301 to S302.
S301, a first terminal device acquires a preset time period sequence of an N-th electronic detonator.
Specifically, in the embodiment of the present application, the preset time period sequence of the nth electronic detonator is a continuous time period starting from a time point corresponding to the password information of the nth electronic detonator. For example: the first terminal equipment obtains a continuous time period by taking 10:00 as a starting point and 15 minutes as an interval time when the moment corresponding to the password information of the first electronic detonator is 10:00. Such as 10:00 to 10:15, 10:15 to 10:30, 10:30 to 10:45, etc. The embodiment of the application does not limit the time and the interval time corresponding to the password information of the first electronic detonator.
In this embodiment of the present application, the preset time period sequence for acquiring other electronic detonators by the first terminal device may refer to the preset time period sequence for acquiring the first electronic detonator, which is not described herein. It should be noted that: the time and interval time corresponding to the password information of the other electronic detonators obtained by the first terminal device may be the same as or different from the time and interval time corresponding to the password information of the first electronic detonator.
In this embodiment of the present application, the total time length of the preset time period sequence of the first electronic detonator is longer than the preset time delay of the first electronic detonator, for example: the preset time delay of the first electronic detonator is 40 minutes, and the time period is at least 3, so that the total time length of the preset time period sequence of the first electronic detonator is longer than the preset time delay of the first electronic detonator. The preset time delay is 50 minutes, and the time period is at least 4, so that the total time length of the preset time period sequence of the first electronic detonator can be longer than the preset time delay of the first electronic detonator. The total duration of the preset time period sequences of other electronic detonators in the embodiment of the application is also longer than the preset time delay of other electronic detonators. The preset time delay in the embodiment of the application is the time for delay initiation of the electronic detonator. The embodiment of the application does not limit the preset time delay.
In this embodiment of the present invention, the total time length of the preset time period sequence of the nth electronic detonator is longer than the preset time delay of the nth electronic detonator, so that when the first terminal device generates the dynamic encryption verification code of the nth electronic detonator according to the preset time period sequence of the nth electronic detonator in the subsequent S302, the dynamic encryption verification code of the nth electronic detonator can be generated within the preset time delay of the nth electronic detonator. For example: the preset time delay of the nth electronic detonator is 40 minutes, and the interval between each time period in the preset time period sequence is 15 minutes, so that the preset time period sequence of the nth electronic detonator obtained by the first terminal device at least has 3 continuous time periods, for example: the 3 consecutive time periods are 10:00 to 10:15, 10:15 to 10:30, 10:30 to 10:45.
The first terminal equipment generates the dynamic verification code of the Nth electronic detonator in 3 continuous time periods, and the dynamic encryption verification code of the Nth electronic detonator can be generated in the preset time delay of the Nth electronic detonator. If the preset time period sequence of the nth electronic detonator obtained by the first terminal device has only 2 continuous time periods, for example: 2 continuous time periods are 10:00 to 10:15, and 10:15 to 10:30, generating a dynamic verification code of the N electronic detonator within the first 30 minutes of the preset time delay of the N electronic detonator, generating a fixed verification code of the N electronic detonator within the last 10 minutes of the preset time delay of the N electronic detonator, and generating the dynamic verification code of the N electronic detonator to form a complete dynamic verification code of the N electronic detonator within the first 30 minutes of the preset time delay of the N electronic detonator.
It should be noted that: in the embodiment of the application, the number of time periods in the preset time period sequence of the electronic detonator is related to the preset time delay and the interval time of the electronic detonator. Based on this, the number of time periods in the preset time period sequence of the other electronic detonators obtained by the first terminal device may be the same as or different from the number of time periods in the preset time period sequence of the first electronic detonator. For example: the preset time delay of the first terminal equipment is 40 minutes, the interval time is 15 minutes, and the number of time periods is 3. The preset time delay of other terminal equipment is 40 minutes, the interval time is 15 minutes, or the preset time delay is 50 minutes, the interval time is 20 minutes, and the number of time periods is 3. For example: the preset time delay of the first terminal equipment is 40 minutes, the interval time is 15 minutes, and the number of time periods is 3. The preset time delay of other terminal equipment is 40 minutes, the interval time is 25 minutes, the number of time periods is 2, or the preset time delay is 25 minutes, the interval time is 15 minutes, and the number of time periods is 2.
S302, the first terminal equipment generates a dynamic encryption verification code of the N electronic detonator according to the preset time period sequence and the password information of the N electronic detonator and the first encryption verification code of the N-1 electronic detonator.
Specifically, the dynamic encryption verification code of the Nth electronic detonator comprises a second encryption verification code of the Nth electronic detonator.
For example, when the preset time period sequence of the first electronic detonator obtained by the first terminal device is 10:00 to 10:15, 10:15 to 10:30, and 10:30 to 10:45, the first terminal device may encrypt the password information of the first electronic detonator by using a hash function (e.g. MD 5) in the time period of 10:00 to 10:15, so as to generate the first encrypted verification code of the first electronic detonator. In the time period of 10:15 to 10:30, the first terminal device may encrypt the password information of the first electronic detonator by using another hash function (e.g., MD 4), and generate a first encrypted verification code of the first electronic detonator. In the time period of 10:30 to 10:45, the first terminal device may encrypt the password information of the first electronic detonator by using another hash function (for example, SHA 2), and generate a first encrypted verification code of the first electronic detonator. The embodiment of the application refers to a plurality of first encryption verification codes generated by using different hash functions in different time periods as dynamic verification codes of a first electronic detonator.
The embodiment of the application does not limit the type of the hash function adopted in different time periods of the preset time period sequence of the first electronic detonator, and only the hash functions adopted in the time periods are different.
In this embodiment of the present invention, when the number of time periods of the preset time period sequence of the second electronic detonator obtained by the first terminal device is the same as the number of time periods of the preset time period sequence of the first electronic detonator, in a first time period of the preset time period sequence of the second electronic detonator, the first terminal device may encrypt the password information of the second electronic detonator and the first encryption verification code of the first electronic detonator by using the same hash function (e.g., MD 5) as that used for encrypting the password information of the first electronic detonator in the first time period (e.g., 10:00 to 10:15) of the first electronic detonator, so as to generate the second encryption verification code of the second electronic detonator.
In a second time period of the preset time period sequence of the second electronic detonator, the first terminal device may encrypt the password information of the second electronic detonator and the first encryption verification code of the first electronic detonator by using the same hash function (e.g., MD 4) as that used for encrypting the password information of the first electronic detonator in the second time period (e.g., 10:15 to 10:30) of the first electronic detonator, so as to generate a second encryption verification code of the second electronic detonator.
In a third time period of the preset time period sequence of the second electronic detonator, the first terminal device encrypts the password information of the second electronic detonator and the first encryption verification code of the first electronic detonator by adopting a hash function (for example, SHA 2) which is the same as that of encrypting the password information of the first electronic detonator in the third time period (for example, 10:30 to 10:45) of the first electronic detonator, so as to generate a second encryption verification code of the second electronic detonator. The embodiment of the application refers to a plurality of second encryption verification codes generated by using different hash functions in different time periods as dynamic verification codes of a second electronic detonator.
In the embodiment of the application, when the number of time periods of the preset time period sequence of the second electronic detonator obtained by the first terminal device is different from the number of time periods of the preset time period sequence of the first electronic detonator, for example, the number of time periods of the preset time period sequence of the second electronic detonator is 2, the number of time periods of the preset time period sequence of the first electronic detonator is 3, and in the 1 st time period of the second electronic detonator, the password information of the second electronic detonator and the first encryption verification code of the first electronic detonator are encrypted by utilizing a hash function of the 1 st time period of the first electronic detonator. And encrypting the password information of the second electronic detonator and the first encryption verification code of the first electronic detonator by utilizing a hash function of the 2 nd time period of the first electronic detonator in the 2 nd time period of the second electronic detonator, so as to generate a dynamic verification code of the second electronic detonator.
Also for example: and (3) encrypting the password information of the second electronic detonator and the first encryption verification code of the first electronic detonator by using a hash function of the 1 st time period of the first electronic detonator in the 1 st time period of the second electronic detonator when the number of the time periods of the preset time period sequence of the second electronic detonator is 3 and the number of the time periods of the preset time period sequence of the first electronic detonator is 2. And encrypting the password information of the second electronic detonator and the first encryption verification code of the first electronic detonator by utilizing a hash function of the 2 nd time period of the first electronic detonator in the 2 nd time period of the second electronic detonator. And encrypting the password information of the second electronic detonator and the first encryption verification code of the first electronic detonator by utilizing a hash function completely different from the 1 st time period and the 2 nd time period of the first electronic detonator in the 3 rd time period of the second electronic detonator, so as to generate the dynamic verification code of the second electronic detonator.
The embodiment of the application does not limit the type of the hash function adopted in different time periods of the preset time period sequence of the second electronic detonator, and only the hash functions adopted in the time periods are different. And the hash function employed by each time period of the preset time period sequence of the second electronic detonator may be the same as or different from the hash function employed by each time period of the corresponding preset time period sequence of the first electronic detonator.
The method for generating the dynamic encryption verification code of the other electronic detonators by the first terminal device may refer to the method for generating the dynamic verification code of the first electronic detonator or the second electronic detonator, which is not described herein.
In this embodiment of the present application, when the first terminal device generates the dynamic encryption verification code of the nth electronic detonator, it is necessary to first generate second encryption verification codes of the nth electronic detonator in each time period of the preset time period sequence, and the plurality of second encryption verification codes are referred to as dynamic encryption verification codes of the nth electronic detonator. The method for generating signature information of the plurality of second encryption verification codes in the embodiment of the present application is the same as the method for generating signature information in S202, and will not be described here again.
According to the embodiment of the application, the first terminal equipment can generate the dynamic encryption verification code of the N-th electronic detonator according to the preset time period sequence and the password information of the N-th electronic detonator and the first encryption verification code of the N-1-th electronic detonator, and further encrypt the electronic detonator through the dynamic verification code, so that even if one of the dynamic verification codes leaks, an illegal person cannot decrypt the password information by using the leaked verification code, and the safety of using the electronic detonator is further improved.
Referring to fig. 4, fig. 4 is a schematic flowchart of another method for generating a second encrypted verification code of an nth electronic detonator according to an embodiment of the present application. The execution subject of the method in fig. 4 may be the first terminal device in fig. 1. As shown in fig. 4, the method includes: s401 to S402.
S401, the first terminal equipment acquires preset time delay of the Nth electronic detonator.
Specifically, the preset time delay of the nth electronic detonator is the time of delay initiation of the nth electronic detonator.
In this embodiment of the present application, the first terminal device may obtain the preset time delay of the nth electronic detonator from the uploaded electronic detonator blasting scheme. The blasting scheme of the electronic detonators comprises the engineering quantity of blasting, the arrangement of the electronic detonators and the preset time delay of each electronic detonator.
In the embodiment of the application, if the electronic detonators to be detonated need to be detonated simultaneously in the blasting scheme, the preset time delays of the electronic detonators are the same. In the blasting scheme, if the electronic detonators to be detonated need to be detonated in sequence according to the design, the preset time delays of the electronic detonators are different.
S402, the first terminal equipment determines a target time period of the Nth electronic detonator according to the preset time delay of the Nth electronic detonator.
Specifically, the target time period of the nth electronic detonator is one of the preset time period sequences of the nth electronic detonator.
In this embodiment of the present application, if the preset time period sequence of the first electronic detonator obtained by the first terminal device is: 10:00 to 10:15, 10:15 to 10:30, and 10:30 to 10:45, and determining that the target time period of the first electronic detonator is 10:30 to 10:45 according to the preset time delay of the first electronic detonator when the obtained preset time delay of the first electronic detonator is 40 minutes.
In this embodiment of the present application, if the preset time period sequence of the second electronic detonator obtained by the first terminal device is: and determining that the target time period of the second electronic detonator is 10:50 to 11:15 according to the preset time delay of the second electronic detonator when the preset time delay of the second electronic detonator is 55 minutes, wherein the preset time delay of the second electronic detonator is 10:00 to 10:25, the preset time delay of the second electronic detonator is 10:25 to 10:50, and the preset time delay of the second electronic detonator is 10:50 to 11:15.
In other embodiments of the present application, the method for determining the target time period of the other electronic detonator by the first terminal device according to the preset time delay of the other electronic detonator may refer to the method for determining the target time period of the first or second electronic detonator according to the preset time delay of the first or second electronic detonator, which is not described herein.
S403, the first terminal equipment generates a second encryption verification code of the Nth electronic detonator according to the target time period and the password information of the Nth electronic detonator and the first encryption verification code of the N-1 th electronic detonator.
Specifically, the second encryption verification code of the nth electronic detonator is one of the dynamic encryption verification codes of the nth electronic detonator.
In the embodiment of the application, the first terminal device encrypts the password information of the first electronic detonator to be encrypted according to the hash function (e.g. SHA 2) set in the target time period (e.g. 10:30 to 10:45 time period in S403) of the first electronic detonator, and generates the first encryption verification code of the first electronic detonator.
The first terminal device encrypts the password information of the second electronic detonator to be encrypted and the first encryption verification code of the first electronic detonator according to a hash function (for example, SHA 2) set in a target time period (for example, a time period of 10:50 to 11:15 in S403) of the second electronic detonator, and generates a second encryption verification code of the second electronic detonator.
In other embodiments of the present application, the first terminal device may refer to the second encryption verification code generating method of the first or second electronic detonator according to the target time period and the password information of the first or second electronic detonator, which is not described herein.
S203, the first terminal equipment sends the password information of the Nth electronic detonator and the second encryption verification code to the second terminal equipment, and the password information of the Nth electronic detonator and the second encryption verification code are used for verifying the password information of the Nth electronic detonator by the second terminal equipment.
Specifically, the first terminal device sends the password information of the nth electronic detonator obtained through the S201 and the second encryption verification code of the nth electronic detonator obtained through the S202 to the second terminal device, and in the second terminal device, the password information of the nth electronic detonator is verified according to the password information of the nth electronic detonator and the second encryption verification code.
In the implementation of the present application, the first terminal device may further send the password information, the second encryption verification code and the signature information of the nth electronic detonator to the second terminal device.
Specifically, the first terminal device sends the password information of the nth electronic detonator obtained through the S201 and the second encryption verification code and signature information of the nth electronic detonator obtained through the S202 to the second terminal device, and in the second terminal device, the password information of the nth electronic detonator is verified according to the password information, the second encryption verification code and the signature information of the nth electronic detonator.
In this embodiment of the present application, the first terminal device may further send a preset time period sequence, password information, and a dynamic encryption verification code of the nth electronic detonator to the second terminal device.
Specifically, the first terminal device sends the password information of the nth electronic detonator obtained through the S201, the preset time period sequence of the nth electronic detonator obtained through the S301 and the dynamic encryption verification code of the nth electronic detonator obtained through the S302 to the second terminal device, and in the second terminal device, the password information of the nth electronic detonator is verified according to the password information of the nth electronic detonator, the dynamic encryption verification code and the preset time period sequence.
In the embodiment of the application, the first terminal device may further send the preset time delay, the password information and the second encryption verification code of the nth electronic detonator to the second terminal device.
Specifically, the first terminal device sends the password information of the nth electronic detonator obtained through the S201, the preset time delay of the nth electronic detonator obtained through the S401 and the second encryption verification code of the nth electronic detonator obtained through the S402 to the second terminal device, and in the second terminal device, the password information of the nth electronic detonator is verified according to the preset time delay, the password information and the second encryption verification code of the nth electronic detonator.
In summary, according to the electronic detonator password verification method provided by the embodiment of the application, the first terminal device can generate the second encryption verification code of the nth electronic detonator according to the password information of the nth electronic detonator and the first encryption verification code of the nth-1 electronic detonator, so that the password information is encrypted, and the safety of using the electronic detonator is improved.
The first terminal equipment can also generate signature information of the Nth electronic detonator according to the second encryption verification code of the Nth electronic detonator, so that the password information sent by the first terminal equipment to the second terminal is ensured to be sent by the first terminal equipment, and the password information sent by the first terminal equipment is ensured not to be changed due to leakage, and the safety of using the electronic detonator is further improved.
The first terminal device can also generate a dynamic encryption verification code of the N-1 electronic detonator according to the preset time period sequence and the password information of the N-1 electronic detonator and the first encryption verification code of the N-1 electronic detonator, and further encrypt the electronic detonator through the dynamic verification code of the N electronic detonator, so that even if one of the dynamic verification codes leaks, an illegal person cannot decrypt the password information by using the leaked verification code, and the safety of using the electronic detonator is further improved.
Referring to fig. 5, fig. 5 is a schematic flowchart of an electronic detonator password verification method according to an embodiment of the present application. The execution subject of the method in fig. 5 may be the second terminal device in fig. 1. As shown in fig. 5, the method includes: s501 to S503.
S501, the second terminal equipment acquires the password information and the second encryption verification code of the N-th electronic detonator and the first encryption verification code of the N-1-th electronic detonator.
Specifically, N is an integer greater than or equal to 1.
In the embodiment of the application, the second terminal equipment acquires the password information and the second encryption verification code of the N-th electronic detonator and the first encryption verification code of the N-1-th electronic detonator, wherein the password information and the second encryption verification code are sent by the first terminal equipment.
S502, the second terminal equipment generates a first decryption verification code of the Nth electronic detonator according to the password information of the Nth electronic detonator and the first encryption verification code of the N-1 th electronic detonator.
Specifically, in the embodiment of the present application, the method for generating the first decryption verification code of the nth electronic detonator by the second terminal device is the same as the method for generating the second encryption verification code of the nth electronic detonator by the first terminal device in S202, and will not be described herein.
S503, if the second terminal equipment determines that the second encryption verification code of the Nth electronic detonator is consistent with the first decryption verification code, the password information of the Nth electronic detonator is used as an effective initiation password of the Nth electronic detonator.
Specifically, the second terminal device judges whether the second encryption verification code of the nth electronic detonator obtained according to S501 is consistent with the first decryption verification code of the nth electronic detonator generated according to S502, if so, the password information of the nth electronic detonator is proved not to be changed, and the password information of the nth electronic detonator is taken as an effective initiation password of the nth electronic detonator. If the code information of the N electronic detonator is inconsistent, the code information of the N electronic detonator is proved to be leaked, so that the code information of the N electronic detonator is changed, and the code information of the N electronic detonator cannot be used as an effective initiation code of the N electronic detonator.
Referring to fig. 6, fig. 6 is a schematic flowchart of another method for verifying an electronic detonator password according to an embodiment of the present application. The execution subject of the method in fig. 6 may be the second terminal device in fig. 1. As shown in fig. 6, the method includes: s601 to S603.
S601, the second terminal equipment acquires signature information of the Nth electronic detonator.
Specifically, the second terminal device obtains signature information of the nth electronic detonator sent by the first terminal device.
S602, the second terminal equipment generates a second decryption verification code of the Nth electronic detonator according to the signature information of the Nth electronic detonator.
Specifically, in the embodiment of the application, the second terminal device decrypts the signature information of the nth electronic detonator by using an asymmetric encryption algorithm, and generates a second decryption verification code of the nth electronic detonator.
In one embodiment of the present application, in S202, the first terminal device sends a public key of a set of public and private keys to the second terminal device using the set of public and private keys generated by the asymmetric encryption algorithm. And the second terminal equipment decrypts the signature information of the Nth electronic detonator by using the public key to generate a second decryption verification code of the Nth electronic detonator.
In the implementation of the method, the first terminal equipment encrypts the Nth electronic detonator by using the private key to obtain the signature information of the Nth electronic detonator, and when decrypting the signature information, the public key calculated by using the private key is required to decrypt the signature information so as to correctly generate the second decryption verification code of the Nth electronic detonator.
And S603, if the second terminal equipment determines that the second decryption verification code of the Nth electronic detonator is consistent with the first decryption verification code, the password information of the Nth electronic detonator is used as an effective initiation password of the Nth electronic detonator.
Specifically, the second terminal device judges whether the first decryption verification code of the nth electronic detonator generated according to the S502 is consistent with the second decryption verification code of the nth electronic detonator generated according to the S602, if so, the password information of the nth electronic detonator is proved not to be changed, and the password information of the nth electronic detonator is taken as an effective initiation password of the nth electronic detonator. If the code information of the N electronic detonator is inconsistent, the code information of the N electronic detonator is proved to be leaked, so that the code information of the N electronic detonator is changed, and the code information of the N electronic detonator cannot be used as an effective initiation code of the N electronic detonator.
Referring to fig. 7, fig. 7 is a schematic flowchart of another method for verifying an electronic detonator password according to an embodiment of the present application. The execution subject of the method in fig. 7 may be the second terminal device in fig. 1. As shown in fig. 7, the method includes: s701 to S702.
S701, the second terminal equipment acquires a dynamic encryption verification code of the Nth electronic detonator.
Specifically, the second terminal obtains a dynamic verification code of the Nth electronic detonator sent by the first terminal device.
S702, if the second terminal equipment determines that the dynamic encryption verification code and the dynamic decryption verification code of the Nth electronic detonator are consistent, the password information of the Nth electronic detonator is used as an effective initiation password of the Nth electronic detonator.
Specifically, referring to fig. 8, fig. 8 is a schematic flowchart of a method for generating a dynamic decryption verification code of an nth electronic detonator according to an embodiment of the present application. The execution subject of the method in fig. 8 may be the second terminal device in fig. 1. As shown in fig. 8, the method includes: s801 to S802.
S801, a second terminal device acquires a preset time period sequence of an Nth electronic detonator.
Specifically, the second terminal device obtains a preset time period sequence of the nth electronic detonator sent by the first terminal device.
S802, the second terminal equipment generates a dynamic decryption verification code of the N electronic detonator according to the preset time period sequence and the password information of the N electronic detonator and the first encryption verification code of the N-1 electronic detonator.
Specifically, the dynamic decryption verification code of the nth electronic detonator comprises a first decryption verification code of the nth electronic detonator.
In this embodiment of the present application, a method for dynamically decrypting the verification code of the nth electronic detonator generated by the second terminal device is the same as a method for dynamically encrypting the verification code of the nth electronic detonator generated by the first terminal device in S302, and will not be described herein.
Specifically, the second terminal device judges whether the dynamic encryption verification code of the nth electronic detonator obtained according to the S701 is consistent with the dynamic decryption verification code of the nth electronic detonator generated according to the S802, if so, the password information of the nth electronic detonator is proved not to be changed, and the password information of the nth electronic detonator is taken as an effective initiation password of the nth electronic detonator. If the code information of the N electronic detonator is inconsistent, the code information of the N electronic detonator is proved to be leaked, so that the code information of the N electronic detonator is changed, and the code information of the N electronic detonator cannot be used as an effective initiation code of the N electronic detonator.
It should be understood that the sequence number of each step in the foregoing embodiment does not mean that the execution sequence of each process should be determined by the function and the internal logic of each process, and should not limit the implementation process of the embodiment of the present application in any way.
Referring to fig. 9, fig. 9 is a schematic structural diagram of an electronic detonator password verification device provided in an embodiment of the present application, where the device is applied to the first terminal device in fig. 1, and the device includes:
the obtaining module 91 is configured to obtain the password information of the nth electronic detonator, where N is an integer greater than or equal to 1.
The generating module 92 is configured to generate a second encrypted verification code of the nth electronic detonator according to the password information of the nth electronic detonator and the first encrypted verification code of the nth-1 electronic detonator.
And the sending module 93 is configured to send the password information of the nth electronic detonator and the second encrypted verification code to the second terminal device, where the password information of the nth electronic detonator and the second encrypted verification code are used for verifying the password information of the nth electronic detonator by the second terminal device.
Wherein the apparatus further comprises:
the signature module 94 is configured to generate signature information of the nth electronic detonator according to the second encrypted verification code of the nth electronic detonator.
Wherein, the sending module 93 includes:
and a first sending unit 931, configured to send the password information, the second encryption verification code and the signature information of the nth electronic detonator to the second terminal device.
Wherein the generating module 92 comprises:
a first obtaining unit 921, configured to obtain a preset time period sequence of the nth electronic detonator, where the preset time period sequence of the nth electronic detonator is a continuous time period starting from a time point corresponding to the password information of the nth electronic detonator.
The first generating unit 922 is configured to generate a dynamic encryption verification code of the nth electronic detonator according to the preset time period sequence and the password information of the nth electronic detonator and the first encryption verification code of the N-1 electronic detonator, where the dynamic encryption verification code of the nth electronic detonator includes the second encryption verification code of the nth electronic detonator.
Wherein, the sending module 93 further includes:
and the second sending unit 932 is configured to send the preset time period sequence, the password information and the dynamic encryption verification code of the nth electronic detonator to the second terminal device.
The generation module 92 further includes:
the second obtaining unit 923 is configured to obtain a preset time delay of the nth electronic detonator, where the preset time delay of the nth electronic detonator is a delay initiation time of the nth electronic detonator.
A determining unit 924, configured to determine a target time period of the nth electronic detonator according to the preset time delay of the nth electronic detonator, where the target time period of the nth electronic detonator is one of the preset time period sequences of the nth electronic detonator.
And a second generating unit 925, configured to generate a second encrypted verification code of the nth electronic detonator according to the target time period and the password information of the nth electronic detonator and the first encrypted verification code of the N-1 electronic detonator, where the second encrypted verification code of the nth electronic detonator is one of the dynamic encrypted verification codes of the nth electronic detonator.
Referring to fig. 10, fig. 10 is a schematic structural diagram of another electronic detonator password verification device provided in an embodiment of the present application, the device is applied to the second terminal device of fig. 1, and the device includes.
The obtaining module 100 is configured to obtain the password information and the second encrypted verification code of the nth electronic detonator, and the first encrypted verification code of the nth-1 electronic detonator, where N is an integer greater than or equal to 1.
The generating module 101 is configured to generate a first decryption verification code of the nth electronic detonator according to the password information of the nth electronic detonator and the first encryption verification code of the N-1 electronic detonator.
And the verification module 102 is configured to, if it is determined that the second encrypted verification code and the first decrypted verification code of the nth electronic detonator are identical, use the password information of the nth electronic detonator as the effective initiation password of the nth electronic detonator.
Wherein the generating module 101 includes:
a first obtaining unit 1010, configured to obtain a preset time period sequence of the nth electronic detonator.
The first generating unit 1011 is configured to generate a dynamic decryption verification code of the nth electronic detonator according to the preset time period sequence and the password information of the nth electronic detonator and the first encryption verification code of the N-1 electronic detonator, where the dynamic decryption verification code of the nth electronic detonator includes the first decryption verification code of the nth electronic detonator.
Wherein the verification module 102 comprises:
a second acquiring unit 1020, configured to acquire signature information of the nth electronic detonator.
And the second generating unit 1021 is used for generating a second decryption verification code of the Nth electronic detonator according to the signature information of the Nth electronic detonator.
And the first verification unit 1022 is configured to, if it is determined that the second decryption verification code and the first decryption verification code of the nth electronic detonator are identical, use the password information of the nth electronic detonator as the valid initiation password of the nth electronic detonator.
Wherein the verification module 102 further comprises:
and a third acquiring unit 1023, configured to acquire the dynamic encryption verification code of the nth electronic detonator.
And the second verification unit 1024 is configured to, if it is determined that the dynamic encryption verification and the dynamic decryption verification code of the nth electronic detonator are consistent, use the password information of the nth electronic detonator as the effective initiation password of the nth electronic detonator.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of the functional units and modules is illustrated, and in practical application, the above-described functional distribution may be performed by different functional units and modules according to needs, i.e. the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-described functions. The functional units and modules in the embodiment may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit, where the integrated units may be implemented in a form of hardware or a form of a software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working process of the units and modules in the above system may refer to the corresponding process in the foregoing method embodiment, which is not described herein again.
As shown in fig. 11, the embodiment of the present application further provides a terminal device 20, including a memory 21, a processor 22, and a computer program 23 stored in the memory 21 and capable of running on the processor 22, where the processor 22 executes the computer program 23 to implement the display screen flaw positioning method of each embodiment.
The processor 22 may be a central processing unit (Central Processing Unit, CPU), but may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), field programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 21 may be an internal storage unit of the terminal device 200. The memory 21 may also be an external storage device of the terminal device 200, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) or the like, which are provided on the terminal device 200. Further, the memory 21 may also include both an internal storage unit and an external storage device of the terminal device 200. The memory 21 is used to store computer programs and other programs and data required for the terminal device 200. The memory 21 may also be used to temporarily store data that has been output or is to be output.
The embodiment of the application also provides a computer readable storage medium, wherein the computer readable storage medium stores a computer program, and the computer program realizes the electronic detonator password verification method of each embodiment when being executed by a processor.
The embodiment of the application provides a computer program product which, when run on a terminal device, enables the terminal device to execute to realize the electronic detonator password verification method of each embodiment.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the present application implements all or part of the flow in the methods of the above embodiments, and may be implemented by a computer program to instruct related hardware, where the computer program may be stored in a computer readable storage medium, where the computer program may implement the steps of each method embodiment described above when executed by a processor. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, executable files or in some intermediate form, etc. The computer readable storage medium may include at least: any entity or device capable of carrying computer program code to a photographing device/terminal apparatus, recording medium, computer memory, read-only memory (ROM), random access memory (random access memory, RAM), electrical carrier signals, telecommunications signals, and software distribution media. Such as a U-disk, removable hard disk, magnetic or optical disk, etc.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and in part, not described or illustrated in any particular embodiment, reference may be made to related descriptions of other embodiments.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purposes of the embodiments of the present application.
The above embodiments are only for illustrating the technical solution of the present application, and are not limiting thereof; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application, and are intended to be included in the scope of the present application.

Claims (10)

1. An electronic detonator password verification method, which is characterized by being applied to first terminal equipment, comprises the following steps:
acquiring password information of an Nth electronic detonator, wherein N is an integer greater than or equal to 1;
generating a second encryption verification code of the N-1 electronic detonator according to the password information of the N-1 electronic detonator and the first encryption verification code of the N-1 electronic detonator, wherein the first encryption verification code of the N-1 electronic detonator refers to information generated after encrypting the password information of the N-1 electronic detonator, and the second encryption verification code of the N-1 electronic detonator refers to information generated after encrypting the password information of the N-1 electronic detonator and the first encryption verification code of the N-1 electronic detonator;
and sending the password information and the second encryption verification code of the Nth electronic detonator to a second terminal device, wherein the password information and the second encryption verification code of the Nth electronic detonator are used for verifying the password information of the Nth electronic detonator by the second terminal device.
2. The method of claim 1, wherein the generating the second encrypted validation code for the nth electronic detonator based on the cryptographic information for the nth electronic detonator and the first encrypted validation code for the nth-1 electronic detonator comprises:
Acquiring a preset time period sequence of the Nth electronic detonator, wherein the preset time period sequence of the Nth electronic detonator is a continuous time period taking the moment corresponding to the password information of the Nth electronic detonator as a starting point;
generating a dynamic encryption verification code of the N-th electronic detonator according to the preset time period sequence and the password information of the N-th electronic detonator and the first encryption verification code of the N-1-th electronic detonator, wherein the dynamic encryption verification code of the N-th electronic detonator comprises a second encryption verification code of the N-th electronic detonator, and the dynamic encryption verification code of the N-th electronic detonator refers to a plurality of second encryption verification codes which are respectively generated by using different hash functions in different time periods of the preset time period sequence.
3. The method of claim 2, wherein the sending the password information and the second encrypted authentication code of the nth electronic detonator to the second terminal device comprises:
and sending the preset time period sequence, the password information and the dynamic encryption verification code of the Nth electronic detonator to the second terminal equipment.
4. The method of claim 2, wherein the generating the second encrypted validation code for the nth electronic detonator based on the cryptographic information for the nth electronic detonator and the first encrypted validation code for the nth-1 electronic detonator comprises:
Acquiring the preset time delay of the Nth electronic detonator, wherein the preset time delay of the Nth electronic detonator is the time for delay initiation of the Nth electronic detonator;
determining a target time period of the Nth electronic detonator according to the preset time delay of the Nth electronic detonator, wherein the target time period of the Nth electronic detonator is one of the preset time period sequences of the Nth electronic detonator;
generating a second encryption verification code of the N-th electronic detonator according to the target time period and the password information of the N-th electronic detonator and the first encryption verification code of the N-1-th electronic detonator, wherein the second encryption verification code of the N-th electronic detonator is one of the dynamic encryption verification codes of the N-th electronic detonator.
5. An electronic detonator password verification method, which is characterized by being applied to second terminal equipment, comprises the following steps:
acquiring password information and a second encryption verification code of an N-th electronic detonator and a first encryption verification code of an N-1-th electronic detonator, wherein N is an integer greater than or equal to 1, the second encryption verification code of the N-th electronic detonator refers to information generated after the password information of the N-th electronic detonator and the first encryption verification code of the N-1-th electronic detonator are encrypted, and the first encryption verification code of the N-1-th electronic detonator refers to information generated after the password information of the N-1-th electronic detonator is encrypted;
Generating a first decryption verification code of the Nth electronic detonator according to the password information of the Nth electronic detonator and the first encryption verification code of the N-1 th electronic detonator, wherein the first decryption verification code of the Nth electronic detonator refers to information generated after the password information of the Nth electronic detonator and the first encryption verification code of the N-1 th electronic detonator are encrypted;
and if the second encryption verification code of the Nth electronic detonator is consistent with the first decryption verification code, taking the password information of the Nth electronic detonator as an effective initiation password of the Nth electronic detonator.
6. The method of claim 5, wherein the generating the first decryption validation code for the nth electronic detonator based on the cryptographic information for the nth electronic detonator and the first encryption validation code for the nth-1 electronic detonator comprises:
acquiring a preset time period sequence of the Nth electronic detonator;
generating a dynamic decryption verification code of the N-th electronic detonator according to a preset time period sequence and password information of the N-th electronic detonator and the first encryption verification code of the N-1-th electronic detonator, wherein the dynamic decryption verification code of the N-th electronic detonator comprises the first decryption verification code of the N-th electronic detonator, and the dynamic decryption verification code of the N-th electronic detonator refers to a plurality of first decryption verification codes respectively generated by using different hash functions in different time periods of the preset time period sequence.
7. The method of claim 5, wherein said using the password information of the nth electronic detonator as a valid initiation password for the nth electronic detonator comprises:
acquiring a dynamic encryption verification code of the Nth electronic detonator;
and if the dynamic encryption verification and the dynamic decryption verification code of the Nth electronic detonator are consistent, taking the password information of the Nth electronic detonator as an effective initiation password of the Nth electronic detonator.
8. An electronic detonator password verification device, characterized by being applied to a first terminal device, comprising:
the acquisition module is used for acquiring the password information of the Nth electronic detonator, wherein N is an integer greater than or equal to 1;
the generation module is used for generating a second encryption verification code of the N-1 electronic detonator according to the password information of the N-1 electronic detonator and the first encryption verification code of the N-1 electronic detonator, wherein the first encryption verification code of the N-1 electronic detonator refers to information generated after encrypting the password information of the N-1 electronic detonator, and the second encryption verification code of the N electronic detonator refers to information generated after encrypting the password information of the N electronic detonator and the first encryption verification code of the N-1 electronic detonator;
The transmission module is used for transmitting the password information and the second encryption verification code of the Nth electronic detonator to the second terminal equipment, wherein the password information and the second encryption verification code of the Nth electronic detonator are used for verifying the password information of the Nth electronic detonator by the second terminal equipment.
9. An electronic detonator password verification device, characterized by being applied to a second terminal device, comprising:
the system comprises an acquisition module, a verification module and a verification module, wherein the acquisition module is used for acquiring the password information and a second encryption verification code of an N-1 electronic detonator and a first encryption verification code of the N-1 electronic detonator, N is an integer greater than or equal to 1, the second encryption verification code of the N-1 electronic detonator refers to information generated after the password information of the N-1 electronic detonator and the first encryption verification code of the N-1 electronic detonator are encrypted, and the first encryption verification code of the N-1 electronic detonator refers to information generated after the password information of the N-1 electronic detonator is encrypted;
the generation module is used for generating a first decryption verification code of the N-1 electronic detonator according to the password information of the N-1 electronic detonator and the first encryption verification code of the N-1 electronic detonator, wherein the first decryption verification code of the N-1 electronic detonator refers to information generated after the password information of the N-1 electronic detonator and the first encryption verification code of the N-1 electronic detonator are encrypted;
And the verification module is used for taking the password information of the Nth electronic detonator as the effective initiation password of the Nth electronic detonator if the second encryption verification code of the Nth electronic detonator is identical to the first decryption verification code.
10. A terminal device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the electronic detonator password verification method of any one of claims 1 to 4 or claims 5 to 7 when the computer program is executed.
CN202110865484.6A 2021-07-29 2021-07-29 Electronic detonator password verification method and device and terminal equipment Active CN113656792B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110865484.6A CN113656792B (en) 2021-07-29 2021-07-29 Electronic detonator password verification method and device and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110865484.6A CN113656792B (en) 2021-07-29 2021-07-29 Electronic detonator password verification method and device and terminal equipment

Publications (2)

Publication Number Publication Date
CN113656792A CN113656792A (en) 2021-11-16
CN113656792B true CN113656792B (en) 2024-03-15

Family

ID=78490892

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110865484.6A Active CN113656792B (en) 2021-07-29 2021-07-29 Electronic detonator password verification method and device and terminal equipment

Country Status (1)

Country Link
CN (1) CN113656792B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103217079A (en) * 2012-12-12 2013-07-24 柳州长虹机器制造公司 Nonpolar double-wire communication digital electronic detonator capable of self-delaying and detonation method thereof
WO2015084707A2 (en) * 2013-12-02 2015-06-11 Austin Powder Company Method and apparatus for wireless blasting
CN105592159A (en) * 2015-12-31 2016-05-18 贵州久联民爆器材发展股份有限公司 Method of utilizing GPRS network to realize electronic detonator networked control
CN109696097A (en) * 2019-02-16 2019-04-30 华夏世昌(北京)科技有限公司 Digital electric detonator chip and control method based on dual-wire bus
CN110243240A (en) * 2019-05-29 2019-09-17 中北大学 A kind of electronic detonator initiator by Beidou and UID code constrained and time
CN112985205A (en) * 2021-03-24 2021-06-18 广西中爆电子科技有限公司 Terminal for supervision work of electronic detonator initiator
CN113028917A (en) * 2021-03-05 2021-06-25 苏州一路连科科技有限公司 Time-adjustable electronic detonator control method and device and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160087687A1 (en) * 2008-09-27 2016-03-24 Witricity Corporation Communication in a wireless power transmission system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103217079A (en) * 2012-12-12 2013-07-24 柳州长虹机器制造公司 Nonpolar double-wire communication digital electronic detonator capable of self-delaying and detonation method thereof
WO2015084707A2 (en) * 2013-12-02 2015-06-11 Austin Powder Company Method and apparatus for wireless blasting
CN105592159A (en) * 2015-12-31 2016-05-18 贵州久联民爆器材发展股份有限公司 Method of utilizing GPRS network to realize electronic detonator networked control
CN109696097A (en) * 2019-02-16 2019-04-30 华夏世昌(北京)科技有限公司 Digital electric detonator chip and control method based on dual-wire bus
CN110243240A (en) * 2019-05-29 2019-09-17 中北大学 A kind of electronic detonator initiator by Beidou and UID code constrained and time
CN113028917A (en) * 2021-03-05 2021-06-25 苏州一路连科科技有限公司 Time-adjustable electronic detonator control method and device and storage medium
CN112985205A (en) * 2021-03-24 2021-06-18 广西中爆电子科技有限公司 Terminal for supervision work of electronic detonator initiator

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
电子雷管起爆及控制系统设计;王晓静;《中国优秀硕士学位论文全文数据库 (工程科技Ⅰ辑)》(第6期);全文 *

Also Published As

Publication number Publication date
CN113656792A (en) 2021-11-16

Similar Documents

Publication Publication Date Title
CN110378139B (en) Data key protection method, system, electronic equipment and storage medium
CN109429222B (en) Method for encrypting wireless network equipment upgrading program and communication data
CN107810617B (en) Secret authentication and provisioning
US11876791B2 (en) Message authentication with secure code verification
CN107085675B (en) Controlled security code authentication
CN108809646B (en) Secure shared key sharing system
US9537657B1 (en) Multipart authenticated encryption
Turan et al. Recommendation for password-based key derivation
CN110401615B (en) Identity authentication method, device, equipment, system and readable storage medium
CN110149209B (en) Internet of things equipment and method and device for improving data transmission safety of Internet of things equipment
CN105553951A (en) Data transmission method and data transmission device
CN113691502B (en) Communication method, device, gateway server, client and storage medium
CN110868291B (en) Data encryption transmission method, device, system and storage medium
CN110690956B (en) Bidirectional authentication method and system, server and terminal
CN103678174A (en) Data safety method, storage device and data safety system
CN108199827B (en) Client code integrity checking method, storage medium, electronic device and system
CN109951276B (en) Embedded equipment remote identity authentication method based on TPM
CN112241527B (en) Secret key generation method and system of terminal equipment of Internet of things and electronic equipment
CN111970114A (en) File encryption method, system, server and storage medium
Turan et al. Sp 800-132. recommendation for password-based key derivation: Part 1: Storage applications
TW201608412A (en) Agent for providing security cloud service and security token device for security cloud service
CN115549910B (en) Data transmission method, equipment and storage medium
CN113656792B (en) Electronic detonator password verification method and device and terminal equipment
Keleman et al. Secure firmware update in embedded systems
CN109617696B (en) Data encryption and data decryption method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant