CN109360307B - Multi-encryption storage system - Google Patents

Multi-encryption storage system Download PDF

Info

Publication number
CN109360307B
CN109360307B CN201811121355.0A CN201811121355A CN109360307B CN 109360307 B CN109360307 B CN 109360307B CN 201811121355 A CN201811121355 A CN 201811121355A CN 109360307 B CN109360307 B CN 109360307B
Authority
CN
China
Prior art keywords
cabinet
password
string
box
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811121355.0A
Other languages
Chinese (zh)
Other versions
CN109360307A (en
Inventor
佘丽娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hohhot Xincheng Innovation And Entrepreneurship Service Center
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201811121355.0A priority Critical patent/CN109360307B/en
Publication of CN109360307A publication Critical patent/CN109360307A/en
Application granted granted Critical
Publication of CN109360307B publication Critical patent/CN109360307B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05GSAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
    • E05G1/00Safes or strong-rooms for valuables
    • E05G1/06Safes or strong-rooms for valuables having provision for multiple compartments
    • E05G1/08Safes or strong-rooms for valuables having provision for multiple compartments secured individually
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C9/00912Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for safes, strong-rooms, vaults or the like
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention provides a multiple-encryption storage system which comprises a safety server, a storage cabinet, a first terminal held by a first user and a second terminal held by a second user, wherein each cabinet groove of the storage cabinet is provided with a cabinet box, and each cabinet box is in communication connection with the safety server; the first terminal and the second terminal are not interconnected and are in communication connection with the security server; the security server responds to a first terminal instruction, selects a cabinet box to be opened, and generates a pass password and a holding password for the cabinet box to be opened; and transmitting the pass password and the identifier of the cabinet box to be opened to the storage cabinet, and transmitting the holding password to a second terminal corresponding to the cabinet box to be opened. The invention can open the cabinet boxes only by taking the preset input passwords, so that the safety performance of the storage cabinet is obviously improved, and the cabinet boxes can be opened without limiting specific second terminals as long as the input passwords at the preset number of second terminals are obtained, so that the invention has wide application prospect.

Description

Multi-encryption storage system
Technical Field
The invention relates to the field of intelligent control, in particular to a multiple-encryption storage system.
Background
The storage cabinet is widely applied to storage management of various types of small parts, samples, molds, tools, electronic components, file data, design drawings, bills, catalogs, tables and the like in offices, government offices, factories and the like. Is a personal steward of personal items. Unlike traditional wooden cabinet, it is easy to damage, impact resistant, easy to breed bacteria and produce bad smell. The locker is made of high-quality cold-rolled steel plates and has incomparable excellent performance compared with the traditional wooden locker, however, the locker usually has no anti-theft function or is weak in anti-theft function and easy to crack, so that a user suffers from property loss.
Disclosure of Invention
In order to solve the technical problem, the invention provides a multiple-encryption storage system.
The invention is realized by the following technical scheme:
a multiple encryption storage system comprises a security server, a storage cabinet, a first terminal held by a first user and a second terminal held by a second user, wherein each cabinet groove of the storage cabinet is provided with a cabinet box, and each cabinet box is in communication connection with the security server; the first terminal and the second terminal are not interconnected and are in communication connection with the security server;
the security server responds to a first terminal instruction, selects a cabinet box to be opened, and generates a pass password and a holding password for the cabinet box to be opened; and transmitting the pass password and the identifier of the cabinet box to be opened to the storage cabinet, and transmitting the holding password to a second terminal corresponding to the cabinet box to be opened.
Further, the secret code is a parameter pair (x)i,yi)。
Further, the second terminal is further configured to generate an input password, specifically to obtain the parameter pair (x)i,yi) (ii) a According to the parameter xiTo obtain
Figure BDA0001811511990000011
A first data string of bits; according to the parameter yiTo obtain
Figure BDA0001811511990000012
A second string of bits; and splicing the first data string and the second data string to obtain the input password.
Further, the locker is also used for acquiring beta input passwords pi(ii) a According to each input password piObtaining the password identification pair (x)i,yi) (ii) a Obtaining the (x)i,yi) A first algebraic expression with x as an argument at point 0; acquiring a second algebraic expression taking x as an independent variable according to the first algebraic expression taking x as the independent variable, wherein for any value of x, the difference values of the corresponding second algebraic expression and the corresponding first algebraic expression are all multiples of a core parameter value xi; acquiring a constant item in the second algebraic expression, and taking the constant item as a suspected password;
the storage cabinet also inquires whether a pass password identical to the suspected pass password exists, if yes, a target cabinet box corresponding to the pass password is obtained, and the target cabinet box slides out.
Further, the security server is also used for passing passwords
Figure BDA0001811511990000021
Encrypting a to-be-encrypted digital string formed by the to-be-encrypted digital string and a corresponding cabinet box identifier of the to-be-encrypted digital string, specifically querying a password dictionary and obtaining a to-be-extracted key set from the password dictionary, wherein the to-be-extracted key set and the to-be-encrypted digital string have no same number; the length N of each key of the password dictionary is the same, and the security server and the storage cabinet share the same password dictionary; randomly extracting a key from the key set to be extracted as a current key; counting the number with the highest occurrence frequency in the digital string to be encrypted, and obtaining the specific occurrence frequency of the number; generating an interference digit string with a preset length, wherein the interference digit string has the following characteristics: the interference digit string comprises all digits in the current key and only includes digits in the current key, and the number of occurrences of the lowest-frequency digit in the interference digit string is higher than that of the password
Figure BDA0001811511990000022
The number of occurrences of the highest-frequency-of-occurrence digit; splicing M current keys to obtain a key string, and sequentially inserting each number in the key string into the digital string to be encrypted to obtain a first data string; and splicing the first data string and the interference digital string to obtain encrypted data, and transmitting the encrypted data to the storage cabinet.
Further, the locker is also used for decrypting the encrypted data, and specifically used for counting the occurrence frequency of each number in the received encrypted data; extracting N target numbers with the maximum occurrence frequency; inquiring a key comprising N target numbers in a password dictionary to obtain a target key; extracting a pass password from received data according to the target secret key
Figure BDA0001811511990000023
And the corresponding cabinet box mark; password to be passed
Figure BDA0001811511990000024
The corresponding box identification is stored in the information memory.
In the description of the present invention, it is to be understood that the terms "central," "longitudinal," "lateral," "upper," "lower," "front," "rear," "left," "right," "vertical," "horizontal," "top," "bottom," "inner," "outer," and the like are used in the orientation or positional relationship indicated in the drawings, which are merely for convenience in describing the invention and to simplify the description, and are not intended to indicate or imply that the referenced device or element must have a particular orientation, be constructed and operated in a particular orientation, and are therefore not to be construed as limiting the invention. Furthermore, the terms "first", "second", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first," "second," etc. may explicitly or implicitly include one or more of that feature. In the description of the invention, the meaning of "a plurality" is two or more unless otherwise specified.
In the description of the invention, it is to be noted that, unless otherwise explicitly specified or limited, the terms "mounted", "connected" and "connected" are to be construed broadly, e.g. as being fixed or detachable or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the creation of the present invention can be understood by those of ordinary skill in the art through specific situations.
The invention has the beneficial effects that:
the invention provides a multiple-encryption storage system, which can open the cabinet box only when a preset number of input passwords are taken, so that the safety performance of the storage cabinet is obviously improved, and the cabinet box can be opened without limiting specific second terminals as long as the input passwords at the preset number of second terminals are obtained, so that the embodiment of the invention has wide application prospect.
Drawings
Fig. 1 is a flowchart of a method for opening a cabinet box by a security server according to this embodiment;
FIG. 2 is a block diagram of a controller provided in the present embodiment;
fig. 3 is a flowchart of a method for generating a secret password by a server according to the present embodiment;
fig. 4 is a flowchart of a method for generating an input password by the second terminal according to the embodiment;
fig. 5 is a flowchart of a method for obtaining a suspected password according to this embodiment;
fig. 6 is a flowchart of an encryption process of the security server provided in the present embodiment;
FIG. 7 is a flowchart of a decryption method for the locker according to this embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail below.
The embodiment of the invention provides a multiple-encryption storage system which comprises a security server, a storage cabinet and a plurality of handheld terminals, wherein each cabinet groove of the storage cabinet is provided with a cabinet box, and each cabinet box and each handheld terminal are in communication connection with the security server; the handheld terminal comprises a first terminal held by a first user and a second terminal held by a second user, wherein the first terminal and the second terminal are both in a plurality, and the first terminal and the second terminal are not interconnected.
The security server comprises a cabinet box management module, a user management module, a cabinet box selection module, a password generation module, a password pushing module and a password management module;
the cabinet box management module is used for managing the cabinet boxes and recording used cabinet boxes and unused cabinet boxes;
the user management module is used for managing a first terminal and a second terminal, the first terminal has the authority of opening the cabinet box, and the second terminal has the authority of using the cabinet box;
the cabinet box selection module is used for responding to a cabinet box opening instruction of the first terminal and selecting an unused cabinet box as a cabinet box to be opened;
the password generation module is used for generating a pass password and a holding password aiming at the cabinet box to be opened;
the password pushing module is used for pushing the pass password to the cabinet box to be opened and pushing the holding password to a second terminal corresponding to the cabinet box to be opened;
and the password management module is used for recording the relationship among the first terminal, the second terminal, the cabinet box used by the second terminal, the pass password of the cabinet box and the holding password of the second terminal.
The method for opening the cabinet box by the security server is shown in fig. 1, and comprises the following steps:
s1, responding to a first terminal instruction, inquiring an unused cabinet by a cabinet management module, and feeding back the unused cabinet to the first terminal.
And S2, receiving an unused cabinet box selection instruction of the first terminal, and selecting a cabinet box to be opened from the unused cabinet boxes.
And S3, generating a pass password and a holding password for the cabinet box to be opened.
And S4, transmitting the pass password and the identification of the cabinet box to be opened to the storage cabinet, and transmitting the holding password to a second terminal corresponding to the cabinet box to be opened.
The locker includes the cabinet body, and the cabinet body is provided with a plurality of layers of tank bracket, and every layer of tank bracket is gone up to distribute and is provided with a plurality of cabinets groove, and the cabinet box is equipped with to the tank inslot, and the cabinet groove can be through being provided with the slide rail for but cabinet box slidable mounting reduces the gliding resistance of cabinet box on the slide rail, and the cabinet box rear end is connected with drive arrangement, and the tank bracket is provided with control panel, camera and bee calling organ, control panel, camera and bee calling organ all are connected with a controller, control panel is used for acquireing the password of user input.
Specifically, be provided with N row password input device on the control panel, each row password input device can input a password, control panel can obtain N passwords at most. In the embodiment of the invention, the password input device of the control panel inputs the input password generated by the second terminal according to the holding password.
As shown in fig. 2, the controller includes:
and the communicator is used for being in communication connection with the safety server.
And the information storage is used for storing the corresponding relation between each cabinet box and the pass password.
And the password synthesizer is used for acquiring a suspected password corresponding to the input password input by the user.
And the judger is used for judging whether the password identical to the suspected password exists in the information memory.
And the cabinet box opener is used for obtaining the target cabinet box corresponding to the pass password and opening the target cabinet box if the target cabinet box exists.
And the buzzer controller is used for starting the buzzer if the buzzer does not exist.
And the camera controller is used for starting the camera if the camera does not exist.
In the embodiment of the invention, the driving device is preferably an air cylinder driving mechanism, the air cylinder driving mechanism comprises an air cylinder, a push rod of the air cylinder is hinged with a universal connector, and one end of the universal connector is connected to the end part of the cabinet box, so that the air cylinder can conveniently push the cabinet box to slide in the cabinet groove; when the cabinet box is opened, the cabinet box slides out of the cabinet groove, a user can store articles into the cabinet box, and after the articles are stored, the cabinet box is pushed back along the cabinet groove, and the cabinet box is automatically closed.
Specifically, the security server needs to perform configuration before generating the pass password and the holding password, and the configuration content includes: the number alpha of the second terminals participating in opening the cabinet box, the number beta of the second terminals required by opening the cabinet box together at the lowest, the core parameter value xi and the pass password
Figure BDA0001811511990000068
Wherein the core parameter value xi and the password
Figure BDA0001811511990000067
May be configured by the first terminal.
The number alpha of the second terminals participating in opening the cabinet box represents the number of the holding passwords needing to be generated, and each second terminal can only obtain one holding password. The number beta (beta < alpha) of the second terminals required for opening the cabinet boxes at the lowest common level represents the number of the input passwords required for opening the cabinet boxes. The core parameter values are used for the secure server to generate the respective secret passwords.
Specifically, the method for generating the secret password by the security server is shown in fig. 3, and includes:
and S101, determining a parameter data set according to the core parameter value xi.
In particular, the parameter dataset represents a set of ξ remaining classes of modulo ξ.
S102, randomly selecting beta-1 parameters a in the parameter data settConstruction of algebraic
Figure BDA0001811511990000061
S103, randomly acquiring alpha different parameters xiFor each parameter xiAll bring it into the algebraic expression to get the corresponding value yiI.e. alpha parameter pairs (x) are generatedi,yi) Wherein x isiAnd yiNumber of bits is less than
Figure BDA0001811511990000062
S104, parameter pair (x)i,yi) And transmitting the data as a holding password to alpha second terminals participating in opening the cabinet box, wherein each second terminal acquires one holding password.
Specifically, the security server pushes the holding password to the second terminal according to a mobile phone number or a micro signal corresponding to the second terminal.
Specifically, as shown in fig. 4, the method for generating the input password by the second terminal includes:
s201, acquiring parameter pair (x)i,yi)。
S202, according to the parameter xiTo obtain
Figure BDA0001811511990000063
A first string of bits.
S203, according to the parameter yiTo obtain
Figure BDA0001811511990000064
A second string of bits.
Specifically, xi,yiIs less than
Figure BDA0001811511990000065
Then 0 is complemented at the low bit.
And S204, splicing the first data string and the second data string to obtain an input password.
For each second terminal, it may display an input password to facilitate manual entry of the input password into the control panel by the user.
Specifically, an embodiment of the present invention further provides a method for acquiring a suspected password, where the method is implemented by a password synthesizer of a locker, and as shown in fig. 5, the method includes:
s301, acquiring beta input passwords piAnd the length of each input password is M.
Specifically, the beta input passwords are input through N (N is more than or equal to beta) rows of cipherers of the control panel, and each row of cipherers can only input one input password.
S302, according to each input password piObtaining the password identification pair (x)i,yi)。
Specifically, in the embodiment of the present invention, if the length of the password is M, the password is first
Figure BDA0001811511990000071
Bit-mapped password xiAfter, after
Figure BDA0001811511990000072
Bit-mapped password yi
S303, acquiring the data of (x)i,yi) A first algebraic expression with x as argument at point 0.
Specifically, the algebraic expression may be represented as
Figure BDA0001811511990000073
S304, acquiring a second algebraic expression with x as an independent variable according to the first algebraic expression with x as the independent variable, wherein for any value of x, the difference value between the corresponding second algebraic expression and the corresponding first algebraic expression is a multiple of the value xi of the core parameter.
S305, acquiring a constant item in the second algebraic expression, and taking the constant item as a suspected password.
Further, the embodiment of the invention also provides a cabinet box opening method, which is implemented by a cabinet box opener of a storage cabinet, and the method comprises the following steps:
s310, whether the password identical to the suspected password exists in the information storage is inquired.
And S320, if the password exists, obtaining the target cabinet box corresponding to the pass password, and sliding out of the target cabinet box.
S330, if the alarm signal does not exist, an alarm mechanism is started.
Specifically, the alarm mechanism may be selected by a user, and if the user selects the camera mechanism, the camera is turned on, and if the user selects the buzzer mechanism, the buzzer is turned on.
Specifically, a timer is arranged in each of the buzzer and the camera, and the timer is used for closing the buzzer or the camera after the buzzer or the camera is started for a preset time.
Further, in order to improve the security of the locker and the security server in the interaction process and avoid leakage of the password, the embodiment of the invention encrypts the whole process of the communication between the security server and the locker.
Password for passing by security server
Figure BDA0001811511990000081
The process of encrypting the to-be-encrypted digital string formed by the corresponding box identifier is shown in fig. 6, and includes:
s401, inquiring a password dictionary and acquiring a key set to be extracted from the password dictionary, wherein the key set to be extracted and the number string to be encrypted have no same number; and each key of the password dictionary has the same length N, and the security server and the locker share the same password dictionary.
S402, randomly extracting a key from the key set to be extracted as a current key.
And S403, counting the number with the highest occurrence frequency in the digital string to be encrypted, and obtaining the specific occurrence frequency of the number.
S404, generating an interference digit string with a preset length, wherein the interference digit string has the following characteristics: the interference digit string comprises all digits in the current key and only includes digits in the current key, and the number of occurrences of the lowest-frequency digit in the interference digit string is higher than that of the password
Figure BDA0001811511990000082
The number of occurrences of the highest frequency occurring digit.
S405, splicing M current keys to obtain a key string, and sequentially inserting each number in the key string into the digital string to be encrypted to obtain a first data string.
S406, splicing the first data string and the interference digit string to obtain encrypted data.
Correspondingly, the locker decryption method is shown in fig. 7, and includes:
s501, counting the occurrence frequency of each number in the received encrypted data;
s502, extracting N target numbers with the largest occurrence frequency;
s503, inquiring a key comprising N target numbers in a password dictionary to obtain a target key;
s504, a pass password is extracted from received data according to the target secret key
Figure BDA0001811511990000083
And the corresponding cabinet box mark;
s505, passing password
Figure BDA0001811511990000084
The corresponding box identification is stored in the information memory.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
It should be noted that: the sequence of the above embodiments of the present invention is only for description, and does not represent the advantages and disadvantages of the embodiments.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (1)

1. A multiple encryption storage system is characterized in that:
the multiple encryption storage system comprises a security server, a storage cabinet, a first terminal held by a first user and a second terminal held by a second user, wherein each cabinet groove of the storage cabinet is provided with a cabinet box, and each cabinet box is in communication connection with the security server; the first terminal and the second terminal are not interconnected and are in communication connection with the security server; the storage cabinet comprises a cabinet body, the cabinet body is provided with a plurality of layers of cabinet frames, each layer of cabinet frame is distributed with a plurality of cabinet grooves, cabinet boxes are arranged in the cabinet grooves, the cabinet grooves can be provided with slide rails, so that the cabinet boxes can be slidably arranged on the slide rails, the sliding resistance of the cabinet boxes is reduced, the rear ends of the cabinet boxes are connected with a driving device, the cabinet frames are provided with a control panel, a camera and a buzzer, the control panel, the camera and the buzzer are all connected with a controller, and the control panel is used for acquiring passwords input by users; the control panel is provided with N rows of password input devices, each row of password input devices can input one password, and the control panel can acquire N passwords at most;
the security server responds to a first terminal instruction, selects a cabinet box to be opened, and generates a pass password and a holding password for the cabinet box to be opened; the holding password is a parameter pair
Figure 718401DEST_PATH_IMAGE001
(ii) a The pass password and the identification of the cabinet box to be opened are transmitted to the storage cabinet, and the holding password is transmitted to a second terminal corresponding to the cabinet box to be opened;
the second terminal is further configured to generate an input password, in particular to obtain a parameter pair
Figure 452002DEST_PATH_IMAGE001
(ii) a According to the parameters
Figure 725900DEST_PATH_IMAGE002
To obtain
Figure 76110DEST_PATH_IMAGE003
A first data string of bits; according to the parameters
Figure 25481DEST_PATH_IMAGE004
To obtain
Figure 941484DEST_PATH_IMAGE003
A second string of bits; splicing the first data string and the second data string to obtain an input password;
the storage isThe cabinet is also used for obtaining
Figure 803261DEST_PATH_IMAGE005
Personal input password
Figure 686772DEST_PATH_IMAGE006
(ii) a According to each input password
Figure 924986DEST_PATH_IMAGE006
Obtaining the password identification pair
Figure 961075DEST_PATH_IMAGE001
(ii) a Is obtained to
Figure 243021DEST_PATH_IMAGE001
At 0 point or more
Figure 364561DEST_PATH_IMAGE007
A first algebraic expression of an argument; according to the above
Figure 655734DEST_PATH_IMAGE007
Is obtained as a first algebraic expression of the independent variable to
Figure 484013DEST_PATH_IMAGE007
Second algebraic expression as an argument for any
Figure 15488DEST_PATH_IMAGE007
The difference between the corresponding second and first algebraic expressions is the core parameter value
Figure 545695DEST_PATH_IMAGE008
Multiples of (d); acquiring a constant item in the second algebraic expression, and taking the constant item as a suspected password;
the locker also inquires whether a pass password identical to the suspected pass password exists, if so, a target box corresponding to the pass password is obtained, and the target box slides out;
the security server is also used for passing passwords
Figure 453609DEST_PATH_IMAGE009
Encrypting a to-be-encrypted digital string formed by the to-be-encrypted digital string and a corresponding cabinet box identifier of the to-be-encrypted digital string, specifically querying a password dictionary and obtaining a to-be-extracted key set from the password dictionary, wherein the to-be-extracted key set and the to-be-encrypted digital string have no same number; the length N of each key of the password dictionary is the same, and the security server and the storage cabinet share the same password dictionary; randomly extracting a key from the key set to be extracted as a current key; counting the number with the highest occurrence frequency in the digital string to be encrypted, and obtaining the specific occurrence frequency of the number; generating an interference digit string with a preset length, wherein the interference digit string has the following characteristics: the interference digit string comprises all digits in the current key and only includes digits in the current key, and the number of occurrences of the lowest-frequency digit in the interference digit string is higher than that of the password
Figure 651241DEST_PATH_IMAGE009
The number of occurrences of the highest-frequency-of-occurrence digit; splicing M current keys to obtain a key string, and sequentially inserting each number in the key string into the digital string to be encrypted to obtain a first data string; splicing the first data string and the interference digital string to obtain encrypted data, and transmitting the encrypted data to the storage cabinet;
the storage cabinet is also used for decrypting the encrypted data, and is particularly used for counting the occurrence frequency of each number in the received encrypted data; extracting N target numbers with the maximum occurrence frequency; inquiring a key comprising N target numbers in a password dictionary to obtain a target key; extracting a pass password from received data according to the target secret key
Figure 291300DEST_PATH_IMAGE009
And the corresponding cabinet box mark; will pass through secretCode
Figure 121853DEST_PATH_IMAGE009
The corresponding box identification is stored in the information memory.
CN201811121355.0A 2018-09-25 2018-09-25 Multi-encryption storage system Active CN109360307B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811121355.0A CN109360307B (en) 2018-09-25 2018-09-25 Multi-encryption storage system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811121355.0A CN109360307B (en) 2018-09-25 2018-09-25 Multi-encryption storage system

Publications (2)

Publication Number Publication Date
CN109360307A CN109360307A (en) 2019-02-19
CN109360307B true CN109360307B (en) 2020-11-03

Family

ID=65347772

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811121355.0A Active CN109360307B (en) 2018-09-25 2018-09-25 Multi-encryption storage system

Country Status (1)

Country Link
CN (1) CN109360307B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101803270A (en) * 2007-07-31 2010-08-11 雷蒙德·吉恩·克利福德·阿图斯 Method and system for encryption of data
CN102480726A (en) * 2010-11-24 2012-05-30 比亚迪股份有限公司 Password protection method, password protection system and mobile terminal with same
WO2013156956A1 (en) * 2012-04-18 2013-10-24 Fourie Jurie Alexander Mobile device charging station
CN103745536A (en) * 2014-01-24 2014-04-23 温州超动科技有限公司 Cabinet management system based on dynamic passwords
CN104167030A (en) * 2013-12-19 2014-11-26 陈桂强 Electronic cipher shared lock based on (t,n) threshold
US9672673B1 (en) * 2016-03-22 2017-06-06 Digilock Asia Ltd. Electronic locker lock system
CN108171849A (en) * 2018-01-11 2018-06-15 上海威惠智能科技有限公司 Password update method, safety cabinet and safety box control system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101803270A (en) * 2007-07-31 2010-08-11 雷蒙德·吉恩·克利福德·阿图斯 Method and system for encryption of data
CN102480726A (en) * 2010-11-24 2012-05-30 比亚迪股份有限公司 Password protection method, password protection system and mobile terminal with same
WO2013156956A1 (en) * 2012-04-18 2013-10-24 Fourie Jurie Alexander Mobile device charging station
CN104167030A (en) * 2013-12-19 2014-11-26 陈桂强 Electronic cipher shared lock based on (t,n) threshold
CN103745536A (en) * 2014-01-24 2014-04-23 温州超动科技有限公司 Cabinet management system based on dynamic passwords
US9672673B1 (en) * 2016-03-22 2017-06-06 Digilock Asia Ltd. Electronic locker lock system
CN108171849A (en) * 2018-01-11 2018-06-15 上海威惠智能科技有限公司 Password update method, safety cabinet and safety box control system

Also Published As

Publication number Publication date
CN109360307A (en) 2019-02-19

Similar Documents

Publication Publication Date Title
Wang et al. Secure ranked keyword search over encrypted cloud data
US9286466B2 (en) Registration and authentication of computing devices using a digital skeleton key
CN110324143A (en) Data transmission method, electronic equipment and storage medium
CN102982049B (en) Methods and systems for implementing email recipient templates
CN110430055A (en) Offline cryptogram generation method, offline cryptogram verification method and door lock management server
US9641328B1 (en) Generation of public-private key pairs
CN102064944A (en) Safety card issuing method as well as card issuing equipment and system
CN114417073B (en) Neighbor node query method and device of encryption graph and electronic equipment
CN104092545B (en) A kind of Verification System and its method of work for integrating a variety of dynamic passwords
CN105281898A (en) Apparatus and method for generating key
CN109360307B (en) Multi-encryption storage system
CN110062941A (en) Message transmission system, communication terminal, server unit, message method and program
CN109147246B (en) Intelligent anti-theft system
CN109138649B (en) Password storing safety system
CN109252789B (en) Intelligent safety control system
CN110489998A (en) One kind can search for encryption method, device, equipment and readable storage medium storing program for executing
US10742401B2 (en) Half-pyramid data encryption
CN104866773B (en) A kind of fingerprint search method, apparatus and terminal
CN117729535A (en) Query method, electronic equipment and system
CN109377596B (en) Safety system
CN115455463A (en) Hidden SQL query method based on homomorphic encryption
Chakraborty et al. BSMFS: Blockchain assisted secure multi-keyword fuzzy search over encrypted data
CN109241381A (en) Information matching method and device
CN103902921A (en) File encryption method and system
Will et al. Bin encoding: a user-centric secure full-text searching scheme for the cloud

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20230420

Address after: 010000 Intersection of Genghis Khan Street and Horqin North Road, Xincheng District, Hohhot, Inner Mongolia Autonomous Region

Patentee after: Hohhot Xincheng Innovation and Entrepreneurship Service Center

Address before: 322200 No. 4 Jieyang East Road, Puyang Street, Pujiang County, Jinhua, Zhejiang

Patentee before: She Lijuan

TR01 Transfer of patent right