Supercharge Your Innovation With Domain-Expert AI Agents!

Encryption lock based on elliptic encryption algorithm and unlocking method thereof

A technology of elliptic encryption and encrypted lock, which is applied in the computer field, can solve problems such as security and hidden dangers, and achieve the effect of ensuring security

Inactive Publication Date: 2019-05-24
HAINAN NEWSOFT CO LTD
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, no matter what kind of lock it is, there are security risks, especially the encryption lock. Once the key is leaked, it is easy to unlock.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption lock based on elliptic encryption algorithm and unlocking method thereof
  • Encryption lock based on elliptic encryption algorithm and unlocking method thereof
  • Encryption lock based on elliptic encryption algorithm and unlocking method thereof

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0072] see figure 1 , the present application provides a first embodiment of an encryption lock based on an elliptic encryption algorithm, including:

[0073] The algorithm information storage 11 is used to store the public key and constant parameters of the elliptic encryption algorithm. The elliptic encryption algorithm is an asymmetric encryption algorithm that uses a private key for encryption and a public key for decryption. Compared with other encryption algorithms, the key used is smaller and provides the same or higher level of security as other encryption algorithms. security. The public key and constant parameters of the elliptic encryption algorithm determine the decryption method of the encryption algorithm. The private key used for encryption is not stored in the algorithm information storage 11, and the private key is only saved by the terminal or software client used by the user, so that the private key and public key for encryption and decryption are stored s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption lock based on an elliptic encryption algorithm and an unlocking method thereof. A random generator generates a random number and sends the same to user application software; the user application software adopts a private key to perform elliptic curve signing on the random number to generate verifying information; an information collector collects the verifyinginformation and sends the same to a verifying processor; a verifying processor acquires a public key and constant parameters of the elliptic encryption algorithm; the verifying processor verifies theverifying information according to the public key and the constant parameters of the elliptic encryption algorithm to acquire a verifying result; the verifying processor judges whether to unlock or not according to the verifying result. Asymmetry of elliptic encryption is utilized for password verifying during unlocking, and even if information stored in the encryption lock is cracked completely,unlocking operation cannot be realized if a third party does not know the encrypted private key used by the user application software, so that safety of the encryption lock is ensured.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to an encryption lock based on an elliptic encryption algorithm and an unlocking method of the encryption lock. Background technique [0002] In order to ensure the safety of personal belongings and information, the design of the lock has also changed from the most traditional key to unlocking, to the current keyboard input password unlocking and fingerprint unlocking and so on. [0003] While more and more password unlocking and fingerprint unlocking are gradually replacing key unlocking, the mode of password unlocking and fingerprint unlocking also has some potential safety hazards. For example, for traditional mechanical locks, as long as the mechanical structure of the lock is cracked, the lock can be unlocked. For combination locks and fingerprints, the encryption methods of combination locks and fingerprint locks are usually based on their own stored keys. , if th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G07C9/00H04L9/30
Inventor 洪远洋黄何
Owner HAINAN NEWSOFT CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More