CN118072426B - Hash-based intelligent door lock user information storage method, unlocking method and intelligent door lock - Google Patents

Hash-based intelligent door lock user information storage method, unlocking method and intelligent door lock Download PDF

Info

Publication number
CN118072426B
CN118072426B CN202410461862.8A CN202410461862A CN118072426B CN 118072426 B CN118072426 B CN 118072426B CN 202410461862 A CN202410461862 A CN 202410461862A CN 118072426 B CN118072426 B CN 118072426B
Authority
CN
China
Prior art keywords
key
storage area
door lock
value
intelligent door
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410461862.8A
Other languages
Chinese (zh)
Other versions
CN118072426A (en
Inventor
邓武仓
胡琴琴
潘贤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Kunshan General Locks Co ltd
Original Assignee
Suzhou Kunshan General Locks Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Kunshan General Locks Co ltd filed Critical Suzhou Kunshan General Locks Co ltd
Priority to CN202410461862.8A priority Critical patent/CN118072426B/en
Publication of CN118072426A publication Critical patent/CN118072426A/en
Application granted granted Critical
Publication of CN118072426B publication Critical patent/CN118072426B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention aims to disclose a hash-based intelligent door lock user information storage method, an unlocking method and an intelligent door lock, and relates to the technical field of intelligent door lock control, comprising the following steps: setting an AES128 encryption key on the intelligent door lock; setting a first password by a user, and converting the first password into a 128-byte first ciphertext through an AES128 algorithm; generating a first key-value by the first ciphertext through a hash function; the first key-value is stored in the storage unit of the intelligent door lock, and the beneficial effects are that: the intelligent door lock distributes unique encryption keys, and a first cipher such as an IC card, a character string, fingerprint data or face data of a user generates a 128-bit first cipher text under the actions of the encryption keys and an AES128 encryption algorithm; the first key-value is generated by the first ciphertext through a hash function, the hash function is an irreversible encryption algorithm, the data security of the privacy information of the user is ensured, and the privacy information cannot be obtained even if the user is monitored or physically damaged.

Description

Hash-based intelligent door lock user information storage method, unlocking method and intelligent door lock
Technical Field
The invention relates to the technical field of intelligent door lock control, in particular to a hash-based intelligent door lock user information storage method, an unlocking method and an intelligent door lock.
Background
The unlocking key of the intelligent door lock needs to be stored locally, so that the intelligent door lock can compare the consistency of the key of the user with the stored key in real time. At present, a key locally stored in an intelligent door lock is private information of a user, such as fingerprint information, face information, character string passwords or IC card information, and in order to prevent information from being intercepted and monitored illegally, an encryption key is usually added in communication. However, the illegal act of acquiring the user information through physical destruction cannot be eradicated, and the possibility that the key stored in the current intelligent door lock is illegally acquired is not avoided.
In view of the foregoing, there is a need to develop a hash-based intelligent door lock user information storage method, an unlocking method and an intelligent door lock to solve the above problems.
Disclosure of Invention
The invention aims to disclose a hash-based intelligent door lock user information storage method, an unlocking method and an intelligent door lock, wherein a user password is irreversible and can not be decrypted by performing AES128 encryption and hash function encryption on the user password, and even if the user password is monitored or physically damaged, a secret key can not be obtained.
The first invention aims to provide a hash-based intelligent door lock user information storage method.
The second invention aims to provide an intelligent door lock unlocking method based on hash.
The third invention aims to provide an intelligent door lock based on hash.
In order to achieve the first object, the present invention provides a method for storing user information of an intelligent door lock based on hash, comprising the following steps:
Setting an AES128 encryption key on the intelligent door lock;
setting a first password by a user, wherein the first password is converted into a 128-byte first ciphertext through an AES128 algorithm;
The first ciphertext generates a first key-value through a hash function;
and storing the first key-value in a storage unit of the intelligent door lock.
Preferably, the first password is an IC card, a character string, fingerprint data or face data.
Preferably, the storage unit is divided into a first storage area, a second storage area, a third storage area and a fourth storage area;
The first key-value of the IC card is stored in a first storage area;
The first key-value of the character string is stored in a second storage area;
the first key-value of the fingerprint data is stored in a third storage area;
And the first key-value of the face data is stored in a fourth storage area.
Preferably, the fourth storage area space > the third storage area space > the second storage area space > the first storage area space.
Based on the same principle of the invention, in order to achieve the second object, the invention provides a hash-based intelligent door lock unlocking method, which comprises the following steps:
the first key-value is stored by the intelligent door lock user information storage method based on the hash, which is created by the first invention;
The user inputs a second password, and the second password is converted into a 128-byte second ciphertext through an AES128 algorithm;
Generating a second key-value by the second ciphertext through a hash function;
Judging whether the first key-value is consistent with the second key-value;
If the two parameters are consistent with each other, unlocking is performed;
if the unlocking states are inconsistent, illegal unlocking is reported.
Preferably, the method further comprises the following steps:
Executing unlocking information and illegal unlocking information to be recorded in an event record table;
and the communication module of the intelligent door lock sends event information data in the event record list to the user.
Based on the same principle of the invention, in order to achieve the third invention object, the invention provides an intelligent door lock based on hash, which comprises a door lock executing mechanism, a storage unit and a control unit;
The intelligent door lock distributes AES128 encryption keys according to random numbers when leaving the factory;
and setting an AES128 algorithm module and a hash algorithm module in the storage unit.
Preferably, the IC card, the character string, the fingerprint data or the face data of the user sequentially pass through the AES128 algorithm module and the hash algorithm module to form a first key-value, and the first key-value is stored in the storage unit.
Preferably, the storage unit is divided into a first storage area, a second storage area, a third storage area and a fourth storage area;
The first key-value of the IC card is stored in a first storage area;
The first key-value of the character string is stored in a second storage area;
the first key-value of the fingerprint data is stored in a third storage area;
And the first key-value of the face data is stored in a fourth storage area.
Preferably, the fourth storage area space > the third storage area space > the second storage area space > the first storage area space.
Compared with the prior art, the invention has the beneficial effects that:
(1) When the intelligent door locks leave the factory, AES128 encryption keys are distributed according to random numbers, namely each intelligent door lock is distributed with a unique encryption key, and a first cipher such as an IC card, a character string, fingerprint data or face data of a user firstly generates 128-bit first cipher text under the actions of the encryption keys and an AES128 encryption algorithm; the first ciphertext generates a first key-value through a hash function, wherein the key represents a hash code, the value represents a ciphertext character string, the hash code is used for indicating a storage position of the ciphertext character string, and the data security of privacy information of a user is ensured because the hash function is an irreversible encryption algorithm, so that the privacy information of the user is irreversible and can not be deciphered, and even if the privacy information is monitored or physically damaged, the privacy information can not be obtained.
(2) The invention also provides an unlocking method, wherein the private data such as the IC card, the character string, the fingerprint data or the face data of the user are encrypted by an AES128 encryption algorithm and a hash function to generate a first key-value which is stored in the intelligent door lock; when a user unlocks, a second password such as an IC card, a character string, fingerprint data or face data is input, the second password also generates a second key-value through an AES128 encryption algorithm and a hash function, the second key-value is compared with the first key-value, unlocking is achieved if the second key-value is consistent with the first key-value, unlocking is not achieved if the second key-value is inconsistent with the first key-value, and encryption storage and encryption unlocking are achieved.
(3) The invention also provides an intelligent door lock based on the hash, wherein an ASE128 algorithm module and a hash algorithm module are arranged in a storage unit of the intelligent door lock, so that the door lock encrypts the input privacy data such as an IC card, a character string, fingerprint data or face data by the ASE128 algorithm and the hash algorithm, the data security of the privacy information of a user is ensured, the privacy information of the user is irreversible and can not be deciphered, and the privacy information can not be obtained even if the privacy information is monitored or physically damaged.
Drawings
FIG. 1 is a flow chart of a method according to an embodiment of the invention.
Fig. 2 is a flowchart of a second method according to the embodiment of the invention.
Fig. 3 is a control block diagram of a three-intelligent door lock according to an embodiment of the present invention.
Detailed Description
The present invention will be described in detail below with reference to the embodiments shown in the drawings, but it should be understood that the embodiments are not limited to the present invention, and functional, method, or structural equivalents and alternatives according to the embodiments are within the scope of protection of the present invention by those skilled in the art.
The following describes embodiments of the present invention.
Example 1
Referring to fig. 1, this embodiment discloses a specific implementation manner of a hash-based intelligent door lock user information storage method.
Referring to fig. 1, in this embodiment, the method for storing user information of a smart door lock based on hash includes the following steps:
Step S1: setting an ASE128 encryption key in the intelligent door lock; specifically, when the intelligent door locks leave the factory, AES128 encryption keys are distributed according to random numbers, namely each intelligent door lock is distributed with a unique encryption key, the encryption keys are stored in the intelligent door locks, and meanwhile, an ASE128 algorithm module and a hash algorithm module are arranged in a storage unit of the intelligent door locks.
Step S2: setting a first password by a user, wherein the first password is converted into a first ciphertext of 128 bytes through an ASE128 algorithm; specifically, the first password is an IC card, a character string, fingerprint data or face data, and the first password is converted into a 128-bit first ciphertext through an ASE128 algorithm.
Step S3: the first ciphertext generates a first key-value through a hash function; specifically, the 128-bit first ciphertext generates a first key-value through a hash function, wherein the key represents a hash code, the value represents a ciphertext character string, the hash code is used for indicating a storage position of the ciphertext character string, and since the hash function is an irreversible encryption algorithm, the data security of the privacy information of the user is ensured, so that the privacy information of the user is irreversible and also can not be deciphered, and even if the privacy information is monitored or physically damaged, the privacy information can not be obtained.
Step S4: and storing the first key-value in a storage unit of the intelligent door lock. Specifically, in view of the difference of storage space occupied by the IC card, the character string, the fingerprint data or the face data, in order to optimize and efficiently utilize the storage space, the storage unit is divided into a first storage area, a second storage area, a third storage area and a fourth storage area, so as to prevent different kinds of data storage positions of users from transmitting conflicts when multiple users use the intelligent door lock; the first key-value of the IC card is stored in a first storage area; the first key-value of the character string is stored in a second storage area; the first key-value of the fingerprint data is stored in a third storage area; the first key-value of the face data is stored in the fourth storage area, the fourth storage area space is larger than the third storage area space, the second storage area space is larger than the first storage area space, namely the first key-value of the face data is divided into the largest storage area, and the first key-value of the IC card is divided into the smallest storage area, so that the reasonable utilization of the storage unit by a user is facilitated.
Based on the random encryption key, the user password (IC card, character string, fingerprint data or human face data) is encrypted by AES128 and the hash function is encrypted successively, so that the user password is irreversible and can not be decrypted, and even if the user password is monitored or physically destroyed, the user privacy information can not be obtained.
Example two
Referring to fig. 2, this embodiment discloses a specific implementation of a hash-based intelligent door lock unlocking method.
Referring to fig. 2, in this embodiment, the method for unlocking the intelligent door lock based on hash includes the following steps:
The method for storing user information of a hash-based intelligent door lock according to the first embodiment stores a first key-value; specifically, the storage method of the first embodiment stores the privacy information of the user, such as an IC card, a character string, fingerprint data or face data, as a first key-value;
Step S5: the user inputs a second password, and the second password is converted into a 128-byte second ciphertext through an ASE128 algorithm; specifically, the second password is an IC card, a character string, fingerprint data or face data, and the second password is converted into a 128-bit second ciphertext through an ASE128 algorithm.
Step S6: generating a second key-value by the second ciphertext through a hash function; specifically, the 128-bit second ciphertext generates a second key-value through a hash function, wherein the key represents a hash code, the value represents a ciphertext character string, and the hash code is used for indicating a storage position of the ciphertext character string to be compared.
Judging whether the first key-value is consistent with the second key-value; specifically, whether the input ciphertext character string and the stored ciphertext character string match or not is compared.
Step S7: if the input password is consistent, unlocking is executed, and if the input password is consistent, the input password is correct;
if the input password is inconsistent, the input password is wrong, and illegal unlocking is reported or the input is reminded to be restarted.
In order to record the execution information of the door lock, unlocking information and illegal unlocking information are recorded in an event record table, and a communication module of the intelligent door lock sends event information data in the event record table to a user, so that the user can know the execution information of the door lock in real time.
Example III
Referring to fig. 3, this embodiment discloses a specific implementation manner of a hash-based intelligent door lock.
Referring to fig. 3, in this embodiment, a hash-based intelligent door lock includes a door lock executing mechanism, a storage unit, and a control unit; when the intelligent door locks leave the factory, AES128 encryption keys are distributed according to random numbers, namely each intelligent door lock is distributed with a unique encryption key; setting an AES128 algorithm module and a hash algorithm module in the storage unit, generating a 128-bit first ciphertext under the action of an encryption key and an AES128 encryption algorithm by a first password such as an IC card, a character string, fingerprint data or face data of a user, generating a first key-value by the 128-bit first ciphertext through a hash function, and storing the first key-value in the storage unit, wherein the key represents a hash code, the value represents a ciphertext character string, the hash code is used for indicating the storage position of the ciphertext character string, and the data security of privacy information of the user is ensured because the hash function is an irreversible encryption algorithm, so that the privacy information of the user is irreversible and also can not be decrypted, and even if the privacy information is monitored or physically destroyed, the privacy information can not be obtained.
In view of the different storage spaces occupied by the IC card, the character string, the fingerprint data or the face data, the storage unit is divided into a first storage area, a second storage area, a third storage area and a fourth storage area for optimizing and efficiently utilizing the storage space and preventing different kinds of data storage positions of users from transmitting conflict when multiple users use the intelligent door lock; the first key-value of the IC card is stored in a first storage area; the first key-value of the character string is stored in a second storage area; the first key-value of the fingerprint data is stored in a third storage area; the first key-value of the face data is stored in the fourth storage area, the fourth storage area space is larger than the third storage area space, the second storage area space is larger than the first storage area space, namely the first key-value of the face data is divided into the largest storage area, and the first key-value of the IC card is divided into the smallest storage area, so that the reasonable utilization of the storage unit by a user is facilitated.
The IC card, the character string, the fingerprint data or the face data of the intelligent door lock based on the hash according to the third embodiment adopts the method for storing the user information of the intelligent door lock based on the hash according to the first embodiment; the unlocking method of the intelligent door lock based on the hash in the third embodiment adopts the unlocking method of the intelligent door lock based on the hash in the second embodiment, and the parts of the third embodiment which are the same as those of the first embodiment or the second embodiment are referred to in the first embodiment or the second embodiment, and are not described again here.
The above list of detailed descriptions is only specific to practical embodiments of the present invention, and they are not intended to limit the scope of the present invention, and all equivalent embodiments or modifications that do not depart from the spirit of the present invention should be included in the scope of the present invention.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
Furthermore, it should be understood that although the present disclosure describes embodiments, not every embodiment is provided with a separate embodiment, and that this description is provided for clarity only, and that the disclosure is not limited to the embodiments described in detail below, and that the embodiments described in the examples may be combined as appropriate to form other embodiments that will be apparent to those skilled in the art.

Claims (4)

1. The intelligent door lock user information storage method based on the hash is characterized by comprising the following steps of:
Setting an AES128 encryption key on the intelligent door lock, distributing the AES128 encryption key according to a random number when the intelligent door lock leaves a factory, and storing the encryption key in the intelligent door lock;
setting a first password by a user, wherein the first password is converted into a 128-byte first ciphertext through an AES128 algorithm;
The first ciphertext generates a first key-value through a hash function;
storing the first key-value in a storage unit of the intelligent door lock;
the first password is an IC card, a character string, fingerprint data or face data;
the storage unit is divided into a first storage area, a second storage area, a third storage area and a fourth storage area;
The first key-value of the IC card is stored in a first storage area;
The first key-value of the character string is stored in a second storage area;
the first key-value of the fingerprint data is stored in a third storage area;
The first key-value of the face data is stored in a fourth storage area;
The fourth storage area space is larger than the third storage area space, the second storage area space is larger than the first storage area space;
the key represents a hash code, the value represents a ciphertext character string, and the hash code is used for indicating a storage position of the ciphertext character string.
2. The intelligent door lock unlocking method based on the hash is characterized by comprising the following steps of:
storing a first key-value by the hash-based intelligent door lock user information storage method of claim 1;
The user inputs a second password, and the second password is converted into a 128-byte second ciphertext through an AES128 algorithm;
Generating a second key-value by the second ciphertext through a hash function;
Judging whether the first key-value is consistent with the second key-value;
If the two parameters are consistent with each other, unlocking is performed;
if the unlocking states are inconsistent, illegal unlocking is reported.
3. The intelligent door lock unlocking method based on hash as claimed in claim 2, further comprising the steps of:
Executing unlocking information and illegal unlocking information to be recorded in an event record table;
and the communication module of the intelligent door lock sends event information data in the event record list to the user.
4. The intelligent door lock based on the hash is characterized by comprising a door lock executing mechanism, a storage unit and a control unit;
when the intelligent door lock leaves a factory, AES128 encryption keys are distributed according to random numbers, and the encryption keys are stored in the intelligent door lock;
Setting an AES128 algorithm module and a hash algorithm module in the storage unit; the IC card, the character string, the fingerprint data or the face data of the user sequentially pass through an AES128 algorithm module and a hash algorithm module to form a first key-value, and the first key-value is stored in the storage unit; the storage unit is divided into a first storage area, a second storage area, a third storage area and a fourth storage area;
The first key-value of the IC card is stored in a first storage area;
The first key-value of the character string is stored in a second storage area;
the first key-value of the fingerprint data is stored in a third storage area;
the first key-value of the face data is stored in a fourth storage area; the fourth storage area space is larger than the third storage area space, the second storage area space is larger than the first storage area space;
the key represents a hash code, the value represents a ciphertext character string, and the hash code is used for indicating a storage position of the ciphertext character string.
CN202410461862.8A 2024-04-17 2024-04-17 Hash-based intelligent door lock user information storage method, unlocking method and intelligent door lock Active CN118072426B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410461862.8A CN118072426B (en) 2024-04-17 2024-04-17 Hash-based intelligent door lock user information storage method, unlocking method and intelligent door lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410461862.8A CN118072426B (en) 2024-04-17 2024-04-17 Hash-based intelligent door lock user information storage method, unlocking method and intelligent door lock

Publications (2)

Publication Number Publication Date
CN118072426A CN118072426A (en) 2024-05-24
CN118072426B true CN118072426B (en) 2024-08-02

Family

ID=91100725

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410461862.8A Active CN118072426B (en) 2024-04-17 2024-04-17 Hash-based intelligent door lock user information storage method, unlocking method and intelligent door lock

Country Status (1)

Country Link
CN (1) CN118072426B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109450878A (en) * 2018-10-25 2019-03-08 华中科技大学鄂州工业技术研究院 Biological feather recognition method, device and system
CN112507313A (en) * 2021-01-05 2021-03-16 晶晨半导体(深圳)有限公司 Fingerprint verification method, chip and intelligent door lock
CN114374521A (en) * 2022-03-22 2022-04-19 广东电力交易中心有限责任公司 Private data protection method, electronic equipment and storage medium
CN116339621A (en) * 2023-02-20 2023-06-27 中移动信息技术有限公司 Data storage method, device, equipment and computer storage medium
CN117333973A (en) * 2023-11-02 2024-01-02 东莞市安邦德智能锁具科技有限公司 Intelligent lock remote control system based on Internet

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110197541A (en) * 2019-05-21 2019-09-03 北京首汽智行科技有限公司 A kind of shared automobile management method based on block chain
CN117093579A (en) * 2023-06-29 2023-11-21 蚂蚁区块链科技(上海)有限公司 Data query and data storage method, device, equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109450878A (en) * 2018-10-25 2019-03-08 华中科技大学鄂州工业技术研究院 Biological feather recognition method, device and system
CN112507313A (en) * 2021-01-05 2021-03-16 晶晨半导体(深圳)有限公司 Fingerprint verification method, chip and intelligent door lock
CN114374521A (en) * 2022-03-22 2022-04-19 广东电力交易中心有限责任公司 Private data protection method, electronic equipment and storage medium
CN116339621A (en) * 2023-02-20 2023-06-27 中移动信息技术有限公司 Data storage method, device, equipment and computer storage medium
CN117333973A (en) * 2023-11-02 2024-01-02 东莞市安邦德智能锁具科技有限公司 Intelligent lock remote control system based on Internet

Also Published As

Publication number Publication date
CN118072426A (en) 2024-05-24

Similar Documents

Publication Publication Date Title
Liang et al. A mutual security authentication method for RFID-PUF circuit based on deep learning
WO2018046008A1 (en) Storage design method of blockchain encrypted radio frequency chip
US9467293B1 (en) Generating authentication codes associated with devices
AU2013101034B4 (en) Registration and authentication of computing devices using a digital skeleton key
US7178025B2 (en) Access system utilizing multiple factor identification and authentication
US6959394B1 (en) Splitting knowledge of a password
CN101309278B (en) Method and system for storing encrypt data on customer
JP2008541591A (en) Implementing integrity-protected secure storage
WO1999024895A1 (en) Tamper resistant method and apparatus
EP2339777A2 (en) Method of authenticating a user to use a system
CN102138300A (en) Message authentication code pre-computation with applications to secure memory
CN103095452A (en) Random encryption method needing to adopt exhaustion method for deciphering
CN107070660A (en) A kind of design Storage method of block chain encrypted radio-frequency chip
US9246684B2 (en) Data protection system and method
JP2024511236A (en) Computer file security encryption method, decryption method and readable storage medium
CN112653553A (en) Internet of things equipment identity management system
EP3214567B1 (en) Secure external update of memory content for a certain system on chip
CN116527258B (en) Unlocking method, device, equipment and storage medium of coded lock
US20150012755A1 (en) Cryptographic Passcode Reset
CN108574578A (en) A kind of black box data protection system and method
CN118072426B (en) Hash-based intelligent door lock user information storage method, unlocking method and intelligent door lock
Mursalat et al. Column-Level Database Encryption Using Rijndael Algorithm and Dynamic Key on Learning Management System
Hristea Reliable RFID Offline Privacy
Turakulovich et al. Comparative factors of key generation techniques
CN106789005A (en) Cryptosecurity storage system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant