CN102377758A - Identification method and system used for identifying personal area network device - Google Patents

Identification method and system used for identifying personal area network device Download PDF

Info

Publication number
CN102377758A
CN102377758A CN2010102625292A CN201010262529A CN102377758A CN 102377758 A CN102377758 A CN 102377758A CN 2010102625292 A CN2010102625292 A CN 2010102625292A CN 201010262529 A CN201010262529 A CN 201010262529A CN 102377758 A CN102377758 A CN 102377758A
Authority
CN
China
Prior art keywords
network equipment
authentication
personal network
individual
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2010102625292A
Other languages
Chinese (zh)
Other versions
CN102377758B (en
Inventor
姚立哲
陈军
尚国强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201010262529.2A priority Critical patent/CN102377758B/en
Priority to PCT/CN2011/077567 priority patent/WO2012024998A1/en
Publication of CN102377758A publication Critical patent/CN102377758A/en
Application granted granted Critical
Publication of CN102377758B publication Critical patent/CN102377758B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses an identification method used for identifying a personal area network device. The method comprises the steps of: identifying the personal area network device which initiates an interaction request by a personal area network gateway or a personal area network server when the personal area network device requires to perform interaction with the personal area network gateway or the personal area network server; and performing interaction between the personal area network device and the personal area network gateway or the personal area network server after passing of the identification. The invention further discloses an identification system used for identifying the personal area network device, an identification unit is used for identifying the personal area network device which initiates the interaction request by the personal area network gateway or the personal area network server when the personal area network device requires to perform interaction with the personal area network gateway or the personal area network server, and the interaction between the personal area network device and the personal area network gateway or the personal area network server is performed after passing of the identification. By adopting the method and the system disclosed by the invention, personal area network devices can be effectively identified in a personal area network when a large number of personal area network devices exist.

Description

A kind of authentication method and system that personal network equipment is carried out authentication
Technical field
The present invention relates to authentication techniques, relate in particular to the authentication method and the system that in a kind of individual's net personal network equipment are carried out authentication.
Background technology
Along with development of science and technology; People have had increasing personal device, for example mobile phone, notebook computer, PDA, MP3, MP4 or the like, and also the ability of these equipment is also more and more stronger; The ability that has had short haul connection mostly; Therefore People more and more is hoped and can these equipment at one's side be connected together, and forms territory network (PN) one by one, shares each other resource and ability.
Yet; Along with being on the increase of personal network equipment among the PN; How effectively these personal network equipments to be carried out authentication and just become a problem that ten minutes is urgent, there is not effective solution as yet in this problem of at present to how personal network equipment being carried out authentication.
Summary of the invention
In view of this, main purpose of the present invention is to provide a kind of authentication method and system that personal network equipment is carried out authentication, when having a large amount of personal network equipments, can carry out authentication to the personal network equipment in individual's net effectively.
For achieving the above object, technical scheme of the present invention is achieved in that
A kind of authentication method that personal network equipment is carried out authentication, this method comprises:
When personal network equipment need carry out when mutual with individual's gateway or individual network server; Individual's net gateway or individual network server carry out authentication to the said personal network equipment of initiating interactive request, and authentication is carried out through back personal network equipment and individual's net gateway or individual network server alternately.
Wherein, carrying out the mode that said authentication adopts specifically comprises: based on the authentication of key or based on the authentication of digital certificate.
Wherein, said authentication based on key specifically comprises: be the personal network equipment distributing key; In the time of need carrying out authentication, according to key to the personal network equipment authentication.
Wherein, Saidly specifically comprise for the personal network equipment distributing key: individual network server distributes seed for individual's net gateway; Individual's net gateway is that personal network equipment generates random number; Individual's net gateway generates key according to the sign and the random number corresponding of said seed, personal network equipment, gives said personal network equipment with the encryption key distribution that generates;
Said authentication specifically comprises to personal network equipment according to key: after individual network server obtains the sign and random number corresponding of personal network equipment from personal network equipment, calculate key according to the sign and the random number corresponding of said seed, personal network equipment; The key that employing calculates is deciphered the ciphertext of receiving, if decrypted result is consistent with the plaintext comparison of receiving, then authentication is passed through; Wherein, the said ciphertext of receiving is: the ciphertext that adopts the secret key encryption distribute to said personal network equipment to obtain.
Wherein, Saidly specifically comprise for the personal network equipment distributing key: individual network server distributes seed for individual's net gateway; Individual's net gateway is that personal network equipment generates random number; Individual's net gateway generates key according to said seed and random number corresponding, gives said personal network equipment with the encryption key distribution that generates;
Said authentication specifically comprises to personal network equipment according to key: individual network server calculates key according to said seed and said random number after obtaining said random number from personal network equipment; The key that employing calculates is deciphered the ciphertext of receiving, if decrypted result is consistent with the plaintext comparison of receiving, then authentication is passed through; Wherein, the said ciphertext of receiving is: the ciphertext that adopts the secret key encryption distribute to said personal network equipment to obtain.
Wherein, saidly specifically comprise for the personal network equipment distributing key: individual network server is that personal network equipment generates key, and through individual's gateway the key that generates is sent to personal network equipment;
Said authentication specifically comprises to personal network equipment according to key: individual network server is deciphered the ciphertext of receiving according to key, if decrypted result is consistent with the plaintext comparison of receiving, then authentication is passed through; Wherein, the said ciphertext of receiving is: the ciphertext that adopts the secret key encryption distribute to said personal network equipment to obtain.
Wherein, said authentication based on digital certificate specifically comprises: be personal network equipment distribute digital certificate; In the time of need carrying out authentication, according to digital certificate to the personal network equipment authentication.
Wherein, saidly specifically comprise for personal network equipment distribute digital certificate: the just mechanism of third party is said personal network equipment distribute digital certificate through individual network server with individual's net gateway; Comprise the digital signature that the just mechanism of third party adopts the public key encryption received from personal network equipment to obtain in the said digital certificate;
Said authentication specifically comprises to personal network equipment according to digital certificate: individual network server will be transferred to third party notary organization from the digital certificate that said personal network equipment is received; If third party notary organization adopts said PKI can correctly decipher the digital signature in the digital certificate, then authentication is passed through.
A kind of Verification System of personal network equipment being carried out authentication; This system comprises: authentication ' unit; Be used for to carry out when mutual with individual's gateway or individual network server when personal network equipment; Individual's net gateway or individual network server carry out authentication to the said personal network equipment of initiating interactive request, and authentication is carried out through back personal network equipment and individual's net gateway or individual network server alternately.
Wherein, said authentication ' unit is further used for adopting comprising based on the authentication of key or based on the mode of the authentication of digital certificate and carrying out said authentication.
Wherein, said authentication ' unit when being further used for adopting said authentication based on key, is the personal network equipment distributing key; In the time of need carrying out authentication, according to key to the personal network equipment authentication.
Wherein, said authentication ' unit when being further used for adopting said authentication based on digital certificate, is personal network equipment distribute digital certificate; In the time of need carrying out authentication, according to digital certificate to the personal network equipment authentication.
The present invention need carry out when mutual with individual's gateway or individual network server when personal network equipment; Individual's net gateway or individual network server carry out authentication to the personal network equipment of initiating interactive request, and authentication is carried out through back personal network equipment and individual's net gateway or individual network server alternately.
Adopt the present invention, when having a large amount of personal network equipments, can carry out authentication to the personal network equipment in individual's net effectively, thus fail safe and reliability when guaranteeing that each equipment room is mutual in individual's net.
Description of drawings
Fig. 1 is the sketch map that the present invention is based on key authentication;
Fig. 2 is the networking sketch map of the embodiment of the invention one;
Fig. 3 is the networking sketch map of the embodiment of the invention two.
Embodiment
Basic thought of the present invention is: when personal network equipment need carry out when mutual with individual's gateway or individual network server; Individual's net gateway or individual network server carry out authentication to the personal network equipment of initiating interactive request, and authentication is carried out through back personal network equipment and individual's net gateway or individual network server alternately.
Below in conjunction with accompanying drawing the enforcement of technical scheme is done further to describe in detail.
A kind of authentication method that personal network equipment is carried out authentication, this method mainly comprises following content:
Personal network equipment carries out alternately with individual's net gateway, and perhaps personal network equipment carries out alternately through individual's gateway and individual network server;
When personal network equipment need carry out when mutual with individual's gateway or individual network server; Individual's net gateway or individual network server need carry out authentication to this personal network equipment of initiating interactive request, and authentication could continue to carry out alternately with individual's net gateway or individual network server through the back personal network equipment.
Further, authentication comprise authentication based on key, based on the authentication of digital certificate.
Mode one: based on the authentication of key.
For personal network equipment is carried out authentication, individual's net gateway or individual network server need be the personal network equipment distributing key.When needs carried out authentication, the key of the personal network equipment that individual's net gateway or individual network server basis calculate was to the personal network equipment authentication.Wherein, this authentication specifically comprises: the key with the personal network equipment that calculates is deciphered the ciphertext of receiving, if decrypted result is consistent with the plaintext comparison of receiving, then authentication is passed through.The ciphertext of receiving be use before for the secret key encryption of personal network equipment distribution.
As shown in Figure 1, individual network server carries out the content that authentication mainly comprises to personal network equipment and is:
A1. people's network server is the personal network equipment distributing key through individual's gateway.
A2. personal network equipment is initiated interactive request through individual's net gateway to individual network server.
A3. people's network server carries out authentication through individual's gateway to personal network equipment.
A4. personal network equipment responds to individual network server return authentication through individual's net gateway.
Here, the generation of key and distribution comprise: individual network server distributes seed for individual's net gateway; The individual nets gateway according to seed, the sign of random number and personal network equipment, and the key of generation personal network equipment, individual's net gateway is that personal network equipment distributes this key and random number corresponding.
Here, seed is generated by individual network server, and random number is that personal network equipment generates by individual's gateway.
Here; When individual network server carried out authentication through individual's gateway to personal network equipment, personal network equipment need send its sign and random number, and the ciphertext of one section plaintext and the corresponding secret key encryption that employing distributed is to individual network server; Individual's network server calculates the key of this personal network equipment according to this sign and random number and seed; And according to this key the ciphertext of receiving is deciphered, if the result after the deciphering is consistent with the plaintext of receiving, authentication success then.
Here, the generation of key can also comprise with distribution: individual network server distributes seed for individual's net gateway; Individual's net gateway generates the key of personal network equipment according to seed and random number, and individual's net gateway is that personal network equipment distributes this key and random number corresponding.
Here, seed is generated by individual network server, and random number is that personal network equipment generates by individual's gateway.
Here; When individual network server carried out authentication through individual's gateway to personal network equipment, personal network equipment need send this random number, and the ciphertext of one section plaintext and the corresponding secret key encryption that employing distributed is to individual network server; Individual's network server calculates the key of this personal network equipment according to this random number and seed; And according to this key the ciphertext of receiving is deciphered, if the result after the deciphering is consistent with the plaintext of receiving, authentication success then.
Here, the generation of key can also comprise with distribution: individual network server is that personal network equipment generates key, and through individual's gateway this key is sent to personal network equipment.
Here; When individual network server carries out authentication through individual's gateway to personal network equipment; Personal network equipment need send the ciphertext of the one section plaintext and the secret key encryption that employing distributed of correspondence to individual network server; Individual's network server is deciphered the ciphertext of receiving according to this key, if the result after the deciphering is consistent with the plaintext of receiving, and authentication success then.
Here it is to be noted: key should be a continuously effective, but does not also get rid of the possibility that adopts other strategies, and for example one-time pad all adopts different keys when promptly mutual at every turn; Perhaps, regular update key etc.
Mode two: based on the authentication of digital certificate.
For personal network equipment is carried out authentication, it is personal network equipment distribute digital certificate with individual's net gateway that the just mechanism of third party needs through individual network server.When needs carry out authentication, individual net gateway or the service of individual's net according to the digital certificate of personal network equipment to the personal network equipment authentication.
Here, the generation of key and distribution comprise: personal network equipment generates private key and PKI; Personal network equipment sends its PKI to the just mechanism of third party through individual's net gateway and individual network server, and the just mechanism of third party returns CA certificate to this personal network equipment.Individual's network server carries out authentication according to the digital certificate of personal network equipment to personal network equipment.
Below to the present invention's elaboration of giving an example.
Embodiment one: based on the authentication of key.
The networking of present embodiment is as shown in Figure 2, and individual net is made up of individual's gateway, personal network equipment 1, personal network equipment 2; Personal network equipment 1 carries out through individual's gateway and individual network server with personal network equipment 2 alternately.
Identifying procedure based on key may further comprise the steps:
Step 101, individual network server are that individual's net gateway distributes 128 seeds.
Step 102, individual's net gateway are respectively personal network equipment 1 and personal network equipment 2 generation random numbers.
Step 103, individual's net gateway are that personal network equipment 1 generates key according to the sign of personal network equipment 1, the random number and the seed of personal network equipment 1.
Step 104, individual's net gateway will send to personal network equipment 1 for the key that personal network equipment 1 generates.
Step 105, individual's net gateway are that personal network equipment 2 generates key according to the sign of personal network equipment 2, the random number and the seed of personal network equipment 2.
Step 106, individual's net gateway will send to personal network equipment 2 for the key that personal network equipment 2 generates.
Step 107, personal network equipment 1 send interactive request through individual's net gateway to individual network server.
Step 108, individual network server send authentication request through individual's net gateway to personal network equipment 1.
Step 109, personal network equipment 1 are sent its sign, random number and one section plaintext (can be arbitrary content) through individual's net gateway to individual network server, and the ciphertext that generates after to this plain text encryption of the key that distributes with step 104 before.
The sign of the personal network equipment 1 that step 109 is received before step 110, the individual network server basis, the random number of personal network equipment 1, and original 128 seeds calculate key.
Step 111, individual network server are deciphered the ciphertext of personal network equipment 1 according to this key that calculates, and decrypted result and the plaintext of receiving are compared, if consistent, then authentication is passed through.
In the above-mentioned steps, the sequencing relation is arranged between step 103 and the step 104, the sequencing relation is arranged between step 105 and the step 106, but do not have the sequencing relation between these two groups of steps.
Embodiment two: based on the authentication of digital certificate.
The networking of present embodiment is as shown in Figure 3.As shown in Figure 3, individual net is made up of individual's gateway, personal network equipment 1, personal network equipment 2; Personal network equipment 1 carries out alternately through individual's gateway and individual network server with personal network equipment 2; Connect the just mechanism of third party under individual's network server, be used to issue digital certificate.
Identifying procedure based on digital certificate may further comprise the steps:
Step 201, equipment manufacturers are its built-in PKI and private key when producing personal network equipment 1.
Step 202, equipment manufacturers are its built-in PKI and private key when producing personal network equipment 2.
Step 203, personal network equipment 1 send its PKI through individual's net gateway and individual network server to third party notary organization, with the application digital certificate.
Step 204, third party notary organization send digital certificate through individual network server and individual's net gateway to personal network equipment 1.
Here, comprise in this digital certificate with before the digital signature of the public key encryption received of step 203.
Step 205, personal network equipment 2 send its PKI through individual's net gateway and individual network server to third party notary organization, with the application digital certificate.
Step 206, third party notary organization send digital certificate through individual network server and individual's net gateway to personal network equipment 2.
Here, comprise in this digital certificate with before the digital signature of the public key encryption received of step 205.
Step 207, personal network equipment 2 send interactive request through individual's net gateway to individual network server.
Step 208, individual network server send authentication request through individual's net gateway to personal network equipment 2.
Step 209, personal network equipment 2 send its digital certificate through individual's net gateway to individual network server.
Step 210, individual network server are according to digital certificate during to personal network equipment 2 authentications; The digital certificate that step 209 was received before individual's network server was incited somebody to action is transferred to third party notary organization; If the PKI that step 205 was received before third party notary organization used can correctly be deciphered the digital signature in the digital certificate, then authentication is passed through.
In the above-mentioned steps, there is not precedence relationship between step 201 and the step 202;
The sequencing relation is arranged between step 203 and the step 204, the sequencing relation is arranged between step 205 and the step 206, but do not have the sequencing relation between these two groups of steps.
A kind of Verification System of personal network equipment being carried out authentication; This system comprises: authentication ' unit; Authentication ' unit is used for need carrying out when mutual with individual's gateway or individual network server when personal network equipment; Individual's net gateway or individual network server carry out authentication to the personal network equipment of initiating interactive request, and authentication is carried out through back personal network equipment and individual's net gateway or individual network server alternately.
Here, authentication ' unit is further used for adopting and comprises based on the authentication of key or based on the mode of the authentication of digital certificate and carry out authentication.
Here, when authentication ' unit is further used for adopting based on the authentication of key, be the personal network equipment distributing key; In the time of need carrying out authentication, according to key to the personal network equipment authentication.
Here, when authentication ' unit is further used for adopting based on the authentication of digital certificate, be personal network equipment distribute digital certificate; In the time of need carrying out authentication, according to digital certificate to the personal network equipment authentication.
The above is merely preferred embodiment of the present invention, is not to be used to limit protection scope of the present invention.

Claims (12)

1. the authentication method that personal network equipment is carried out authentication is characterized in that, this method comprises:
When personal network equipment need carry out when mutual with individual's gateway or individual network server; Individual's net gateway or individual network server carry out authentication to the said personal network equipment of initiating interactive request, and authentication is carried out through back personal network equipment and individual's net gateway or individual network server alternately.
2. method according to claim 1 is characterized in that, carries out the mode that said authentication adopts and specifically comprises: based on the authentication of key or based on the authentication of digital certificate.
3. method according to claim 2 is characterized in that, said authentication based on key specifically comprises: be the personal network equipment distributing key; In the time of need carrying out authentication, according to key to the personal network equipment authentication.
4. method according to claim 3; It is characterized in that; Saidly specifically comprise for the personal network equipment distributing key: individual network server distributes seed for individual's net gateway; Individual's net gateway is that personal network equipment generates random number, and individual's net gateway generates key according to the sign and the random number corresponding of said seed, personal network equipment, gives said personal network equipment with the encryption key distribution that generates;
Said authentication specifically comprises to personal network equipment according to key: after individual network server obtains the sign and random number corresponding of personal network equipment from personal network equipment, calculate key according to the sign and the random number corresponding of said seed, personal network equipment; The key that employing calculates is deciphered the ciphertext of receiving, if decrypted result is consistent with the plaintext comparison of receiving, then authentication is passed through; Wherein, the said ciphertext of receiving is: the ciphertext that adopts the secret key encryption distribute to said personal network equipment to obtain.
5. method according to claim 3; It is characterized in that; Saidly specifically comprise for the personal network equipment distributing key: individual network server distributes seed for individual's net gateway; Individual's net gateway is that personal network equipment generates random number, and individual's net gateway generates key according to said seed and random number corresponding, gives said personal network equipment with the encryption key distribution that generates;
Said authentication specifically comprises to personal network equipment according to key: individual network server calculates key according to said seed and said random number after obtaining said random number from personal network equipment; The key that employing calculates is deciphered the ciphertext of receiving, if decrypted result is consistent with the plaintext comparison of receiving, then authentication is passed through; Wherein, the said ciphertext of receiving is: the ciphertext that adopts the secret key encryption distribute to said personal network equipment to obtain.
6. method according to claim 3 is characterized in that, saidly specifically comprises for the personal network equipment distributing key: individual network server is that personal network equipment generates key, and through individual's gateway the key that generates is sent to personal network equipment;
Said authentication specifically comprises to personal network equipment according to key: individual network server is deciphered the ciphertext of receiving according to key, if decrypted result is consistent with the plaintext comparison of receiving, then authentication is passed through; Wherein, the said ciphertext of receiving is: the ciphertext that adopts the secret key encryption distribute to said personal network equipment to obtain.
7. method according to claim 2 is characterized in that, said authentication based on digital certificate specifically comprises: be personal network equipment distribute digital certificate; In the time of need carrying out authentication, according to digital certificate to the personal network equipment authentication.
8. method according to claim 7 is characterized in that, saidly specifically comprises for personal network equipment distribute digital certificate: the just mechanism of third party is said personal network equipment distribute digital certificate through individual network server with individual's net gateway; Comprise the digital signature that the just mechanism of third party adopts the public key encryption received from personal network equipment to obtain in the said digital certificate;
Said authentication specifically comprises to personal network equipment according to digital certificate: individual network server will be transferred to third party notary organization from the digital certificate that said personal network equipment is received; If third party notary organization adopts said PKI can correctly decipher the digital signature in the digital certificate, then authentication is passed through.
9. Verification System of personal network equipment being carried out authentication; It is characterized in that; This system comprises: authentication ' unit; Be used for need carrying out when mutual with individual's gateway or individual network server when personal network equipment, individual's net gateway or individual network server carry out authentication to the said personal network equipment of initiating interactive request, and authentication is carried out through back personal network equipment and individual's net gateway or individual network server alternately.
10. system according to claim 9 is characterized in that, said authentication ' unit is further used for adopting comprising based on the authentication of key or based on the mode of the authentication of digital certificate and carrying out said authentication.
11. system according to claim 10 is characterized in that, said authentication ' unit when being further used for adopting said authentication based on key, is the personal network equipment distributing key; In the time of need carrying out authentication, according to key to the personal network equipment authentication.
12. system according to claim 10 is characterized in that, said authentication ' unit when being further used for adopting said authentication based on digital certificate, is personal network equipment distribute digital certificate; In the time of need carrying out authentication, according to digital certificate to the personal network equipment authentication.
CN201010262529.2A 2010-08-24 2010-08-24 A kind of authentication method and system of personal network equipment being carried out to certification Expired - Fee Related CN102377758B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201010262529.2A CN102377758B (en) 2010-08-24 2010-08-24 A kind of authentication method and system of personal network equipment being carried out to certification
PCT/CN2011/077567 WO2012024998A1 (en) 2010-08-24 2011-07-25 Authentication method and system for authenticating personal network apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010262529.2A CN102377758B (en) 2010-08-24 2010-08-24 A kind of authentication method and system of personal network equipment being carried out to certification

Publications (2)

Publication Number Publication Date
CN102377758A true CN102377758A (en) 2012-03-14
CN102377758B CN102377758B (en) 2016-03-30

Family

ID=45722881

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010262529.2A Expired - Fee Related CN102377758B (en) 2010-08-24 2010-08-24 A kind of authentication method and system of personal network equipment being carried out to certification

Country Status (2)

Country Link
CN (1) CN102377758B (en)
WO (1) WO2012024998A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105450419A (en) * 2015-05-05 2016-03-30 北京天诚盛业科技有限公司 Method, device and system
CN105554912A (en) * 2015-12-10 2016-05-04 成都工百利自动化设备有限公司 IOT (Internet of Things) terminal based on virtual SIM/USIM
CN105554913A (en) * 2015-12-10 2016-05-04 成都工百利自动化设备有限公司 Communication chip integrated with virtual SIM/USIM card
CN106161033A (en) * 2015-04-28 2016-11-23 飞天诚信科技股份有限公司 A kind of interactive electronic endorsement method
CN106685644A (en) * 2015-11-10 2017-05-17 阿里巴巴集团控股有限公司 Communication encryption method, apparatus, gateway, server, intelligent terminal and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1801029A (en) * 2004-12-31 2006-07-12 联想(北京)有限公司 Method for generating digital certificate and applying the generated digital certificate
CN101114878A (en) * 2006-07-26 2008-01-30 美国博通公司 Method and system for communication in wireless network
CN101272301A (en) * 2008-05-07 2008-09-24 广州杰赛科技股份有限公司 Safety access method of wireless metropolitan area network
CN101442407A (en) * 2007-11-22 2009-05-27 杭州中正生物认证技术有限公司 Method and system for identification authentication using biology characteristics
CN101488853A (en) * 2009-01-15 2009-07-22 赵建国 Cross-certification method based on seed key management
CN101754089A (en) * 2008-12-17 2010-06-23 中兴通讯股份有限公司 Business realizing method, system and personal network gateway
EP2285040A1 (en) * 2008-05-28 2011-02-16 Beijing E-hengxin Authentication Science & Technology Co. Ltd. Two-factor combined public key generation and authentication method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1801029A (en) * 2004-12-31 2006-07-12 联想(北京)有限公司 Method for generating digital certificate and applying the generated digital certificate
CN101114878A (en) * 2006-07-26 2008-01-30 美国博通公司 Method and system for communication in wireless network
CN101442407A (en) * 2007-11-22 2009-05-27 杭州中正生物认证技术有限公司 Method and system for identification authentication using biology characteristics
CN101272301A (en) * 2008-05-07 2008-09-24 广州杰赛科技股份有限公司 Safety access method of wireless metropolitan area network
EP2285040A1 (en) * 2008-05-28 2011-02-16 Beijing E-hengxin Authentication Science & Technology Co. Ltd. Two-factor combined public key generation and authentication method
CN101754089A (en) * 2008-12-17 2010-06-23 中兴通讯股份有限公司 Business realizing method, system and personal network gateway
CN101488853A (en) * 2009-01-15 2009-07-22 赵建国 Cross-certification method based on seed key management

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106161033A (en) * 2015-04-28 2016-11-23 飞天诚信科技股份有限公司 A kind of interactive electronic endorsement method
CN106161033B (en) * 2015-04-28 2019-03-05 飞天诚信科技股份有限公司 A kind of interactive electronic endorsement method
CN105450419A (en) * 2015-05-05 2016-03-30 北京天诚盛业科技有限公司 Method, device and system
CN105450419B (en) * 2015-05-05 2018-07-27 北京天诚盛业科技有限公司 Improve the methods, devices and systems of biometric identification security
CN106685644A (en) * 2015-11-10 2017-05-17 阿里巴巴集团控股有限公司 Communication encryption method, apparatus, gateway, server, intelligent terminal and system
CN105554912A (en) * 2015-12-10 2016-05-04 成都工百利自动化设备有限公司 IOT (Internet of Things) terminal based on virtual SIM/USIM
CN105554913A (en) * 2015-12-10 2016-05-04 成都工百利自动化设备有限公司 Communication chip integrated with virtual SIM/USIM card

Also Published As

Publication number Publication date
WO2012024998A1 (en) 2012-03-01
CN102377758B (en) 2016-03-30

Similar Documents

Publication Publication Date Title
CN101789865B (en) Dedicated server used for encryption and encryption method
KR20190073472A (en) Method, apparatus and system for transmitting data
CN105162599B (en) A kind of data transmission system and its transmission method
CN105634737B (en) Data transmission method, terminal and system
WO2011159715A3 (en) Key management systems and methods for shared secret ciphers
CN101917710A (en) Method, system and related device for mobile internet encryption communication
CN102394749B (en) Line protection method, system, information safety equipment and application equipment for data transmission
CN101635924B (en) CDMA port-to-port encryption communication system and key distribution method thereof
KR20160112895A (en) Method and apparatus for performing secure bluetooth communication
CN103297403A (en) Method and system for achieving dynamic password authentication
RU2018126780A (en) NETWORK SECURITY COMMUNICATION SYSTEM
CN102036236A (en) Method and device for authenticating mobile terminal
CN102664898A (en) Fingerprint identification-based encrypted transmission method, fingerprint identification-based encrypted transmission device and fingerprint identification-based encrypted transmission system
CN102624522A (en) Key encryption method based on file attribution
GB2512249A (en) Secure peer discovery and authentication using a shared secret
IN2014KN02750A (en)
CN101621794A (en) Method for realizing safe authentication of wireless application service system
CN102082790A (en) Method and device for encryption/decryption of digital signature
CN103781064A (en) Short message verification system and verification method
CN105142134B (en) Parameter acquisition and parameter transmission method and device
CN106953725B (en) Method and system for asymmetric key derivation
CN105447715A (en) Method and apparatus for anti-theft electronic coupon sweeping by cooperating with third party
CN102377758A (en) Identification method and system used for identifying personal area network device
CN107483429B (en) A kind of data ciphering method and device
CN104935441A (en) Authentication method and relevant devices and systems

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160330

Termination date: 20200824