CN118072426B - Hash-based intelligent door lock user information storage method, unlocking method and intelligent door lock - Google Patents
Hash-based intelligent door lock user information storage method, unlocking method and intelligent door lock Download PDFInfo
- Publication number
- CN118072426B CN118072426B CN202410461862.8A CN202410461862A CN118072426B CN 118072426 B CN118072426 B CN 118072426B CN 202410461862 A CN202410461862 A CN 202410461862A CN 118072426 B CN118072426 B CN 118072426B
- Authority
- CN
- China
- Prior art keywords
- key
- storage area
- door lock
- value
- intelligent door
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 35
- 230000002427 irreversible effect Effects 0.000 abstract description 10
- 230000009286 beneficial effect Effects 0.000 abstract description 2
- 238000013500 data storage Methods 0.000 description 2
- 230000006378 damage Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention aims to disclose a hash-based intelligent door lock user information storage method, an unlocking method and an intelligent door lock, and relates to the technical field of intelligent door lock control, comprising the following steps: setting an AES128 encryption key on the intelligent door lock; setting a first password by a user, and converting the first password into a 128-byte first ciphertext through an AES128 algorithm; generating a first key-value by the first ciphertext through a hash function; the first key-value is stored in the storage unit of the intelligent door lock, and the beneficial effects are that: the intelligent door lock distributes unique encryption keys, and a first cipher such as an IC card, a character string, fingerprint data or face data of a user generates a 128-bit first cipher text under the actions of the encryption keys and an AES128 encryption algorithm; the first key-value is generated by the first ciphertext through a hash function, the hash function is an irreversible encryption algorithm, the data security of the privacy information of the user is ensured, and the privacy information cannot be obtained even if the user is monitored or physically damaged.
Description
Technical Field
The invention relates to the technical field of intelligent door lock control, in particular to a hash-based intelligent door lock user information storage method, an unlocking method and an intelligent door lock.
Background
The unlocking key of the intelligent door lock needs to be stored locally, so that the intelligent door lock can compare the consistency of the key of the user with the stored key in real time. At present, a key locally stored in an intelligent door lock is private information of a user, such as fingerprint information, face information, character string passwords or IC card information, and in order to prevent information from being intercepted and monitored illegally, an encryption key is usually added in communication. However, the illegal act of acquiring the user information through physical destruction cannot be eradicated, and the possibility that the key stored in the current intelligent door lock is illegally acquired is not avoided.
In view of the foregoing, there is a need to develop a hash-based intelligent door lock user information storage method, an unlocking method and an intelligent door lock to solve the above problems.
Disclosure of Invention
The invention aims to disclose a hash-based intelligent door lock user information storage method, an unlocking method and an intelligent door lock, wherein a user password is irreversible and can not be decrypted by performing AES128 encryption and hash function encryption on the user password, and even if the user password is monitored or physically damaged, a secret key can not be obtained.
The first invention aims to provide a hash-based intelligent door lock user information storage method.
The second invention aims to provide an intelligent door lock unlocking method based on hash.
The third invention aims to provide an intelligent door lock based on hash.
In order to achieve the first object, the present invention provides a method for storing user information of an intelligent door lock based on hash, comprising the following steps:
Setting an AES128 encryption key on the intelligent door lock;
setting a first password by a user, wherein the first password is converted into a 128-byte first ciphertext through an AES128 algorithm;
The first ciphertext generates a first key-value through a hash function;
and storing the first key-value in a storage unit of the intelligent door lock.
Preferably, the first password is an IC card, a character string, fingerprint data or face data.
Preferably, the storage unit is divided into a first storage area, a second storage area, a third storage area and a fourth storage area;
The first key-value of the IC card is stored in a first storage area;
The first key-value of the character string is stored in a second storage area;
the first key-value of the fingerprint data is stored in a third storage area;
And the first key-value of the face data is stored in a fourth storage area.
Preferably, the fourth storage area space > the third storage area space > the second storage area space > the first storage area space.
Based on the same principle of the invention, in order to achieve the second object, the invention provides a hash-based intelligent door lock unlocking method, which comprises the following steps:
the first key-value is stored by the intelligent door lock user information storage method based on the hash, which is created by the first invention;
The user inputs a second password, and the second password is converted into a 128-byte second ciphertext through an AES128 algorithm;
Generating a second key-value by the second ciphertext through a hash function;
Judging whether the first key-value is consistent with the second key-value;
If the two parameters are consistent with each other, unlocking is performed;
if the unlocking states are inconsistent, illegal unlocking is reported.
Preferably, the method further comprises the following steps:
Executing unlocking information and illegal unlocking information to be recorded in an event record table;
and the communication module of the intelligent door lock sends event information data in the event record list to the user.
Based on the same principle of the invention, in order to achieve the third invention object, the invention provides an intelligent door lock based on hash, which comprises a door lock executing mechanism, a storage unit and a control unit;
The intelligent door lock distributes AES128 encryption keys according to random numbers when leaving the factory;
and setting an AES128 algorithm module and a hash algorithm module in the storage unit.
Preferably, the IC card, the character string, the fingerprint data or the face data of the user sequentially pass through the AES128 algorithm module and the hash algorithm module to form a first key-value, and the first key-value is stored in the storage unit.
Preferably, the storage unit is divided into a first storage area, a second storage area, a third storage area and a fourth storage area;
The first key-value of the IC card is stored in a first storage area;
The first key-value of the character string is stored in a second storage area;
the first key-value of the fingerprint data is stored in a third storage area;
And the first key-value of the face data is stored in a fourth storage area.
Preferably, the fourth storage area space > the third storage area space > the second storage area space > the first storage area space.
Compared with the prior art, the invention has the beneficial effects that:
(1) When the intelligent door locks leave the factory, AES128 encryption keys are distributed according to random numbers, namely each intelligent door lock is distributed with a unique encryption key, and a first cipher such as an IC card, a character string, fingerprint data or face data of a user firstly generates 128-bit first cipher text under the actions of the encryption keys and an AES128 encryption algorithm; the first ciphertext generates a first key-value through a hash function, wherein the key represents a hash code, the value represents a ciphertext character string, the hash code is used for indicating a storage position of the ciphertext character string, and the data security of privacy information of a user is ensured because the hash function is an irreversible encryption algorithm, so that the privacy information of the user is irreversible and can not be deciphered, and even if the privacy information is monitored or physically damaged, the privacy information can not be obtained.
(2) The invention also provides an unlocking method, wherein the private data such as the IC card, the character string, the fingerprint data or the face data of the user are encrypted by an AES128 encryption algorithm and a hash function to generate a first key-value which is stored in the intelligent door lock; when a user unlocks, a second password such as an IC card, a character string, fingerprint data or face data is input, the second password also generates a second key-value through an AES128 encryption algorithm and a hash function, the second key-value is compared with the first key-value, unlocking is achieved if the second key-value is consistent with the first key-value, unlocking is not achieved if the second key-value is inconsistent with the first key-value, and encryption storage and encryption unlocking are achieved.
(3) The invention also provides an intelligent door lock based on the hash, wherein an ASE128 algorithm module and a hash algorithm module are arranged in a storage unit of the intelligent door lock, so that the door lock encrypts the input privacy data such as an IC card, a character string, fingerprint data or face data by the ASE128 algorithm and the hash algorithm, the data security of the privacy information of a user is ensured, the privacy information of the user is irreversible and can not be deciphered, and the privacy information can not be obtained even if the privacy information is monitored or physically damaged.
Drawings
FIG. 1 is a flow chart of a method according to an embodiment of the invention.
Fig. 2 is a flowchart of a second method according to the embodiment of the invention.
Fig. 3 is a control block diagram of a three-intelligent door lock according to an embodiment of the present invention.
Detailed Description
The present invention will be described in detail below with reference to the embodiments shown in the drawings, but it should be understood that the embodiments are not limited to the present invention, and functional, method, or structural equivalents and alternatives according to the embodiments are within the scope of protection of the present invention by those skilled in the art.
The following describes embodiments of the present invention.
Example 1
Referring to fig. 1, this embodiment discloses a specific implementation manner of a hash-based intelligent door lock user information storage method.
Referring to fig. 1, in this embodiment, the method for storing user information of a smart door lock based on hash includes the following steps:
Step S1: setting an ASE128 encryption key in the intelligent door lock; specifically, when the intelligent door locks leave the factory, AES128 encryption keys are distributed according to random numbers, namely each intelligent door lock is distributed with a unique encryption key, the encryption keys are stored in the intelligent door locks, and meanwhile, an ASE128 algorithm module and a hash algorithm module are arranged in a storage unit of the intelligent door locks.
Step S2: setting a first password by a user, wherein the first password is converted into a first ciphertext of 128 bytes through an ASE128 algorithm; specifically, the first password is an IC card, a character string, fingerprint data or face data, and the first password is converted into a 128-bit first ciphertext through an ASE128 algorithm.
Step S3: the first ciphertext generates a first key-value through a hash function; specifically, the 128-bit first ciphertext generates a first key-value through a hash function, wherein the key represents a hash code, the value represents a ciphertext character string, the hash code is used for indicating a storage position of the ciphertext character string, and since the hash function is an irreversible encryption algorithm, the data security of the privacy information of the user is ensured, so that the privacy information of the user is irreversible and also can not be deciphered, and even if the privacy information is monitored or physically damaged, the privacy information can not be obtained.
Step S4: and storing the first key-value in a storage unit of the intelligent door lock. Specifically, in view of the difference of storage space occupied by the IC card, the character string, the fingerprint data or the face data, in order to optimize and efficiently utilize the storage space, the storage unit is divided into a first storage area, a second storage area, a third storage area and a fourth storage area, so as to prevent different kinds of data storage positions of users from transmitting conflicts when multiple users use the intelligent door lock; the first key-value of the IC card is stored in a first storage area; the first key-value of the character string is stored in a second storage area; the first key-value of the fingerprint data is stored in a third storage area; the first key-value of the face data is stored in the fourth storage area, the fourth storage area space is larger than the third storage area space, the second storage area space is larger than the first storage area space, namely the first key-value of the face data is divided into the largest storage area, and the first key-value of the IC card is divided into the smallest storage area, so that the reasonable utilization of the storage unit by a user is facilitated.
Based on the random encryption key, the user password (IC card, character string, fingerprint data or human face data) is encrypted by AES128 and the hash function is encrypted successively, so that the user password is irreversible and can not be decrypted, and even if the user password is monitored or physically destroyed, the user privacy information can not be obtained.
Example two
Referring to fig. 2, this embodiment discloses a specific implementation of a hash-based intelligent door lock unlocking method.
Referring to fig. 2, in this embodiment, the method for unlocking the intelligent door lock based on hash includes the following steps:
The method for storing user information of a hash-based intelligent door lock according to the first embodiment stores a first key-value; specifically, the storage method of the first embodiment stores the privacy information of the user, such as an IC card, a character string, fingerprint data or face data, as a first key-value;
Step S5: the user inputs a second password, and the second password is converted into a 128-byte second ciphertext through an ASE128 algorithm; specifically, the second password is an IC card, a character string, fingerprint data or face data, and the second password is converted into a 128-bit second ciphertext through an ASE128 algorithm.
Step S6: generating a second key-value by the second ciphertext through a hash function; specifically, the 128-bit second ciphertext generates a second key-value through a hash function, wherein the key represents a hash code, the value represents a ciphertext character string, and the hash code is used for indicating a storage position of the ciphertext character string to be compared.
Judging whether the first key-value is consistent with the second key-value; specifically, whether the input ciphertext character string and the stored ciphertext character string match or not is compared.
Step S7: if the input password is consistent, unlocking is executed, and if the input password is consistent, the input password is correct;
if the input password is inconsistent, the input password is wrong, and illegal unlocking is reported or the input is reminded to be restarted.
In order to record the execution information of the door lock, unlocking information and illegal unlocking information are recorded in an event record table, and a communication module of the intelligent door lock sends event information data in the event record table to a user, so that the user can know the execution information of the door lock in real time.
Example III
Referring to fig. 3, this embodiment discloses a specific implementation manner of a hash-based intelligent door lock.
Referring to fig. 3, in this embodiment, a hash-based intelligent door lock includes a door lock executing mechanism, a storage unit, and a control unit; when the intelligent door locks leave the factory, AES128 encryption keys are distributed according to random numbers, namely each intelligent door lock is distributed with a unique encryption key; setting an AES128 algorithm module and a hash algorithm module in the storage unit, generating a 128-bit first ciphertext under the action of an encryption key and an AES128 encryption algorithm by a first password such as an IC card, a character string, fingerprint data or face data of a user, generating a first key-value by the 128-bit first ciphertext through a hash function, and storing the first key-value in the storage unit, wherein the key represents a hash code, the value represents a ciphertext character string, the hash code is used for indicating the storage position of the ciphertext character string, and the data security of privacy information of the user is ensured because the hash function is an irreversible encryption algorithm, so that the privacy information of the user is irreversible and also can not be decrypted, and even if the privacy information is monitored or physically destroyed, the privacy information can not be obtained.
In view of the different storage spaces occupied by the IC card, the character string, the fingerprint data or the face data, the storage unit is divided into a first storage area, a second storage area, a third storage area and a fourth storage area for optimizing and efficiently utilizing the storage space and preventing different kinds of data storage positions of users from transmitting conflict when multiple users use the intelligent door lock; the first key-value of the IC card is stored in a first storage area; the first key-value of the character string is stored in a second storage area; the first key-value of the fingerprint data is stored in a third storage area; the first key-value of the face data is stored in the fourth storage area, the fourth storage area space is larger than the third storage area space, the second storage area space is larger than the first storage area space, namely the first key-value of the face data is divided into the largest storage area, and the first key-value of the IC card is divided into the smallest storage area, so that the reasonable utilization of the storage unit by a user is facilitated.
The IC card, the character string, the fingerprint data or the face data of the intelligent door lock based on the hash according to the third embodiment adopts the method for storing the user information of the intelligent door lock based on the hash according to the first embodiment; the unlocking method of the intelligent door lock based on the hash in the third embodiment adopts the unlocking method of the intelligent door lock based on the hash in the second embodiment, and the parts of the third embodiment which are the same as those of the first embodiment or the second embodiment are referred to in the first embodiment or the second embodiment, and are not described again here.
The above list of detailed descriptions is only specific to practical embodiments of the present invention, and they are not intended to limit the scope of the present invention, and all equivalent embodiments or modifications that do not depart from the spirit of the present invention should be included in the scope of the present invention.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
Furthermore, it should be understood that although the present disclosure describes embodiments, not every embodiment is provided with a separate embodiment, and that this description is provided for clarity only, and that the disclosure is not limited to the embodiments described in detail below, and that the embodiments described in the examples may be combined as appropriate to form other embodiments that will be apparent to those skilled in the art.
Claims (4)
1. The intelligent door lock user information storage method based on the hash is characterized by comprising the following steps of:
Setting an AES128 encryption key on the intelligent door lock, distributing the AES128 encryption key according to a random number when the intelligent door lock leaves a factory, and storing the encryption key in the intelligent door lock;
setting a first password by a user, wherein the first password is converted into a 128-byte first ciphertext through an AES128 algorithm;
The first ciphertext generates a first key-value through a hash function;
storing the first key-value in a storage unit of the intelligent door lock;
the first password is an IC card, a character string, fingerprint data or face data;
the storage unit is divided into a first storage area, a second storage area, a third storage area and a fourth storage area;
The first key-value of the IC card is stored in a first storage area;
The first key-value of the character string is stored in a second storage area;
the first key-value of the fingerprint data is stored in a third storage area;
The first key-value of the face data is stored in a fourth storage area;
The fourth storage area space is larger than the third storage area space, the second storage area space is larger than the first storage area space;
the key represents a hash code, the value represents a ciphertext character string, and the hash code is used for indicating a storage position of the ciphertext character string.
2. The intelligent door lock unlocking method based on the hash is characterized by comprising the following steps of:
storing a first key-value by the hash-based intelligent door lock user information storage method of claim 1;
The user inputs a second password, and the second password is converted into a 128-byte second ciphertext through an AES128 algorithm;
Generating a second key-value by the second ciphertext through a hash function;
Judging whether the first key-value is consistent with the second key-value;
If the two parameters are consistent with each other, unlocking is performed;
if the unlocking states are inconsistent, illegal unlocking is reported.
3. The intelligent door lock unlocking method based on hash as claimed in claim 2, further comprising the steps of:
Executing unlocking information and illegal unlocking information to be recorded in an event record table;
and the communication module of the intelligent door lock sends event information data in the event record list to the user.
4. The intelligent door lock based on the hash is characterized by comprising a door lock executing mechanism, a storage unit and a control unit;
when the intelligent door lock leaves a factory, AES128 encryption keys are distributed according to random numbers, and the encryption keys are stored in the intelligent door lock;
Setting an AES128 algorithm module and a hash algorithm module in the storage unit; the IC card, the character string, the fingerprint data or the face data of the user sequentially pass through an AES128 algorithm module and a hash algorithm module to form a first key-value, and the first key-value is stored in the storage unit; the storage unit is divided into a first storage area, a second storage area, a third storage area and a fourth storage area;
The first key-value of the IC card is stored in a first storage area;
The first key-value of the character string is stored in a second storage area;
the first key-value of the fingerprint data is stored in a third storage area;
the first key-value of the face data is stored in a fourth storage area; the fourth storage area space is larger than the third storage area space, the second storage area space is larger than the first storage area space;
the key represents a hash code, the value represents a ciphertext character string, and the hash code is used for indicating a storage position of the ciphertext character string.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410461862.8A CN118072426B (en) | 2024-04-17 | 2024-04-17 | Hash-based intelligent door lock user information storage method, unlocking method and intelligent door lock |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410461862.8A CN118072426B (en) | 2024-04-17 | 2024-04-17 | Hash-based intelligent door lock user information storage method, unlocking method and intelligent door lock |
Publications (2)
Publication Number | Publication Date |
---|---|
CN118072426A CN118072426A (en) | 2024-05-24 |
CN118072426B true CN118072426B (en) | 2024-08-02 |
Family
ID=91100725
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202410461862.8A Active CN118072426B (en) | 2024-04-17 | 2024-04-17 | Hash-based intelligent door lock user information storage method, unlocking method and intelligent door lock |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN118072426B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109450878A (en) * | 2018-10-25 | 2019-03-08 | 华中科技大学鄂州工业技术研究院 | Biological feather recognition method, device and system |
CN112507313A (en) * | 2021-01-05 | 2021-03-16 | 晶晨半导体(深圳)有限公司 | Fingerprint verification method, chip and intelligent door lock |
CN114374521A (en) * | 2022-03-22 | 2022-04-19 | 广东电力交易中心有限责任公司 | Private data protection method, electronic equipment and storage medium |
CN116339621A (en) * | 2023-02-20 | 2023-06-27 | 中移动信息技术有限公司 | Data storage method, device, equipment and computer storage medium |
CN117333973A (en) * | 2023-11-02 | 2024-01-02 | 东莞市安邦德智能锁具科技有限公司 | Intelligent lock remote control system based on Internet |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110197541A (en) * | 2019-05-21 | 2019-09-03 | 北京首汽智行科技有限公司 | A kind of shared automobile management method based on block chain |
CN117093579A (en) * | 2023-06-29 | 2023-11-21 | 蚂蚁区块链科技(上海)有限公司 | Data query and data storage method, device, equipment and storage medium |
-
2024
- 2024-04-17 CN CN202410461862.8A patent/CN118072426B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109450878A (en) * | 2018-10-25 | 2019-03-08 | 华中科技大学鄂州工业技术研究院 | Biological feather recognition method, device and system |
CN112507313A (en) * | 2021-01-05 | 2021-03-16 | 晶晨半导体(深圳)有限公司 | Fingerprint verification method, chip and intelligent door lock |
CN114374521A (en) * | 2022-03-22 | 2022-04-19 | 广东电力交易中心有限责任公司 | Private data protection method, electronic equipment and storage medium |
CN116339621A (en) * | 2023-02-20 | 2023-06-27 | 中移动信息技术有限公司 | Data storage method, device, equipment and computer storage medium |
CN117333973A (en) * | 2023-11-02 | 2024-01-02 | 东莞市安邦德智能锁具科技有限公司 | Intelligent lock remote control system based on Internet |
Also Published As
Publication number | Publication date |
---|---|
CN118072426A (en) | 2024-05-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liang et al. | A mutual security authentication method for RFID-PUF circuit based on deep learning | |
WO2018046008A1 (en) | Storage design method of blockchain encrypted radio frequency chip | |
US9467293B1 (en) | Generating authentication codes associated with devices | |
AU2013101034B4 (en) | Registration and authentication of computing devices using a digital skeleton key | |
US7178025B2 (en) | Access system utilizing multiple factor identification and authentication | |
US6959394B1 (en) | Splitting knowledge of a password | |
CN101309278B (en) | Method and system for storing encrypt data on customer | |
JP2008541591A (en) | Implementing integrity-protected secure storage | |
WO1999024895A1 (en) | Tamper resistant method and apparatus | |
EP2339777A2 (en) | Method of authenticating a user to use a system | |
CN102138300A (en) | Message authentication code pre-computation with applications to secure memory | |
CN103095452A (en) | Random encryption method needing to adopt exhaustion method for deciphering | |
CN107070660A (en) | A kind of design Storage method of block chain encrypted radio-frequency chip | |
US9246684B2 (en) | Data protection system and method | |
JP2024511236A (en) | Computer file security encryption method, decryption method and readable storage medium | |
CN112653553A (en) | Internet of things equipment identity management system | |
EP3214567B1 (en) | Secure external update of memory content for a certain system on chip | |
CN116527258B (en) | Unlocking method, device, equipment and storage medium of coded lock | |
US20150012755A1 (en) | Cryptographic Passcode Reset | |
CN108574578A (en) | A kind of black box data protection system and method | |
CN118072426B (en) | Hash-based intelligent door lock user information storage method, unlocking method and intelligent door lock | |
Mursalat et al. | Column-Level Database Encryption Using Rijndael Algorithm and Dynamic Key on Learning Management System | |
Hristea | Reliable RFID Offline Privacy | |
Turakulovich et al. | Comparative factors of key generation techniques | |
CN106789005A (en) | Cryptosecurity storage system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |