TWI587680B - A connection verifying method for monitoring device - Google Patents

A connection verifying method for monitoring device Download PDF

Info

Publication number
TWI587680B
TWI587680B TW104137980A TW104137980A TWI587680B TW I587680 B TWI587680 B TW I587680B TW 104137980 A TW104137980 A TW 104137980A TW 104137980 A TW104137980 A TW 104137980A TW I587680 B TWI587680 B TW I587680B
Authority
TW
Taiwan
Prior art keywords
column
code
monitoring
encrypted
permutation
Prior art date
Application number
TW104137980A
Other languages
Chinese (zh)
Other versions
TW201720094A (en
Inventor
Cherng-Ming Cheng
Original Assignee
Zinwell Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zinwell Corp filed Critical Zinwell Corp
Priority to TW104137980A priority Critical patent/TWI587680B/en
Publication of TW201720094A publication Critical patent/TW201720094A/en
Application granted granted Critical
Publication of TWI587680B publication Critical patent/TWI587680B/en

Links

Description

Connection verification method for monitoring device

The present invention relates to a monitoring device, and more particularly to a method for verifying the connection of a monitoring device.

The popularity of surveillance devices has continued to rise in recent years. In addition to the rapid increase in demand for home care for the elderly and children, and indoor monitoring of enterprises, the convenience of viewing mobile images at any time and anywhere has become a popular reason. When everyone thinks that the goal of black hat hackers is still websites and personal computers, many attackers have quietly turned their targets to various devices on the network, such as NAS, Wireless AP, printers, etc., and have many users. The monitoring device is of course one of the goals.

The verification method used by the conventional monitoring device is to use the account password as the main method of connection verification. General monitoring device products usually have a preset account password, but it is very dangerous to directly transfer the account and password entity information on the network. Although various encryption measures can be used to increase security, the attacker only needs to know the encryption. The method of cracking the physical information of these accounts and passwords is very easy. Once the account password is cracked, the attacker can directly see the camera screen by connecting to the IP address, and even use the account password to engage in other system destruction activities. Therefore, the industry continues to demand more improved and more innovative monitoring device connection verification methods. Optimally, these wiring verification methods must be extremely safe and easy to implement.

Therefore, the main object of the present invention is to provide a connection verification method for a monitoring device, thereby solving the problem of connection security of the monitoring device.

The technical means adopted by the present invention to solve the problems of the prior art provides a method for verifying the connection of the monitoring device, which is used to perform verification during the connection establishment process of a monitoring device and a user device, and verify the monitoring device. And whether the permutation and shift matrix respectively configured in the user equipment is the same, wherein the permutation and shift matrix is a 16-row 16-column matrix, and each odd-numbered column of the permutation and shift matrix is used as a permutation a column, the permutation column is composed of 16 numbers R 0 to R 15 selected from 0 to 15 which are mutually non-repetitive, and each of the permutation columns of the permutation and shift matrix is used as a shift column, the shift The column is composed of 16 numbers S 0 to S 15 which are selected from 0 to 31 which do not overlap each other. The connection verification method sequentially comprises the following steps: (a) one eight character is used by the monitoring device. The formed initial string code (K1) is stored and the initial code (K1) of the string is encrypted by the permutation and shift matrix to obtain an encrypted initial code (K2), and the encrypted initial code is obtained ( K2) transmitted to the client device; (b) by the client device with the replacement and shift matrix The encrypted initial code (K2) is decrypted to obtain a decrypted initial code (K1'), and the decrypted initial code (K1') is decrypted in a predetermined standard encryption manner to obtain a a client verification code (K3), and transmitting the client verification code (K3) to the monitoring device; (c) the monitoring device transmits the string initial code (K1) stored in the monitoring device to the The predetermined standard encryption method is encrypted to obtain a monitoring terminal verification code (K4); (d) comparing the monitoring terminal verification code (K4) and the client authentication code (K3), and when the monitoring terminal verification code ( When K4) and the client verification code (K3) are the same, the string initial code (K1) is the same as the decryption initial code (K1'), that is, the verification is passed, and the monitoring device is permitted to The connection of the client device is established. In step (a), the monitoring device encrypts the string initial code (K1) with the replacement and shift matrix, and sequentially includes the following steps: (a1) the word The character of the string initial code (K1) is converted into an encrypted conversion code (K11) by the ASCII code representation of two hexadecimal bytes, and the addition is performed. Each hexadecimal digit T 0 to T 15 in the secret conversion code (K11) is added by a decimal and takes a remainder of 8 to obtain an encrypted index value (I); (a2) using the encrypted index value (I) And the permutation column of the (2I+1)th column of the permutation and shift matrix is indexed as an encrypted index permutation column, and the shifted column of the (2I+2)th column is indexed as an encrypted index shift a column, the hexadecimal number T X of the encrypted conversion code (K11) is replaced by the value of the (T X +1) decimal calculation line of the encrypted index replacement column, where X is 0 to 15, and After all the hexadecimal digits of the encryption conversion code (K11) are replaced, an encrypted replacement code (K12) including the decimal digits U 0 to U 15 is obtained; and (a3) the encryption replacement code (K12) is obtained. The number U Y is shifted into the (S Y +1)th row of an empty 32-row 1-column matrix according to the number S Y of the encrypted index shift column, where Y is 0 to 15, and then the value is 0 to 15 in a random manner. The lower 15th column of the 32 rows and 1 column matrix is filled with the first 15 vacancies remaining in the 32 rows and 1 column matrix, and then an adjustment bit is filled into the final remaining vacancy in the 32 row and 1 column matrix. And obtaining the encrypted initial code (K2), wherein the adjustment bit is obtained by adding the total value of 8 to each digit of 31 lines of the encrypted index value (I) and the encrypted initial code (K2) by a decimal value Obtaining a difference between the two; wherein in step (b), the user equipment sets the encryption initial code (K2) to be decrypted by the replacement and shift matrix, and the following steps are included: (b1) encrypting Each digit V 0 to V 31 in the initial code (K2) is summed by a decimal and takes a remainder of 8 to obtain a decryption index value (J); (b2) is indexed using the decryption index value (J) And replacing the permutation column of the (2J+1)th column of the permutation and shift matrix as a decryption index, and indexing the shifted column of the (2J+2)th column as a decryption index shift column, Deciphering the row number S Z of the index shift column, taking out the index value as a decryption shift value, and extracting the value of the (S Z +1) decimal calculation row in the encrypted initial code (K2), and according to the respective rows The number S Z is arranged at the position of the decrypted index shift column to form a decrypted shift code (K21) including the numbers G 0 to G 15 , where Z is 0 to 15; (b3 Each row of digits G M of the decrypted shift code (K21) is individually used as a decrypted permutation value search index value, and the decrypted index replacement index is searched for the decrypted permutation value search index value, which is individually in the decryption index permutation column. a position value, and the position value is arranged according to the position of the line of digits G M at the decryption shift code (K21) to form a decryption replacement code (K22) including the hexadecimal numbers H0 to H15. , wherein the position value is from 0 to 15 and M is 0 to 15, and then the decrypted replacement code (K22) is converted into eight octet ASCII codes in two byte units. The decryption initial code (K1') composed of characters.

In an embodiment of the present invention, a method for verifying connection of a monitoring device is provided, wherein when the encrypted index value (I) is less than the number of 31 digits in the encrypted initial code (K2), the digits are added in decimal increments. When the value of 8 is taken, the difference is added to 8 to obtain the adjustment bit.

In an embodiment of the present invention, a method for verifying connection of a monitoring device is provided, wherein the predetermined standard encryption method conforms to the Advanced Encryption Standard (AES), and uses a user identification and password information as Key.

In an embodiment of the invention, a method for verifying the connection of the monitoring device is provided, wherein the monitoring device and the user device store a user identification and password information.

In an embodiment of the present invention, a method for verifying connection of a monitoring device is provided, wherein the method of filling the remaining empty slots in the 32 rows and 1 column matrix in step (a3) is to replace the column with the encrypted index. The first 15 values R 0 to R 14 are sequentially filled in from low to high.

In an embodiment of the invention, a method for verifying the connection of a monitoring device is provided, wherein the monitoring device is a remote monitoring camera, and/or the user device is a mobile device.

In an embodiment of the present invention, a method for verifying a connection of a monitoring device is provided, wherein the connection established between the monitoring device and the user device is to permit the monitoring device to transmit a monitoring image data to the client. The device is displayed on the client device.

Through the technical means adopted by the present invention, a replacement and shift matrix is respectively set in the monitoring device and the user end device, and the encryption and decryption procedures of the replacement and shift matrix are combined to verify each of the monitoring device and the user terminal device. Whether the replacement and shifting matrix that are not built are the same, and determining whether the user equipment can be connected to display the monitoring image data transmitted by the monitoring device, since the present invention transmits only an encrypted string initial code on the network, Transfer the account number, password, or replacement and shift matrix itself, so even if intercepted by the attacker, the attacker can not use the string initial code to break into the system. In this way, the entity information of the account and the password can be directly transmitted on the network to improve the connection security of the monitoring device.

1‧‧‧Monitoring device

2‧‧‧Customer device

K2‧‧‧Encryption initial code

K3‧‧‧Client Verification Code

RS1, RS2‧‧‧ Replacement and Shift Matrix

FIG. 1 is a schematic diagram showing a connection verification method of a monitoring device according to an embodiment of the present invention.

FIG. 2 is a flow chart showing a method for verifying the connection of a monitoring device according to an embodiment of the present invention.

3 is a flow chart showing an encryption procedure of a connection verification method of a monitoring device according to an embodiment of the present invention.

4 is a flow chart showing a decryption procedure of a connection verification method of a monitoring device according to an embodiment of the present invention.

FIG. 5 is a diagram showing an example of a permutation and shifting matrix in a method for verifying a connection of a monitoring device according to an embodiment of the invention.

Embodiments of the present invention will be described below based on Figs. 1 to 5 . The description is not intended to limit the embodiments of the present invention, but is an embodiment of the present invention.

As shown in FIG. 1 and FIG. 2, the connection verification method of the monitoring device 1 of the present invention is used for performing verification during the connection establishment process of the monitoring device 1 and a user terminal device 2, and verifying the monitoring device 1 And whether the replacement and shifting matrix (RS1, RS2) respectively configured in the user equipment 2 are the same, the connection verification method sequentially includes the following steps: (a) the monitoring device 1 A string initial code (K1) composed of characters is stored and the initial code (K1) of the string is encrypted by the permutation and shift matrix RS1 to obtain an encrypted initial code (K2), and the The encrypted initial code (K2) is transmitted to the client device 2; (b) the client device 2 decrypts the encrypted initial code (K2) with the replacement and shift matrix RS2 to obtain a decrypted initial code (K1) '), and decrypting the decrypted initial code (K1') in a predetermined standard encryption manner to obtain a client authentication code (K3), and the client authentication code (K3) Transmitted to the monitoring device 1; (c) the monitoring device 1 uses the string initial code (K1) stored in the monitoring device 1 to The standard encryption method is encrypted to obtain a monitoring terminal verification code (K4); (d) comparing the monitoring terminal verification code (K4) and the client authentication code (K3), and when the monitoring terminal verification code ( When K4) and the client side verification code (K3) are the same, the string initial code (K1) is the same as the decryption initial code (K1'), that is, the verification is passed, and the monitoring device 1 is permitted to The connection of the client device 2 is established.

In detail, as shown in FIG. 1 , in the present embodiment, a replacement and shift matrix (RS1, RS2) is separately built in the monitoring device 1 and the client device 2, and FIG. 5 is An example of the permutation and shift matrix is that the permutation and shift matrix is a matrix of 16 rows and 16 columns, and each odd column of the permutation and shift matrix is a permutation column, and each permutation column is composed of 16 numbers ( R 0 to R 15 ), and the number in the permutation column is a number selected from 0 to 15 that does not overlap each other, so each number should appear once and only once, and the permutation and shift Each even column of the matrix is a shift column, each shift column is composed of 16 numbers (S 0 to S 15 ), and the numbers in the shift column are selected from 0 to 31 and are not overlapped with each other. digital.

As shown in FIG. 1 to FIG. 3, when the salt control device 1 receives the connection request from the client device 2, the monitoring device 1 generates a string consisting of eight characters. The initial code (K1) starts the step (a), and the step (a) is that the string initial code (K1) is encrypted by the monitoring device 1 with the replacement and shift matrix RS1, for example, the string initial code ( K1) is "ABCDWXYZ". Preferably, the initial code (K1) of the string may also include date and time information, and is a number that is not repeated, and the encryption program sequentially includes the following steps: (a1) The character of the string initial code (K1) is converted into an encrypted conversion code (K11) by the ASCII code representation of two bytes of hexadecimal. In this embodiment, the hexadecimal of the character "A" is converted. The ASCII code is "0041", and the two bytes are "41". Therefore, the encrypted conversion code (K11) is "414243445758595A", and then each hexadecimal in the encrypted conversion code (K11) The numbers (T 0 to T 15 ) are summed in decimal calculations, namely: 4+1+4+2+4+3+4+4+5+7+5+8+5+9+5+10 =80 Then divide "80" by "8" and the remainder is "0". "0" that is encrypted index value (I).

Next, step (a2) is performed. In this embodiment, the encrypted index value (I) is "0", and (2I+1)=(2*0+1)=1, so the encrypted index replacement column is replaced and shifted. The permutation column of the (1)th column of the bit matrix RS1, and (2I+2)=(2*0+2)=2, so the encrypted index shift column is the (2)th column of the permutation and shift matrix RS1. Shift column, for the sake of simplicity, take the replacement and shift matrix of Figure 5 as an example:

Next, the hexadecimal number T X of the encryption conversion code (K11) "414243445758595A" is replaced with the value of the (T X +1)th row of the (1) column encrypted index replacement column, for example, the first number T 0 to "4" is replaced by the first (1) column encryption index permutation of the column (4 + 1 = 5) of the value line, is also a "4", the second number T 1 is "1", is replaced The value of the (1+1=2)th row of the (1)th column of the encrypted index replacement column is "11", followed by one digit replacement until all the hexadecimal digits of the encryption conversion code (K11) are replaced. After that, an encrypted replacement code (K12) including the decimal digits U 0 to U 15 is obtained:

Step (a3) is to shift the number U Y of the encrypted replacement code (K12) according to the number S Y of the encrypted index shift column into the (S Y +1)th row of an empty 32-row 1-column matrix, for example, A number U 0 is "4" according to the number S 0 of the encrypted index shift column of the (2) column (ie, 30) is shifted into the empty 32-row 1 column matrix (S 0 +1=30+1= 31) The line, followed by a digital shift, until all the hexadecimal digit shifts of the encrypted replacement code (K12) are completed, becomes the following 32-row 1-column matrix:

Then, the first 15 vacancies in the 32-row and 1-column matrices are filled in the random order of the 32-row and 1-column matrices in a random manner by a value of 0 to 15, in this embodiment, for the sake of explanation. Simple, the first 15 vacancies that are empty are filled with "0", which becomes the following 32 rows and 1 column matrix:

Finally, an adjustment bit A is filled in the final remaining space in the 32 rows and 1 column matrix, and the adjustment bit A is represented by the encrypted index value (I) and the 32 rows and 1 column matrix. Each digit of the row is obtained by taking a difference between the decimal value and the total value of the remainder of 8, that is, first adding the digit of each of the 31 rows of the 32 rows and 1 column matrix by the decimal calculation method. In total, it is: 0+11+0+8+4+0+4+0+9+15+0+15+0+0+15+0+7+4+0+3+0+6+0 +0+5+4+0+0+0+4+15=129 Then the remainder after dividing "129" by "8" is "1", then the adjustment bit A is the encrypted index value (I) "0 The difference from the remainder "1" is (0-1=-1), and if the difference is negative, the negative number must be added to "8", so the adjustment bit A is (-1+8). =7), then fill it into the 32 rows and 1 column matrix to get an encrypted initial code (K2) as: Finally, the encrypted initial code (K2) is transmitted to the client device 2, and at this point, step (a) ends.

As shown in FIG. 1 , FIG. 2 and FIG. 4 , in step (b), the client device 2 decrypts the encrypted initial code (K2) by the replacement and shift matrix RS2 to obtain an initial decryption. Code (K1'), and decrypting the decrypted initial code (K1') in a predetermined standard encryption manner Encrypted to obtain a client authentication code (K3), and the client authentication code (K3) is transmitted to the monitoring device 1. In the embodiment, the predetermined standard encryption method conforms to the high-order encryption standard (Advanced) Encryption Standard (AES), using a user identification and password information as a key to encrypt and decrypt. Of course, the invention is not limited thereto. In other embodiments, the predetermined standard encryption and decryption method may be other methods, such as RSA encryption or ECC encryption.

In detail, as shown in FIGS. 1 and 4, in step (b), the client device 2 decrypts the encrypted initial code (K2) by the replacement and shift matrix RS2, and the decryption program is The sequence includes the following steps: (b1) adding a decimal digit to each digit V 0 to V 31 in the encrypted initial code (K2) and taking a remainder of 8 to obtain a decryption index value (J), in this implementation In the example, the total number of digits in the encryption initial code (K2) is: 0+11+0+8+4+0+4+0+9+15+0+15+0+0+15+0 +7+4+0+3+0+6+0+0+5+4+0+0+0+7+4+15=136 Then divide “136” by “8” and the remainder is “0” "," and "0" is the decryption index value (J).

Then proceed to step (b2). In this example, the decryption index value (J) is "0" and (2J+1) = (2*0+1) = 1, so the decryption index replacement column is replaced and shifted. The permutation column of the (1)th column of the matrix RS2, and (2J+2)=(2*0+2)=2, so the decryption index shift column is the shift of the (2)th column of the permutation and shift matrix RS2. For the sake of simplicity, the displacement and shift matrix of Figure 5 is taken as an example: The next section (2) decrypts the index column shift column (S Z +1) the value of the encrypted initial code line (K2) in each row of numbers S Z taken, e.g., the first digit S 0 is "30 "Numerical row of the (30 + 1 = 31) the encrypted initial code (K2) is taken in, that is," 4 ", the second number S 1 is at" 1 ", then remove the encrypted initial code (K2 The value of the (1+1=2)th row in the ) is "11", and then one digit is taken out until the decryption index shift column of the (2)th column all the sixteen digits correspond to the initial encryption. After the numbers of the code (K2) position are all taken out, a decryption shift code (K21) including the numbers G 0 to G 15 is obtained:

Next, in the step (b3), the row number G M of the decrypted shift code (K21) is replaced with the digit R M of the decryption index permutation column of the (1)th column, and a position value identical to the number G M is searched for. P, but it must be noted that this position value P starts from "0" instead of "1": For example, if the first digit G 0 of the decryption shift code (K21) is "4", then the search for the (1) column decryption index replacement column finds "4" is a line where the position value P is also "4", and then When "4" is converted to the hexadecimal number H 0 , then H 0 is also "4". If the second digit G 1 of the decrypted shift code (K21) is "11", the search for the (1) column decryption index replacement column is searched. Find "11" is the line where the position value P is also "1", then convert "1" to the hexadecimal number H 1 , then H 1 is also "1", and then one by one digital search until the decryption shift After all the sixteen digits of the bit code (K21) have been searched, a decryption permutation code (K22) including the hexadecimal digits H 0 to H 15 is obtained: Finally, the decryption replacement code (K22) is decrypted as a hexadecimal ASCII code and converted into two characters in a unit of two bytes to be converted into a decryption initial code (K1'), that is, the decryption replacement code (K22) H 0 and H 1 are "41", then the first character should be "A", and then two two digits are converted. The decryption initial code (K1') is "ABCDWXYZ", and the decryption program ends. .

As shown in FIG. 2, step (c) is performed by the monitoring device 1 to encrypt the string initial code (K1) stored in the monitoring device 1 in a high-order encryption standard encryption manner to obtain a monitoring terminal verification code. (K4). And step (d) compares the monitoring terminal verification code (K4) and the client verification code (K3), and when the monitoring terminal verification code (K4) and the client verification code (K3) are the same When the string initial code (K1) is the same as the decryption initial code (K1'), that is, the verification is passed, and the connection between the monitoring device 1 and the client device 2 is permitted.

In this embodiment, the user identification and password information is stored in the monitoring device 1 and the client device 2 for use as a key for the high-order encryption standard. Of course, the present invention is not limited thereto. In other embodiments, other information may also be used as the key of the high-order encryption standard, for example, the product information of the monitoring device 1, the QR Code, and the product serial number.

In this embodiment, the remaining vacant bits in the 32 rows and 1 column matrix in step (a3) are in a random manner from the low to the high of the 32 rows and 1 column matrix in a random manner with a value of 0 to 15. The first 15 vacancies in the 32-row and 1-column matrices are filled in, and the present embodiment is filled with "0". Of course, the present invention is not limited thereto. In other embodiments, other methods may be used, for example, the first 15 values R 0 to R 14 of the column using the encrypted index are sequentially filled in from low to high.

In this embodiment, the monitoring device 1 is a remote monitoring camera, and/or the client device 2 is a mobile device. Preferably, the mobile device is a smart phone or a tablet.

In this embodiment, the connection established between the monitoring device 1 and the client device 2 is to permit the monitoring device 1 to transmit a monitoring image data to the client device 2 for display on the client device 2. .

The above description and description are only illustrative of the preferred embodiments of the present invention, and those of ordinary skill in the art can make other modifications in accordance with the scope of the invention as defined below and the description above, but such modifications should still be It is within the scope of the invention to the invention of the invention.

<TABLE border="1" borderColor="#000000" width="_0042"><TBODY><tr><td> 1 </td><td> Monitoring device</td></tr><tr>< Td> 2 </td><td> client device</td></tr><tr><td> K2 </td><td> encryption initial code</td></tr><tr>< Td> K3 </td><td> Client Authentication Code</td></tr><tr><td> RS1, RS2 </td><td> Replacement and Shift Matrix</td></tr ></TBODY></TABLE>

Claims (7)

  1. A method for verifying connection of a monitoring device is used for performing verification during connection establishment between a monitoring device and a user device, and verifying a replacement and migration of the monitoring device and the user device Whether the bit matrix is the same, wherein the permutation and shift matrix is a 16-row 16-column matrix, and each odd-numbered column of the permutation and shift matrix is used as a permutation column, and the permutation column is not equal to each other selected from 0 to 15. The 16 numbers R 0 to R 15 are covered, and each even column of the permutation and shift matrix is used as a shift column, and the shift column is composed of 16 non-repeated from 0 to 31. The numbers S 0 to S 15 are configured. The connection verification method sequentially includes the following steps: (a) storing, by the monitoring device, a string initial code consisting of eight characters and initializing the string The code is encrypted by the permutation and shift matrix to obtain an encrypted initial code (K2), and the encrypted initial code (K2) is transmitted to the user equipment; (b) the user equipment is replaced by the replacement device The bit matrix decrypts the encrypted initial code (K2) to obtain a decrypted initial code, and the solution is solved. The secret decryption initial code is encrypted in a predetermined standard encryption manner to obtain a client authentication code (K3), and the client authentication code (K3) is transmitted to the monitoring device; (c) The monitoring device encrypts the initial code of the string stored in the monitoring device in the predetermined standard encryption manner to obtain a monitoring terminal verification code; (d) comparing the monitoring terminal verification code with the user terminal verification code (K3), and when the monitoring terminal verification code and the client verification code (K3) are the same, the string initial code is the same as the decryption initial code, that is, the verification is passed, and the monitoring is permitted. Establishing a connection between the device and the client device, wherein in step (a), the monitoring device encrypts the string initial code by the replacement and shift matrix, and the following steps are included: (a1) the word The character of the string initial code is converted into an encrypted conversion code by the ASCII code representation of two hexadecimal bytes, and the hexadecimal digits T 0 to T 15 in the encrypted conversion code are decimally digitized. Add up and take the remainder of 8 to get an encrypted index value I; (a2) The encrypted index value I indexes the permutation column of the 2I+1 column of the permutation and shift matrix as an encrypted index permutation column, and indexes the shifted column of the 2I+2 column as an encrypted index shift Column, replacing the hexadecimal number T X of the encrypted conversion code with the value of the decimal calculation row of the T X +1 of the encrypted index permutation column, where X is 0 to 15, and all of the encryption conversion code After the hexadecimal digital replacement is completed, an encrypted permutation code including the decimal digits U 0 to U 15 is obtained; and (a3) the digital U Y of the encrypted permutation code is shifted by the number S Y of the column according to the encryption index. Shifting into the S Y +1 row of an empty 32-row 1-column matrix, where Y is 0 to 15, and then filling the 32 from the low-to-high order of the 32-row 1-column matrix in a random manner with values from 0 to 15. The first 15 vacancies in the row 1 column matrix are left empty, and then an adjustment bit is filled into the final remaining vacancy in the 32 rows and 1 column matrix to obtain the encrypted initial code (K2), wherein the adjustment bit system is From the encrypted index value I and each digit of the 31 lines in the encrypted initial code (K2), the decimal value is added by a total of 8 Obtaining a difference between the two; wherein in step (b), the user equipment sets the encryption initial code (K2) to be decrypted by the replacement and shift matrix, and the following steps are included: (b1) encrypting Each digit V 0 to V 31 in the initial code (K2) is added by a decimal and takes a remainder of 8 to obtain a decryption index value J; (b2) indexing the replacement and shift using the decryption index value J The permutation column of the 2J+1th column of the bit matrix is used as a decryption index permutation column, and the shifted column of the 2nd J+2 column is indexed as a decryption index shift column, and the decryption index is shifted by the row number of the column. S Z extracts the value of the decimal calculation row of the S Z +1 in the encrypted initial code K2 as a decryption shift value extraction index value, and shifts the column according to the row number S Z in the decryption index The positions are arranged to form a decrypted shift code including numbers G 0 to G 15 , where Z is 0 to 15; (b3) each row of numbers G M of the decrypted shift code is individually used as a decrypted permutation value search index Value from the decryption index permutation column to search for the decryption permutation value search index value individually The decrypted index replacing a position value in the column, and in that the position value by the respective line numbers G M to be arranged at the location of the decrypted shift code of the composition a comprising sixteen digits a decryption H0 to H15 permutation code , wherein the position value is from 0 to 15 and M is 0 to 15, and then the decrypted permutation code is converted into eight characters in units of two bytes as a hexadecimal ASCII code. The decrypted initial code composed.
  2. The method for verifying the connection of the monitoring device of claim 1, wherein the encrypted index value (I) is less than the number of each of the 31 lines in the encrypted initial code (K2), and the total number is 8 For the remainder value, the difference is added to 8 to obtain the adjustment bit.
  3. For example, the method for verifying the connection of the monitoring device of claim 1 is that the predetermined standard encryption method conforms to the Advanced Encryption Standard (AES) and uses a user identification and password information as a key.
  4. For example, the method for verifying the connection of the monitoring device of claim 3, wherein the monitoring device and the client device store user identification and password information.
  5. For example, in the method for verifying the connection of the monitoring device of claim 1, the method of filling in the remaining empty spaces in the 32 rows and 1 column matrix in step (a3) is to replace the first 15 columns of the column by using the encrypted index. The values R 0 to R 14 are sequentially filled in from the low to the high.
  6. The method for verifying the connection of the monitoring device of claim 1, wherein the monitoring device is a remote monitoring camera, and/or the user device is a mobile device.
  7. The method for verifying the connection of the monitoring device of claim 1, wherein the connection between the monitoring device and the user device is established to permit the monitoring device to transmit a monitoring image data to the user device for display. On the client device.
TW104137980A 2015-11-18 2015-11-18 A connection verifying method for monitoring device TWI587680B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW104137980A TWI587680B (en) 2015-11-18 2015-11-18 A connection verifying method for monitoring device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW104137980A TWI587680B (en) 2015-11-18 2015-11-18 A connection verifying method for monitoring device

Publications (2)

Publication Number Publication Date
TW201720094A TW201720094A (en) 2017-06-01
TWI587680B true TWI587680B (en) 2017-06-11

Family

ID=59687336

Family Applications (1)

Application Number Title Priority Date Filing Date
TW104137980A TWI587680B (en) 2015-11-18 2015-11-18 A connection verifying method for monitoring device

Country Status (1)

Country Link
TW (1) TWI587680B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200740165A (en) * 2006-04-10 2007-10-16 Mitac Int Corp Fingerprint authentication method for accessing wireless network systems
CN101897165A (en) * 2007-10-30 2010-11-24 意大利电信股份公司 Method of authentication of users in data processing systems
TW201337632A (en) * 2011-12-22 2013-09-16 Intel Corp Instructions processors, methods, and systems to process BLAKE secure hashing algorithm
TW201421390A (en) * 2012-10-19 2014-06-01 Mpayme Ltd Method and system for secure mobile payment
US8752147B2 (en) * 2010-10-05 2014-06-10 Cse Co., Ltd System and method for two-factor user authentication

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200740165A (en) * 2006-04-10 2007-10-16 Mitac Int Corp Fingerprint authentication method for accessing wireless network systems
CN101897165A (en) * 2007-10-30 2010-11-24 意大利电信股份公司 Method of authentication of users in data processing systems
US8752147B2 (en) * 2010-10-05 2014-06-10 Cse Co., Ltd System and method for two-factor user authentication
TW201337632A (en) * 2011-12-22 2013-09-16 Intel Corp Instructions processors, methods, and systems to process BLAKE secure hashing algorithm
TW201421390A (en) * 2012-10-19 2014-06-01 Mpayme Ltd Method and system for secure mobile payment

Also Published As

Publication number Publication date
TW201720094A (en) 2017-06-01

Similar Documents

Publication Publication Date Title
Hamza et al. Hash based encryption for keyframes of diagnostic hysteroscopy
CN105812126B (en) Lightweight backup and the efficient restoration methods of healthy block chain data encryption key
Zhang et al. Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation
US9842217B2 (en) Method and system for securing data
US10419416B2 (en) Encryption and decryption techniques using shuffle function
US10437469B2 (en) Secure interactions involving superimposing image of a virtual keypad over image of a touchscreen keypad
Pachghare Cryptography and information security
AU2003203712B2 (en) Methods for remotely changing a communications password
US8949616B2 (en) Methods, apparatus and systems for securing user-associated passwords used for identity authentication
CN102882847B (en) Secure digital (SD)-password-card-based secure communication method of Internet of things healthcare service system
US9819657B2 (en) Protection of memory interface
US20170142082A1 (en) System and method for secure deposit and recovery of secret data
WO2016065321A1 (en) Secure communication channel with token renewal mechanism
CN102223364B (en) Method and system for accessing e-book data
EP2329622B1 (en) Message authentication code pre-computation with applications to secure memory
US7860254B2 (en) Computer system security via dynamic encryption
CN105553951B (en) Data transmission method and device
CN101485137B (en) Method and apparatus for encrypting/decrypting data
Dhall et al. Cryptanalysis of image encryption scheme based on a new 1D chaotic system
US7757085B2 (en) Method and apparatus for encrypting data transmitted over a serial link
CN104579694A (en) Identity authentication method and system
Zhang et al. Cryptanalysis of S-box-only chaotic image ciphers against chosen plaintext attack
CN104363091B (en) A kind of encipher-decipher method of automatically retrieval key and selection algorithm
Moen et al. Weaknesses in the temporal key hash of WPA
CN103246842B (en) For verifying the method and apparatus with data encryption