Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Dynamic double-key algorithm

A key algorithm and dynamic encryption technology, applied in the field of information security, can solve problems such as unusable and constantly changing, and achieve the effect of ensuring security

Inactive Publication Date: 2018-08-14
浙江易云物联科技有限公司
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The principle of the Bluetooth lock circuit is: there is a key in the circuit, and the key exists in the form of 4-digit hexadecimal data. When unlocking, an APP or a device with Bluetooth first queries the Bluetooth lock circuit, and then connects. In order to obtain services and characteristics, and finally establish a data communication channel with the Bluetooth circuit, since the operations of the above principles are all open, there is no arbitrary encryption process. When hackers understand the communication protocol, especially intercept the key, they can pass The above process easily opens this circuit for passage, therefore, a key that is inaccessible to hackers and constantly changing is required

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic double-key algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0024] see figure 1 , a dynamic dual-key algorithm whose algorithm includes the following steps:

[0025] A. Establish a dynamic encryption algorithm based on the clock principle and a seed matrix of encryption elements;

[0026] B. Initialize the system network;

[0027] C. The secret synchronization process of dynamic keys, key extraction and generation, encryption and decryption of streaming media data;

[0028] D. The client receives the identification ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a dynamic double-key algorithm. The algorithm comprises the following steps: step A, establishing a dynamic encryption algorithm based on a clock principle and an encryption element seed array; step B, performing initialization of a system network; step C, performing a confidentiality and synchronization process of a dynamic key, key extraction and generation, and encryption and decryption of streaming media data; and step D, receiving a dynamic password input by a user by a client, generating identifier information and a first dynamic password of a device, and encrypting the first dynamic password by adopting a one-way hash algorithm. According to the dynamic double-key algorithm provided by the invention, the dynamic encryption algorithm based on the clock principle is adopted, so that the keys of each time are different; meanwhile, a set of dynamic algorithm auxiliary keys are generated every time, and the auxiliary keys and keys are processed by encryption to further generate a string of keys with 18-bit numbers, and two dynamic keys are sent to the client to be opened; and since the keys can only be used once, after the keys are intercepted by a hacker,the keys are written into equipment, and the equipment has no reaction, so that the use safety of a Bluetooth lock circuit is effectively guaranteed.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a dynamic double-key algorithm. Background technique [0002] Bluetooth is a wireless technology standard that can realize short-distance data exchange between fixed equipment, mobile equipment and building personal area network (using UHF radio waves in the ISM band of 2.4-2.485GHz), Bluetooth can connect multiple devices, overcome problem of data synchronization. [0003] Bluetooth is a packet-based protocol with a master-slave architecture. A master device can communicate with up to seven slave devices in the same piconet. Devices can switch roles through protocols, and slave devices can also be converted to master devices. All devices The clock of the master device is shared, and the packet switching is based on the basic clock defined by the master device that runs at intervals of 312.5µs. Two clock cycles constitute a 625µs slot, and two time slots constitute ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/16H04L9/14H04L29/06H04L9/32H04L9/08
CPCH04L9/0863H04L9/14H04L9/16H04L9/3228H04L9/3236H04L63/067H04L63/0838
Inventor 张翔吴权方雪明丁宁
Owner 浙江易云物联科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products