CN102821110B - A kind of password method for retrieving for audio/video storage device - Google Patents
A kind of password method for retrieving for audio/video storage device Download PDFInfo
- Publication number
- CN102821110B CN102821110B CN201210325890.4A CN201210325890A CN102821110B CN 102821110 B CN102821110 B CN 102821110B CN 201210325890 A CN201210325890 A CN 201210325890A CN 102821110 B CN102821110 B CN 102821110B
- Authority
- CN
- China
- Prior art keywords
- password
- user
- temporary password
- encryption
- temporary
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention provides a kind of password method for retrieving, the method logs in authentication interactive interface by user, increase the passage that forgets Password, the key of an encryption can be obtained by this passage, this key is dealt into customer service by user, after identity is checked in customer service, secret key decryption is generated an effective temporary password within the time limited by cryptographic algorithm, user is according to this temporary password, and within the effective time, login system revises new password.The present invention has beneficial effect to be because the method realizes password encryption deciphering very flexibly, when not having corresponding hardware supports, can increase password retrieval function.And equipment can be avoided to be considered to malice reset, the system of entering causes the insecurity of user data loss to occur.
Description
Technical field:
The invention belongs to cryptographic calculations and codec domain, be chiefly directed to the method that the password loss in security protection audio/video storage device (as numeral (network) DVR, web camera etc.) is given for change.
Background technology:
Password retrieval function is client when the equipment of use, sets password, but have forgotten and be arranged to what character during use, now will can enter administrator right by another method of putting to certain user, or direct Modify password.Traditional way is: in the hardware circuit board of equipment, increase a reset button, long by the several seconds, restarting equipment, and by the configuration information of the equipment of removing, factory reset, password default when password recovery becomes to dispatch from the factory.
Usually the realization of this method, is based on hardware, and when performing password recovery, can reset all user's configurations, get back to the state before dispatching from the factory, for the equipment that a configuration is complicated, as numeral (network) DVR etc., user is unacceptable.Because configuration parameter is very many, relating to video recording plan, the plan of deploying troops on garrison duty, alarm linkage, channel information, OSD, occlusion area, mobile detection etc., if user needs to reconfigure, will be a very large workload.The most important in addition, reset mode based on hardware, carry out the method for password replacement, cannot differentiate user identity, everybody can operate, a video tape recorder having a significant data, if illegally reset by people, logged in by people's malice, delete video recording or disk format, that will be very serious thing.
Summary of the invention
The object of the invention is: a kind of password method for retrieving is provided, under the reset do not needed based on hardware and the prerequisite not needing replacement user configuration parameter, realize giving for change of password.
The invention provides a kind of password method for retrieving, the method logs in authentication interactive interface by user, increase the passage that forgets Password, the key of an encryption can be obtained by this passage, this key is dealt into customer service by user, after identity is checked in customer service, secret key decryption is generated an effective temporary password within the time limited by cryptographic algorithm, user is according to this temporary password, and within the effective time, login system revises new password.
Further, said method comprising the steps of: 1, the coding step of encryption key; 2, the decoding step of encryption key; 3, the generation step of temporary password; 4, the comparison step of temporary password; 5, administrator's password step is revised.
Further, step 1 comprises following concrete step: 1) create the passage that forgets Password that user logs in authentication interactive interface: at login interactive interface, increase a text hyperlink and enter the acquisition of information interface that forgets Password; 2) by random code and date encryption, encryption key is obtained; 3) encryption key and product ID are sent to customer service by user; 4) temporary password that host computer calculates is waited for.
Further, described step 2) in what adopt is Base64 cryptographic algorithm, by random code and date encryption.
Further, step 2 comprises following concrete steps: 1) input information: create two user's condition entry edit boxes, is used for respectively inputting encryption key and product ID; 2) enabling decryption of encrypted key obtains time value: the encryption key provided according to user, is decrypted with Base64, and thus after secret key decryption, the time value obtained is accurate to sky; 3) judge that whether the time is correct, as correctly entered step 3; If incorrect, re-execute step 2.
Further, step 3 comprises following concrete steps:
1) generation of temporary password; When generating a temporary password, need to bind product ID, use md5 encryption algorithm, encrypted together with equipment Serial Number system data, cipher mode is MD5 (Date+SN), after obtaining 16 byte encrypted result, get wherein 6 bytes, to 10 modulo operations, obtain the character string of Serial No. composition, i.e. temporary password;
2) temporary password is issued the user of equipment end.
Further, step 4 comprises following concrete steps:
1) user obtains the temporary password of host computer by customer service, temporary password is input to equipment end system;
2) sequence number of equipment end system reading device and date, according to these two information, carry out MD5 calculating, get front 8 results, obtain the character string result of 16 systems equally, get the modular arithmetic that every byte carries out 10, obtain identical temporary password;
3) the match is successful then carry out step 5 for temporary password, if unsuccessful, gets back to step 1.
Further, specifically user is after at password, the match is successful for step 5, and entering keeper's new password arranges interface at once, and the password that directly input is new is preserved and exited, and new password is provided with; Second time logs in and can use new password login system.
Further, wherein step Isosorbide-5-Nitrae, 5 realize in equipment end; Step 2,3 realize on host computer.
Further, described method is used for audio/video storage device.
The present invention has beneficial effect to be: because software simulating password encryption deciphering is very flexible, when not having corresponding hardware supports, can increase password retrieval function.And equipment can be avoided to be considered to malice reset, the system of entering causes the insecurity of user data loss to occur.
Accompanying drawing illustrates:
Fig. 1 is present device end workflow diagram;
Fig. 2 is the workflow diagram of host computer of the present invention.
Embodiment:
Below in conjunction with drawings and Examples, the present invention is further described, but content of the present invention is not limited thereto.
Strategy of the present invention logs in authentication interactive interface user, increase the passage that forgets Password, the key of an encryption can be obtained by this passage, this key is dealt into customer service by user, after identity is checked in customer service, secret key decryption is generated an effective temporary password within the time limited by cryptographic algorithm, and user is according to this temporary password, and within the effective time, login system revises new password.Concrete principle is as follows: audio/video storage device (as numeral (network) DVR, there is user and log in interactive interface, can user name U be inputted, and password P; 1) passage that forgets Password that user logs in authentication interactive interface is first created.At each login entrance interactive interface of equipment, comprise local login interface, the webmaster page, client-side management software etc., spare interface, can enter password and give interface for change; 2) at password than increasing temporary password comparison branch in docking port: first comparison process will inquire about input user U in customer data base, if search unsuccessful, return error message; If success, then carry out password comparison; 3) use input password P1 to compare with memory cipher P, if the match is successful for password, return success status, comparison terminates; If it fails to match for password, enter temporary password coupling branch.Wherein temporary password coupling branch realizes being exactly emphasis of the present invention.
The password method for retrieving of realization set forth in the present invention, it comprises the coding of encryption key, the decoding of encryption key, the generation of temporary password, the comparison of temporary password, the step of amendment administrator's password.The present invention is for numeral (network) DVR, and its equipment has local display menu and logs in, and webpage logs in two kinds of forms.Default administrator user name admin.
One, the coding step (equipment end realization) of encryption key:
1) passage that forgets Password that user logs in authentication interactive interface is created: at login interactive interface, increase a text hyperlink [forgetting Password].Mouse is clicked can enter the acquisition of information interface that forgets Password,
2) encryption key is obtained: use Base64 cryptographic algorithm, by random code and date encryption, cipher mode Base64 (Rand+Date), use random code, each encrypted result can be made different, Base64 is a reversible cryptographic algorithm, but will obtain the date, needs first to obtain random code.
Such as, equipment end program, by backstage computing, obtains 3 random codes, as [129],: [2012-08-29] that encrypt random code and date with Base64, the encrypted result obtained (encryption key) is: [129] [MjAxMi0wOC0xMjktMjA=] with current date.
3) encryption key and product ID are sent to customer service by user:
Random code and encryption result information are passed through mail, note by user, or liaison mode sends to enterprise contact staff.As by step 2) in encryption key
[129] [MjAxMi0wOC0xMjktMjA=] and product ID, as [V3060-16CH-2712], issues customer service.
4) temporary password that host computer calculates is waited for.
Two, the decoding step (host computer realization) of encryption key
1) input information: create two user's condition entry edit boxes, be used for respectively inputting encryption key and product ID.
2) enabling decryption of encrypted key obtains time value: the encryption key provided according to user, is decrypted with Base64, obtains the character string of expressly date and random code mixing, as [2012-08-129-29].In character string, namely three bit digital are random code [129], reject the date [2012-08-29] that random code obtains equipment.Thus after secret key decryption, obtain time value expressly, be accurate to sky.
3) judge that whether the time is correct, as correctly entered step 3; If incorrect, re-execute step 2.
Three, the generation step (host computer realization) of temporary password
1) generation of temporary password: when generating a temporary password, need to bind product ID, use md5 encryption algorithm, system data is encrypted together with equipment Serial Number, cipher mode MD5 (Date+SN), after obtaining 16 byte encrypted result, get wherein 6 bytes, to 10 modulo operations, obtain the character string of Serial No. composition, i.e. temporary password.MD5 is a kind of irreversible cryptographic algorithm.
The equipment date [2012-08-29] and product ID [V3060-16CH-2712] that obtain is deciphered according to step 2, carry out the calculation of MD5 yardage, get front 8 results (after abandoning 8 bit data), obtain the character string result [4734dae14bf2ea69] of 16 systems, get the modular arithmetic that every byte carries out 10, obtain temporary password, as [12855245].
2) temporary password is issued the user of equipment end.The interface of wherein host computer has two buttons perform the time value deciphering of step 2 respectively, and the generating cipher of step 3, and two result output boxs are used for output time value and the temporary password result generated respectively.
Four, the comparison step (equipment end realization) of temporary password
1) user obtains the temporary password (as result [12855245]) of host computer by customer service, temporary password is input to equipment end system.
2) sequence number of equipment end system reading device and the date, obtain respectively [V3060-16CH-2712] and [2012-08-29], according to these two information, carrying out and step 3 1) identical MD5 calculates, get front 8 results, obtain the character string result [4734dae14bf2ea69] of 16 systems equally, get the modular arithmetic that every byte carries out 10, obtain identical temporary password [12855245]
3) the match is successful then carries out step 5 for temporary password, if unsuccessful, gets back to step one.
Five, administrator's password step (equipment end realization) is revised
User is after at password, the match is successful, and entering keeper's new password arranges interface at once, and the password that directly input is new is preserved and exited, and new password is provided with.Second time logs in and can use new password login system.
From instantiation, the information after encryption that what user touched from the beginning to the end is all, cannot modify to ageing, and in this example, effective time is 1 day, if slightly made an amendment to time encrypting and decrypting process, can make effective time into 1 hour, 2 hours, or 5 hours, or 2 days.The mode of software simulating has high flexibility, does not need the amendment to hardware completely, therefore, can very easily in systems development process each stage increase this function.
Certainly, there is multiple enforcement in the password method for retrieving that the present invention is based on DVR, such as: can random number be adjusted, or temporary password effective time, or MD5 result of calculation, get other computing and obtain password string etc.In addition, in the present invention, password method for retrieving not only may be used for audio/video storage device, can also be used for other electronic equipment.Only otherwise when deviating from the present invention's spirit and essence, those of ordinary skill in the art can make appropriate change, distortion and optimization according to the demand of oneself, but these apply the protection range of the claim all belonged to appended by the present invention.
Claims (3)
1. the password method for retrieving for audio/video storage device, it is characterized in that, the method logs in authentication interactive interface by user, increase the passage that forgets Password, can be obtained the key of an encryption by this passage, this key is dealt into customer service by user, after identity is checked in customer service, secret key decryption is generated an effective temporary password within the time limited by cryptographic algorithm, and user is according to this temporary password, and within the effective time, login system revises new password;
Said method comprising the steps of: 1, the coding step of encryption key; 2, the decoding step of encryption key; 3, the generation step of temporary password; 4, the comparison step of temporary password; 5, administrator's password step is revised;
Step 1 comprises following concrete step:
1) passage that forgets Password that user logs in authentication interactive interface is created: at login interactive interface, increase a text hyperlink and enter the acquisition of information interface that forgets Password;
2) by random code and date encryption, encryption key is obtained;
3) encryption key and product ID are sent to customer service by user;
4) temporary password that host computer calculates is waited for;
Step 2 comprises following concrete steps:
1) input information: create two user's condition entry edit boxes, be used for respectively inputting encryption key and product ID;
2) enabling decryption of encrypted key obtains time value: the encryption key provided according to user, is decrypted with Base64, and thus after secret key decryption, the time value obtained is accurate to sky;
3) judge that whether the time is correct, as correctly entered step 3; If incorrect, re-execute step 2;
Step 3 comprises following concrete steps:
1) generation of temporary password; When generating a temporary password, need to bind product ID, use md5 encryption algorithm, encrypted together with equipment Serial Number system data, cipher mode is MD5 (Date+SN), after obtaining 16 byte encrypted result, get wherein 6 bytes, to 10 modulo operations, obtain the character string of Serial No. composition, i.e. temporary password;
2) temporary password is issued the user of equipment end;
Step 4 comprises following concrete steps:
1) user obtains the temporary password of host computer by customer service, temporary password is input to equipment end system;
2) sequence number of equipment end system reading device and date, according to these two information, carry out MD5 calculating, get front 8 results, obtain the character string result of 16 systems equally, get the modular arithmetic that every byte carries out 10, obtain identical temporary password;
3) the match is successful then carry out step 5 for temporary password, if unsuccessful, gets back to step 1;
Specifically user is after at password, the match is successful for step 5, and entering keeper's new password arranges interface at once, and the password that directly input is new is preserved and exited, and new password is provided with; Second time logs in can use new password login system.
2. method according to claim 1, is characterized in that, the step 2 in described step 1) in adopt be Base64 cryptographic algorithm, by random code and the date encryption.
3. method according to claim 1, is characterized in that, wherein step Isosorbide-5-Nitrae, and 5 realize in equipment end; Step 2,3 realize on host computer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210325890.4A CN102821110B (en) | 2012-09-06 | 2012-09-06 | A kind of password method for retrieving for audio/video storage device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210325890.4A CN102821110B (en) | 2012-09-06 | 2012-09-06 | A kind of password method for retrieving for audio/video storage device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102821110A CN102821110A (en) | 2012-12-12 |
CN102821110B true CN102821110B (en) | 2016-02-24 |
Family
ID=47304967
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210325890.4A Expired - Fee Related CN102821110B (en) | 2012-09-06 | 2012-09-06 | A kind of password method for retrieving for audio/video storage device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102821110B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP6658163B2 (en) * | 2016-03-18 | 2020-03-04 | 富士ゼロックス株式会社 | Information processing device and program |
CN111049643A (en) * | 2018-10-12 | 2020-04-21 | 浙江宇视科技有限公司 | Method and system for quickly acquiring temporary password |
CN109413449B (en) * | 2018-11-08 | 2021-02-05 | 高斯贝尔数码科技股份有限公司 | Video encryption and decryption method and system |
CN112347458A (en) * | 2019-08-06 | 2021-02-09 | 杭州海康威视数字技术股份有限公司 | Password resetting method and device, terminal equipment and server |
CN113556797A (en) * | 2021-06-29 | 2021-10-26 | 深圳市闪联信息技术有限公司 | Method and system for quickly establishing connection between mobile equipment and large-screen equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1855810A (en) * | 2005-04-26 | 2006-11-01 | 上海盛大网络发展有限公司 | Dynamic code verificating system, method and use |
CN101047503A (en) * | 2006-03-30 | 2007-10-03 | 腾讯科技(深圳)有限公司 | Method and system for fetching cipher |
CN101465735A (en) * | 2008-12-19 | 2009-06-24 | 北京大学 | Network user identification verification method, server and client terminal |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101369893B (en) * | 2008-10-06 | 2010-08-18 | 中国移动通信集团设计院有限公司 | Method for local area network access authentication of casual user |
CN102168509B (en) * | 2011-03-23 | 2013-12-25 | 袁磊 | Dynamic password lock system capable of changing password with date |
-
2012
- 2012-09-06 CN CN201210325890.4A patent/CN102821110B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1855810A (en) * | 2005-04-26 | 2006-11-01 | 上海盛大网络发展有限公司 | Dynamic code verificating system, method and use |
CN101047503A (en) * | 2006-03-30 | 2007-10-03 | 腾讯科技(深圳)有限公司 | Method and system for fetching cipher |
CN101465735A (en) * | 2008-12-19 | 2009-06-24 | 北京大学 | Network user identification verification method, server and client terminal |
Non-Patent Citations (1)
Title |
---|
新浪微博修改任意用户密码;only_guest;《https://www.wooyun.org/bugs/wooyun-2010-09452?1253》;20120711;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN102821110A (en) | 2012-12-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109643285B (en) | Encrypted user data transmission and storage | |
CN108076057B (en) | Data security system and method based on block chain | |
US8245037B1 (en) | Encryption key management | |
CN110798315B (en) | Data processing method and device based on block chain and terminal | |
US10284372B2 (en) | Method and system for secure management of computer applications | |
US9070112B2 (en) | Method and system for securing documents on a remote shared storage resource | |
CN103701829B (en) | A kind of off-line resolves the method for DPAPI encryption data | |
CN103546547B (en) | A kind of cloud storage file encryption system | |
CN111314069B (en) | Block chain-based shaking system and method, electronic device and storage medium | |
CN105740725B (en) | A kind of document protection method and system | |
CN105103488A (en) | Policy enforcement with associated data | |
CN102821110B (en) | A kind of password method for retrieving for audio/video storage device | |
CN105933113A (en) | Secret key backup recovering method and system, and related devices | |
CN102325026A (en) | Account password secure encryption system | |
US8848922B1 (en) | Distributed encryption key management | |
CN106156345B (en) | Item file deposits card method, deposits card equipment and terminal device | |
Peng et al. | Comments on “identity-based distributed provable data possession in multicloud storage” | |
CN112307515A (en) | Database-based data processing method and device, electronic equipment and medium | |
Park et al. | A methodology for the decryption of encrypted smartphone backup data on android platform: A case study on the latest samsung smartphone backup system | |
CN103326856A (en) | Cloud storage data responsibility confirmation structure and method based on two-way digital signature | |
CN107370733A (en) | A kind of intelligent lock management method based on Rijndael and ECC Hybrid Encryptions | |
CN112054890B (en) | Screen configuration file export and import method and device and broadcasting control equipment | |
CN115150193A (en) | Method and system for encrypting sensitive information in data transmission and readable storage medium | |
CN103023855A (en) | Security login system based on hardware parameters of client computer | |
CN111130788B (en) | Data processing method and system, data reading method and iSCSI server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160224 Termination date: 20210906 |