TWI587680B  A connection verifying method for monitoring device  Google Patents
A connection verifying method for monitoring device Download PDFInfo
 Publication number
 TWI587680B TWI587680B TW104137980A TW104137980A TWI587680B TW I587680 B TWI587680 B TW I587680B TW 104137980 A TW104137980 A TW 104137980A TW 104137980 A TW104137980 A TW 104137980A TW I587680 B TWI587680 B TW I587680B
 Authority
 TW
 Taiwan
 Prior art keywords
 column
 code
 monitoring
 encrypted
 permutation
 Prior art date
Links
 239000011159 matrix materials Substances 0.000 claims description 67
 238000006243 chemical reactions Methods 0.000 claims description 13
 238000004364 calculation methods Methods 0.000 claims description 5
 238000000605 extraction Methods 0.000 claims 1
 239000000284 extracts Substances 0.000 claims 1
 230000005012 migration Effects 0.000 claims 1
 239000000203 mixtures Substances 0.000 claims 1
 238000000034 methods Methods 0.000 description 4
 238000010586 diagrams Methods 0.000 description 2
 230000004048 modification Effects 0.000 description 2
 238000006011 modification reactions Methods 0.000 description 2
 241000204060 Streptomycetaceae Species 0.000 description 1
 238000005336 cracking Methods 0.000 description 1
 238000006073 displacement reactions Methods 0.000 description 1
 230000000694 effects Effects 0.000 description 1
 239000009033 nas Substances 0.000 description 1
 230000003252 repetitive Effects 0.000 description 1
 150000003839 salts Chemical class 0.000 description 1
 239000011780 sodium chloride Substances 0.000 description 1
Description
The present invention relates to a monitoring device, and more particularly to a method for verifying the connection of a monitoring device.
The popularity of surveillance devices has continued to rise in recent years. In addition to the rapid increase in demand for home care for the elderly and children, and indoor monitoring of enterprises, the convenience of viewing mobile images at any time and anywhere has become a popular reason. When everyone thinks that the goal of black hat hackers is still websites and personal computers, many attackers have quietly turned their targets to various devices on the network, such as NAS, Wireless AP, printers, etc., and have many users. The monitoring device is of course one of the goals.
The verification method used by the conventional monitoring device is to use the account password as the main method of connection verification. General monitoring device products usually have a preset account password, but it is very dangerous to directly transfer the account and password entity information on the network. Although various encryption measures can be used to increase security, the attacker only needs to know the encryption. The method of cracking the physical information of these accounts and passwords is very easy. Once the account password is cracked, the attacker can directly see the camera screen by connecting to the IP address, and even use the account password to engage in other system destruction activities. Therefore, the industry continues to demand more improved and more innovative monitoring device connection verification methods. Optimally, these wiring verification methods must be extremely safe and easy to implement.
Therefore, the main object of the present invention is to provide a connection verification method for a monitoring device, thereby solving the problem of connection security of the monitoring device.
The technical means adopted by the present invention to solve the problems of the prior art provides a method for verifying the connection of the monitoring device, which is used to perform verification during the connection establishment process of a monitoring device and a user device, and verify the monitoring device. And whether the permutation and shift matrix respectively configured in the user equipment is the same, wherein the permutation and shift matrix is a 16row 16column matrix, and each oddnumbered column of the permutation and shift matrix is used as a permutation a column, the permutation column is composed of 16 numbers R _{0} to R _{15} selected from 0 to 15 which are mutually nonrepetitive, and each of the permutation columns of the permutation and shift matrix is used as a shift column, the shift The column is composed of 16 numbers S _{0} to S _{15} which are selected from 0 to 31 which do not overlap each other. The connection verification method sequentially comprises the following steps: (a) one eight character is used by the monitoring device. The formed initial string code (K1) is stored and the initial code (K1) of the string is encrypted by the permutation and shift matrix to obtain an encrypted initial code (K2), and the encrypted initial code is obtained ( K2) transmitted to the client device; (b) by the client device with the replacement and shift matrix The encrypted initial code (K2) is decrypted to obtain a decrypted initial code (K1'), and the decrypted initial code (K1') is decrypted in a predetermined standard encryption manner to obtain a a client verification code (K3), and transmitting the client verification code (K3) to the monitoring device; (c) the monitoring device transmits the string initial code (K1) stored in the monitoring device to the The predetermined standard encryption method is encrypted to obtain a monitoring terminal verification code (K4); (d) comparing the monitoring terminal verification code (K4) and the client authentication code (K3), and when the monitoring terminal verification code ( When K4) and the client verification code (K3) are the same, the string initial code (K1) is the same as the decryption initial code (K1'), that is, the verification is passed, and the monitoring device is permitted to The connection of the client device is established. In step (a), the monitoring device encrypts the string initial code (K1) with the replacement and shift matrix, and sequentially includes the following steps: (a1) the word The character of the string initial code (K1) is converted into an encrypted conversion code (K11) by the ASCII code representation of two hexadecimal bytes, and the addition is performed. Each hexadecimal digit T _{0} to T _{15} in the secret conversion code (K11) is added by a decimal and takes a remainder of 8 to obtain an encrypted index value (I); (a2) using the encrypted index value (I) And the permutation column of the (2I+1)th column of the permutation and shift matrix is indexed as an encrypted index permutation column, and the shifted column of the (2I+2)th column is indexed as an encrypted index shift a column, the hexadecimal number T _{X of} the encrypted conversion code (K11) is replaced by the value of the (T _{X} +1) decimal calculation line of the encrypted index replacement column, where X is 0 to 15, and After all the hexadecimal digits of the encryption conversion code (K11) are replaced, an encrypted replacement code (K12) including the decimal digits U _{0} to U _{15} is obtained; and (a3) the encryption replacement code (K12) is obtained. The number U _{Y is} shifted into the (S _{Y} +1)th row of an empty 32row 1column matrix according to the number S _{Y of} the encrypted index shift column, where Y is 0 to 15, and then the value is 0 to 15 in a random manner. The lower 15th column of the 32 rows and 1 column matrix is filled with the first 15 vacancies remaining in the 32 rows and 1 column matrix, and then an adjustment bit is filled into the final remaining vacancy in the 32 row and 1 column matrix. And obtaining the encrypted initial code (K2), wherein the adjustment bit is obtained by adding the total value of 8 to each digit of 31 lines of the encrypted index value (I) and the encrypted initial code (K2) by a decimal value Obtaining a difference between the two; wherein in step (b), the user equipment sets the encryption initial code (K2) to be decrypted by the replacement and shift matrix, and the following steps are included: (b1) encrypting Each digit V _{0} to V _{31} in the initial code (K2) is summed by a decimal and takes a remainder of 8 to obtain a decryption index value (J); (b2) is indexed using the decryption index value (J) And replacing the permutation column of the (2J+1)th column of the permutation and shift matrix as a decryption index, and indexing the shifted column of the (2J+2)th column as a decryption index shift column, Deciphering the row number S _{Z of the} index shift column, taking out the index value as a decryption shift value, and extracting the value of the (S _{Z} +1) decimal calculation row in the encrypted initial code (K2), and according to the respective rows The number S _{Z} is arranged at the position of the decrypted index shift column to form a decrypted shift code (K21) including the numbers G _{0} to G _{15} , where Z is 0 to 15; (b3 Each row of digits G _{M of} the decrypted shift code (K21) is individually used as a decrypted permutation value search index value, and the decrypted index replacement index is searched for the decrypted permutation value search index value, which is individually in the decryption index permutation column. a position value, and the position value is arranged according to the position of the line of digits G _{M} at the decryption shift code (K21) to form a decryption replacement code (K22) including the hexadecimal numbers H0 to H15. , wherein the position value is from 0 to 15 and M is 0 to 15, and then the decrypted replacement code (K22) is converted into eight octet ASCII codes in two byte units. The decryption initial code (K1') composed of characters.
In an embodiment of the present invention, a method for verifying connection of a monitoring device is provided, wherein when the encrypted index value (I) is less than the number of 31 digits in the encrypted initial code (K2), the digits are added in decimal increments. When the value of 8 is taken, the difference is added to 8 to obtain the adjustment bit.
In an embodiment of the present invention, a method for verifying connection of a monitoring device is provided, wherein the predetermined standard encryption method conforms to the Advanced Encryption Standard (AES), and uses a user identification and password information as Key.
In an embodiment of the invention, a method for verifying the connection of the monitoring device is provided, wherein the monitoring device and the user device store a user identification and password information.
In an embodiment of the present invention, a method for verifying connection of a monitoring device is provided, wherein the method of filling the remaining empty slots in the 32 rows and 1 column matrix in step (a3) is to replace the column with the encrypted index. The first 15 values R _{0} to R _{14 are} sequentially filled in from low to high.
In an embodiment of the invention, a method for verifying the connection of a monitoring device is provided, wherein the monitoring device is a remote monitoring camera, and/or the user device is a mobile device.
In an embodiment of the present invention, a method for verifying a connection of a monitoring device is provided, wherein the connection established between the monitoring device and the user device is to permit the monitoring device to transmit a monitoring image data to the client. The device is displayed on the client device.
Through the technical means adopted by the present invention, a replacement and shift matrix is respectively set in the monitoring device and the user end device, and the encryption and decryption procedures of the replacement and shift matrix are combined to verify each of the monitoring device and the user terminal device. Whether the replacement and shifting matrix that are not built are the same, and determining whether the user equipment can be connected to display the monitoring image data transmitted by the monitoring device, since the present invention transmits only an encrypted string initial code on the network, Transfer the account number, password, or replacement and shift matrix itself, so even if intercepted by the attacker, the attacker can not use the string initial code to break into the system. In this way, the entity information of the account and the password can be directly transmitted on the network to improve the connection security of the monitoring device.
1‧‧‧Monitoring device
2‧‧‧Customer device
K2‧‧‧Encryption initial code
K3‧‧‧Client Verification Code
RS1, RS2‧‧‧ Replacement and Shift Matrix
FIG. 1 is a schematic diagram showing a connection verification method of a monitoring device according to an embodiment of the present invention.
FIG. 2 is a flow chart showing a method for verifying the connection of a monitoring device according to an embodiment of the present invention.
3 is a flow chart showing an encryption procedure of a connection verification method of a monitoring device according to an embodiment of the present invention.
4 is a flow chart showing a decryption procedure of a connection verification method of a monitoring device according to an embodiment of the present invention.
FIG. 5 is a diagram showing an example of a permutation and shifting matrix in a method for verifying a connection of a monitoring device according to an embodiment of the invention.
Embodiments of the present invention will be described below based on Figs. 1 to 5 . The description is not intended to limit the embodiments of the present invention, but is an embodiment of the present invention.
As shown in FIG. 1 and FIG. 2, the connection verification method of the monitoring device 1 of the present invention is used for performing verification during the connection establishment process of the monitoring device 1 and a user terminal device 2, and verifying the monitoring device 1 And whether the replacement and shifting matrix (RS1, RS2) respectively configured in the user equipment 2 are the same, the connection verification method sequentially includes the following steps: (a) the monitoring device 1 A string initial code (K1) composed of characters is stored and the initial code (K1) of the string is encrypted by the permutation and shift matrix RS1 to obtain an encrypted initial code (K2), and the The encrypted initial code (K2) is transmitted to the client device 2; (b) the client device 2 decrypts the encrypted initial code (K2) with the replacement and shift matrix RS2 to obtain a decrypted initial code (K1) '), and decrypting the decrypted initial code (K1') in a predetermined standard encryption manner to obtain a client authentication code (K3), and the client authentication code (K3) Transmitted to the monitoring device 1; (c) the monitoring device 1 uses the string initial code (K1) stored in the monitoring device 1 to The standard encryption method is encrypted to obtain a monitoring terminal verification code (K4); (d) comparing the monitoring terminal verification code (K4) and the client authentication code (K3), and when the monitoring terminal verification code ( When K4) and the client side verification code (K3) are the same, the string initial code (K1) is the same as the decryption initial code (K1'), that is, the verification is passed, and the monitoring device 1 is permitted to The connection of the client device 2 is established.
In detail, as shown in FIG. 1 , in the present embodiment, a replacement and shift matrix (RS1, RS2) is separately built in the monitoring device 1 and the client device 2, and FIG. 5 is An example of the permutation and shift matrix is that the permutation and shift matrix is a matrix of 16 rows and 16 columns, and each odd column of the permutation and shift matrix is a permutation column, and each permutation column is composed of 16 numbers ( R _{0} to R _{15} ), and the number in the permutation column is a number selected from 0 to 15 that does not overlap each other, so each number should appear once and only once, and the permutation and shift Each even column of the matrix is a shift column, each shift column is composed of 16 numbers (S _{0} to S _{15} ), and the numbers in the shift column are selected from 0 to 31 and are not overlapped with each other. digital.
As shown in FIG. 1 to FIG. 3, when the salt control device 1 receives the connection request from the client device 2, the monitoring device 1 generates a string consisting of eight characters. The initial code (K1) starts the step (a), and the step (a) is that the string initial code (K1) is encrypted by the monitoring device 1 with the replacement and shift matrix RS1, for example, the string initial code ( K1) is "ABCDWXYZ". Preferably, the initial code (K1) of the string may also include date and time information, and is a number that is not repeated, and the encryption program sequentially includes the following steps: (a1) The character of the string initial code (K1) is converted into an encrypted conversion code (K11) by the ASCII code representation of two bytes of hexadecimal. In this embodiment, the hexadecimal of the character "A" is converted. The ASCII code is "0041", and the two bytes are "41". Therefore, the encrypted conversion code (K11) is "414243445758595A", and then each hexadecimal in the encrypted conversion code (K11) The numbers (T _{0} to T _{15} ) are summed in decimal calculations, namely: 4+1+4+2+4+3+4+4+5+7+5+8+5+9+5+10 =80 Then divide "80" by "8" and the remainder is "0". "0" that is encrypted index value (I).
Next, step (a2) is performed. In this embodiment, the encrypted index value (I) is "0", and (2I+1)=(2*0+1)=1, so the encrypted index replacement column is replaced and shifted. The permutation column of the (1)th column of the bit matrix RS1, and (2I+2)=(2*0+2)=2, so the encrypted index shift column is the (2)th column of the permutation and shift matrix RS1. Shift column, for the sake of simplicity, take the replacement and shift matrix of Figure 5 as an example:
Next, the hexadecimal number T _{X of the} encryption conversion code (K11) "414243445758595A" is replaced with the value of the (T _{X} +1)th row of the (1) column encrypted index replacement column, for example, the first number T _{0} to "4" is replaced by the first (1) column encryption index permutation of the column (4 + 1 = 5) of the value line, is also a "4", the second number T _{1} is "1", is replaced The value of the (1+1=2)th row of the (1)th column of the encrypted index replacement column is "11", followed by one digit replacement until all the hexadecimal digits of the encryption conversion code (K11) are replaced. After that, an encrypted replacement code (K12) including the decimal digits U _{0} to U _{15} is obtained:
Step (a3) is to shift the number U _{Y of} the encrypted replacement code (K12) according to the number S _{Y of} the encrypted index shift column into the (S _{Y} +1)th row of an empty 32row 1column matrix, for example, A number U _{0} is "4" according to the number S _{0} of the encrypted index shift column of the (2) column (ie, 30) is shifted into the empty 32row 1 column matrix (S _{0} +1=30+1= 31) The line, followed by a digital shift, until all the hexadecimal digit shifts of the encrypted replacement code (K12) are completed, becomes the following 32row 1column matrix:
Then, the first 15 vacancies in the 32row and 1column matrices are filled in the random order of the 32row and 1column matrices in a random manner by a value of 0 to 15, in this embodiment, for the sake of explanation. Simple, the first 15 vacancies that are empty are filled with "0", which becomes the following 32 rows and 1 column matrix:
Finally, an adjustment bit A is filled in the final remaining space in the 32 rows and 1 column matrix, and the adjustment bit A is represented by the encrypted index value (I) and the 32 rows and 1 column matrix. Each digit of the row is obtained by taking a difference between the decimal value and the total value of the remainder of 8, that is, first adding the digit of each of the 31 rows of the 32 rows and 1 column matrix by the decimal calculation method. In total, it is: 0+11+0+8+4+0+4+0+9+15+0+15+0+0+15+0+7+4+0+3+0+6+0 +0+5+4+0+0+0+4+15=129 Then the remainder after dividing "129" by "8" is "1", then the adjustment bit A is the encrypted index value (I) "0 The difference from the remainder "1" is (01=1), and if the difference is negative, the negative number must be added to "8", so the adjustment bit A is (1+8). =7), then fill it into the 32 rows and 1 column matrix to get an encrypted initial code (K2) as:
As shown in FIG. 1 , FIG. 2 and FIG. 4 , in step (b), the client device 2 decrypts the encrypted initial code (K2) by the replacement and shift matrix RS2 to obtain an initial decryption. Code (K1'), and decrypting the decrypted initial code (K1') in a predetermined standard encryption manner Encrypted to obtain a client authentication code (K3), and the client authentication code (K3) is transmitted to the monitoring device 1. In the embodiment, the predetermined standard encryption method conforms to the highorder encryption standard (Advanced) Encryption Standard (AES), using a user identification and password information as a key to encrypt and decrypt. Of course, the invention is not limited thereto. In other embodiments, the predetermined standard encryption and decryption method may be other methods, such as RSA encryption or ECC encryption.
In detail, as shown in FIGS. 1 and 4, in step (b), the client device 2 decrypts the encrypted initial code (K2) by the replacement and shift matrix RS2, and the decryption program is The sequence includes the following steps: (b1) adding a decimal digit to each digit V _{0} to V _{31 in} the encrypted initial code (K2) and taking a remainder of 8 to obtain a decryption index value (J), in this implementation In the example, the total number of digits in the encryption initial code (K2) is: 0+11+0+8+4+0+4+0+9+15+0+15+0+0+15+0 +7+4+0+3+0+6+0+0+5+4+0+0+0+7+4+15=136 Then divide “136” by “8” and the remainder is “0” "," and "0" is the decryption index value (J).
Then proceed to step (b2). In this example, the decryption index value (J) is "0" and (2J+1) = (2*0+1) = 1, so the decryption index replacement column is replaced and shifted. The permutation column of the (1)th column of the matrix RS2, and (2J+2)=(2*0+2)=2, so the decryption index shift column is the shift of the (2)th column of the permutation and shift matrix RS2. For the sake of simplicity, the displacement and shift matrix of Figure 5 is taken as an example:
Next, in the step (b3), the row number G _{M of} the decrypted shift code (K21) is replaced with the digit R _{M} of the decryption index permutation column of the (1)th column, and a position value identical to the number G _{M} is searched for. P, but it must be noted that this position value P starts from "0" instead of "1":
As shown in FIG. 2, step (c) is performed by the monitoring device 1 to encrypt the string initial code (K1) stored in the monitoring device 1 in a highorder encryption standard encryption manner to obtain a monitoring terminal verification code. (K4). And step (d) compares the monitoring terminal verification code (K4) and the client verification code (K3), and when the monitoring terminal verification code (K4) and the client verification code (K3) are the same When the string initial code (K1) is the same as the decryption initial code (K1'), that is, the verification is passed, and the connection between the monitoring device 1 and the client device 2 is permitted.
In this embodiment, the user identification and password information is stored in the monitoring device 1 and the client device 2 for use as a key for the highorder encryption standard. Of course, the present invention is not limited thereto. In other embodiments, other information may also be used as the key of the highorder encryption standard, for example, the product information of the monitoring device 1, the QR Code, and the product serial number.
In this embodiment, the remaining vacant bits in the 32 rows and 1 column matrix in step (a3) are in a random manner from the low to the high of the 32 rows and 1 column matrix in a random manner with a value of 0 to 15. The first 15 vacancies in the 32row and 1column matrices are filled in, and the present embodiment is filled with "0". Of course, the present invention is not limited thereto. In other embodiments, other methods may be used, for example, the first 15 values R _{0} to R _{14 of the} column using the encrypted index are sequentially filled in from low to high.
In this embodiment, the monitoring device 1 is a remote monitoring camera, and/or the client device 2 is a mobile device. Preferably, the mobile device is a smart phone or a tablet.
In this embodiment, the connection established between the monitoring device 1 and the client device 2 is to permit the monitoring device 1 to transmit a monitoring image data to the client device 2 for display on the client device 2. .
The above description and description are only illustrative of the preferred embodiments of the present invention, and those of ordinary skill in the art can make other modifications in accordance with the scope of the invention as defined below and the description above, but such modifications should still be It is within the scope of the invention to the invention of the invention.
<TABLE border="1" borderColor="#000000" width="_0042"><TBODY><tr><td> 1 </td><td> Monitoring device</td></tr><tr>< Td> 2 </td><td> client device</td></tr><tr><td> K2 </td><td> encryption initial code</td></tr><tr>< Td> K3 </td><td> Client Authentication Code</td></tr><tr><td> RS1, RS2 </td><td> Replacement and Shift Matrix</td></tr ></TBODY></TABLE>
Claims (7)
 A method for verifying connection of a monitoring device is used for performing verification during connection establishment between a monitoring device and a user device, and verifying a replacement and migration of the monitoring device and the user device Whether the bit matrix is the same, wherein the permutation and shift matrix is a 16row 16column matrix, and each oddnumbered column of the permutation and shift matrix is used as a permutation column, and the permutation column is not equal to each other selected from 0 to 15. The 16 numbers R _{0} to R _{15} are covered, and each even column of the permutation and shift matrix is used as a shift column, and the shift column is composed of 16 nonrepeated from 0 to 31. The numbers S _{0} to S _{15} are configured. The connection verification method sequentially includes the following steps: (a) storing, by the monitoring device, a string initial code consisting of eight characters and initializing the string The code is encrypted by the permutation and shift matrix to obtain an encrypted initial code (K2), and the encrypted initial code (K2) is transmitted to the user equipment; (b) the user equipment is replaced by the replacement device The bit matrix decrypts the encrypted initial code (K2) to obtain a decrypted initial code, and the solution is solved. The secret decryption initial code is encrypted in a predetermined standard encryption manner to obtain a client authentication code (K3), and the client authentication code (K3) is transmitted to the monitoring device; (c) The monitoring device encrypts the initial code of the string stored in the monitoring device in the predetermined standard encryption manner to obtain a monitoring terminal verification code; (d) comparing the monitoring terminal verification code with the user terminal verification code (K3), and when the monitoring terminal verification code and the client verification code (K3) are the same, the string initial code is the same as the decryption initial code, that is, the verification is passed, and the monitoring is permitted. Establishing a connection between the device and the client device, wherein in step (a), the monitoring device encrypts the string initial code by the replacement and shift matrix, and the following steps are included: (a1) the word The character of the string initial code is converted into an encrypted conversion code by the ASCII code representation of two hexadecimal bytes, and the hexadecimal digits T _{0} to T _{15 in} the encrypted conversion code are decimally digitized. Add up and take the remainder of 8 to get an encrypted index value I; (a2) The encrypted index value I indexes the permutation column of the 2I+1 column of the permutation and shift matrix as an encrypted index permutation column, and indexes the shifted column of the 2I+2 column as an encrypted index shift Column, replacing the hexadecimal number T _{X of} the encrypted conversion code with the value of the decimal calculation row of the T _{X} +1 of the encrypted index permutation column, where X is 0 to 15, and all of the encryption conversion code After the hexadecimal digital replacement is completed, an encrypted permutation code including the decimal digits U _{0} to U _{15} is obtained; and (a3) the digital U _{Y of} the encrypted permutation code is shifted by the number S _{Y of the} column according to the encryption index. Shifting into the S _{Y} +1 row of an empty 32row 1column matrix, where Y is 0 to 15, and then filling the 32 from the lowtohigh order of the 32row 1column matrix in a random manner with values from 0 to 15. The first 15 vacancies in the row 1 column matrix are left empty, and then an adjustment bit is filled into the final remaining vacancy in the 32 rows and 1 column matrix to obtain the encrypted initial code (K2), wherein the adjustment bit system is From the encrypted index value I and each digit of the 31 lines in the encrypted initial code (K2), the decimal value is added by a total of 8 Obtaining a difference between the two; wherein in step (b), the user equipment sets the encryption initial code (K2) to be decrypted by the replacement and shift matrix, and the following steps are included: (b1) encrypting Each digit V _{0} to V _{31} in the initial code (K2) is added by a decimal and takes a remainder of 8 to obtain a decryption index value J; (b2) indexing the replacement and shift using the decryption index value J The permutation column of the 2J+1th column of the bit matrix is used as a decryption index permutation column, and the shifted column of the 2nd J+2 column is indexed as a decryption index shift column, and the decryption index is shifted by the row number of the column. S _{Z} extracts the value of the decimal calculation row of the S _{Z} +1 in the encrypted initial code K2 as a decryption shift value extraction index value, and shifts the column according to the row number S _{Z} in the decryption index The positions are arranged to form a decrypted shift code including numbers G _{0} to G _{15} , where Z is 0 to 15; (b3) each row of numbers G _{M of} the decrypted shift code is individually used as a decrypted permutation value search index Value from the decryption index permutation column to search for the decryption permutation value search index value individually The decrypted index replacing a position value in the column, and in that the position value by the respective line numbers G _{M} to be arranged at the location of the decrypted shift code of the composition a comprising sixteen digits a decryption H0 to H15 permutation code , wherein the position value is from 0 to 15 and M is 0 to 15, and then the decrypted permutation code is converted into eight characters in units of two bytes as a hexadecimal ASCII code. The decrypted initial code composed.
 The method for verifying the connection of the monitoring device of claim 1, wherein the encrypted index value (I) is less than the number of each of the 31 lines in the encrypted initial code (K2), and the total number is 8 For the remainder value, the difference is added to 8 to obtain the adjustment bit.
 For example, the method for verifying the connection of the monitoring device of claim 1 is that the predetermined standard encryption method conforms to the Advanced Encryption Standard (AES) and uses a user identification and password information as a key.
 For example, the method for verifying the connection of the monitoring device of claim 3, wherein the monitoring device and the client device store user identification and password information.
 For example, in the method for verifying the connection of the monitoring device of claim 1, the method of filling in the remaining empty spaces in the 32 rows and 1 column matrix in step (a3) is to replace the first 15 columns of the column by using the encrypted index. The values R _{0} to R _{14 are} sequentially filled in from the low to the high.
 The method for verifying the connection of the monitoring device of claim 1, wherein the monitoring device is a remote monitoring camera, and/or the user device is a mobile device.
 The method for verifying the connection of the monitoring device of claim 1, wherein the connection between the monitoring device and the user device is established to permit the monitoring device to transmit a monitoring image data to the user device for display. On the client device.
Priority Applications (1)
Application Number  Priority Date  Filing Date  Title 

TW104137980A TWI587680B (en)  20151118  20151118  A connection verifying method for monitoring device 
Applications Claiming Priority (1)
Application Number  Priority Date  Filing Date  Title 

TW104137980A TWI587680B (en)  20151118  20151118  A connection verifying method for monitoring device 
Publications (2)
Publication Number  Publication Date 

TW201720094A TW201720094A (en)  20170601 
TWI587680B true TWI587680B (en)  20170611 
Family
ID=59687336
Family Applications (1)
Application Number  Title  Priority Date  Filing Date 

TW104137980A TWI587680B (en)  20151118  20151118  A connection verifying method for monitoring device 
Country Status (1)
Country  Link 

TW (1)  TWI587680B (en) 
Citations (5)
Publication number  Priority date  Publication date  Assignee  Title 

TW200740165A (en) *  20060410  20071016  Mitac Int Corp  Fingerprint authentication method for accessing wireless network systems 
CN101897165A (en) *  20071030  20101124  意大利电信股份公司  Method of authentication of users in data processing systems 
TW201337632A (en) *  20111222  20130916  Intel Corp  Instructions processors, methods, and systems to process BLAKE secure hashing algorithm 
TW201421390A (en) *  20121019  20140601  Mpayme Ltd  Method and system for secure mobile payment 
US8752147B2 (en) *  20101005  20140610  Cse Co., Ltd  System and method for twofactor user authentication 

2015
 20151118 TW TW104137980A patent/TWI587680B/en active
Patent Citations (5)
Publication number  Priority date  Publication date  Assignee  Title 

TW200740165A (en) *  20060410  20071016  Mitac Int Corp  Fingerprint authentication method for accessing wireless network systems 
CN101897165A (en) *  20071030  20101124  意大利电信股份公司  Method of authentication of users in data processing systems 
US8752147B2 (en) *  20101005  20140610  Cse Co., Ltd  System and method for twofactor user authentication 
TW201337632A (en) *  20111222  20130916  Intel Corp  Instructions processors, methods, and systems to process BLAKE secure hashing algorithm 
TW201421390A (en) *  20121019  20140601  Mpayme Ltd  Method and system for secure mobile payment 
Also Published As
Publication number  Publication date 

TW201720094A (en)  20170601 
Similar Documents
Publication  Publication Date  Title 

Hamza et al.  Hash based encryption for keyframes of diagnostic hysteroscopy  
CN105812126B (en)  Lightweight backup and the efficient restoration methods of healthy block chain data encryption key  
Zhang et al.  Analysis and improvement of a chaosbased symmetric image encryption scheme using a bitlevel permutation  
US9842217B2 (en)  Method and system for securing data  
US10419416B2 (en)  Encryption and decryption techniques using shuffle function  
US10437469B2 (en)  Secure interactions involving superimposing image of a virtual keypad over image of a touchscreen keypad  
Pachghare  Cryptography and information security  
AU2003203712B2 (en)  Methods for remotely changing a communications password  
US8949616B2 (en)  Methods, apparatus and systems for securing userassociated passwords used for identity authentication  
CN102882847B (en)  Secure digital (SD)passwordcardbased secure communication method of Internet of things healthcare service system  
US9819657B2 (en)  Protection of memory interface  
US20170142082A1 (en)  System and method for secure deposit and recovery of secret data  
WO2016065321A1 (en)  Secure communication channel with token renewal mechanism  
CN102223364B (en)  Method and system for accessing ebook data  
EP2329622B1 (en)  Message authentication code precomputation with applications to secure memory  
US7860254B2 (en)  Computer system security via dynamic encryption  
CN105553951B (en)  Data transmission method and device  
CN101485137B (en)  Method and apparatus for encrypting/decrypting data  
Dhall et al.  Cryptanalysis of image encryption scheme based on a new 1D chaotic system  
US7757085B2 (en)  Method and apparatus for encrypting data transmitted over a serial link  
CN104579694A (en)  Identity authentication method and system  
Zhang et al.  Cryptanalysis of Sboxonly chaotic image ciphers against chosen plaintext attack  
CN104363091B (en)  A kind of encipherdecipher method of automatically retrieval key and selection algorithm  
Moen et al.  Weaknesses in the temporal key hash of WPA  
CN103246842B (en)  For verifying the method and apparatus with data encryption 