CN104767730A - Method for changing intelligent device into credible intelligent device - Google Patents

Method for changing intelligent device into credible intelligent device Download PDF

Info

Publication number
CN104767730A
CN104767730A CN201510103782.6A CN201510103782A CN104767730A CN 104767730 A CN104767730 A CN 104767730A CN 201510103782 A CN201510103782 A CN 201510103782A CN 104767730 A CN104767730 A CN 104767730A
Authority
CN
China
Prior art keywords
smart machine
private key
app
registration
trc
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510103782.6A
Other languages
Chinese (zh)
Inventor
胥寅
张采荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Financial Cloud Service Group Security Technology Co., Ltd.
Original Assignee
SICHUAN NINGCHAO TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SICHUAN NINGCHAO TECHNOLOGY Co Ltd filed Critical SICHUAN NINGCHAO TECHNOLOGY Co Ltd
Priority to CN201510103782.6A priority Critical patent/CN104767730A/en
Publication of CN104767730A publication Critical patent/CN104767730A/en
Pending legal-status Critical Current

Links

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a method for changing an intelligent device into a credible intelligent device. The safety problem of an existing intelligent device is solved. The method comprises the following steps that firstly, installation time or hardware information is encrypted through a recognition code to form a TRC and stored in an APP; secondly, the hardware information or an installation recognition code is read when the APP is started; thirdly, a user scans a QR code and inputs a password logging into the APP; fourthly, the intelligent device reads and verifies the QR code, the installation recognition code is used for unlocking the TRC, and log-on information is encrypted and submitted to an identity authentication system; sixthly, the identity authentication system is encrypted, a secret key is formed and prestored, and the secret key is sent to the intelligent device; seventhly, the intelligent device sends a registration confirmation request to the identity authentication system; eighthly, the identity authentication system receives and unscrambles the registration confirmation information, the registration information is unloaded to an official registration table, and then registration is successful. The intelligent device used in daily life can become a credible device, identity authentication is carried out, and cost is saved.

Description

A kind of smart machine becomes the method for trusted smart machine
Technical field
The present invention relates to a kind of method that smart machine becomes trusted smart machine.
Background technology
Various smart machine from be born, just with its abundant function, friendly cross section, operate easily, and the feature such as carrying mode easily, won extensive acclaim, has captured rapidly market and achieved leapfrogging growth.Along with the progress of technology, new product continues to bring out, and cost performance improves day by day, facilitates a large amount of universal of various intelligent mobile terminal especially, also creates larger impact to the live and work mode of people gradually.
But the login mode of existing smart machine adopts account and password, centre can use the security tool such as certificate, U shield to ensure the safety of communication, and fail safe is lower, cannot meet the demand of current people.
Summary of the invention
The present invention is directed to the safety problem that smart machine exists, improve a kind of method smart machine being become trusted smart machine.
To achieve these goals, the technical solution used in the present invention is as follows:
Smart machine becomes a method for trusted smart machine, comprises the following steps:
(1) download, APP is installed, and generate installation identification code and set-up time;
(2) use installation identification code to encrypt set-up time formation TRC, or the hardware information formation TRC that identification code encrypts smart machine is installed in use;
(3) in configuration file TRC being kept at APP or Keystore;
(4) when starting APP, hardware information need be read or identification code is installed;
(5) the QR code of scanning input registration, and input logs in the password of APP;
(6) smart machine reads checking QR code, and uses installation identification code to unlock TRC;
(7) smart machine encryption submits to log-on message to identity authorization system;
(8) identity authorization system encryption forms private key, and the private key that prestores, send private key to smart machine simultaneously;
(9) smart machine checks private key and preserves private key;
(10) private key is used to generate the OTA confirming registration;
(11) confirmation registration request is sent to identity authorization system by smart machine;
(12) identity authorization system receives and understands this registration confirmation, and log-on message corresponding to unloading is in official register table, namely succeeds in registration;
Wherein, TRC is the packets of information of the encryption containing facility information and hardware information; OTA includes: the authority information of facility information, user profile and correspondence.
In addition, the QR code of QR code for the browser when logging in APP is shown.
When described smart machine is Android version, adopt following steps:
(1) download, APP is installed, and generate installation unique identifier and set-up time;
(2) APP reads mainboard, CPU, the memory information of smart machine;
(3) use installation identification code encryption hardware information formation TRC, if cannot read hardware information, just practical identification code of installing encrypts set-up time formation TRC;
(4) in configuration file TRC being kept at APP or Keystore;
(5) when starting APP, all need to read hardware information;
(6) the QR code of scanning input registration, and input logs in the password of APP;
(7) smart machine reads checking QR code, and uses installation identification code to unlock TRC;
(8) smart machine encryption submits to log-on message to identity authorization system;
(9) identity authorization system encryption forms private key, and the private key that prestores, send private key to smart machine simultaneously;
(10) smart machine checks private key and preserves private key;
(11) private key is used to generate the OTA confirming registration;
(12) confirmation registration request is sent to identity authorization system by smart machine;
(13) identity authorization system receives and understands this registration confirmation, and log-on message corresponding to unloading is in official register table, namely succeeds in registration.
When described smart machine is ISO version, adopt following steps:
(1) download, APP is installed, and generate installation unique identifier and set-up time;
(2) the installation identification code encryption set-up time is used to form TRC;
(3) TRC is kept in Keystore;
(4) when starting APP, all needing to read and identification code is installed;
(5) the QR code of scanning input registration, and input logs in the password of APP;
(6) smart machine reads checking QR code, and uses installation identification code to unlock TRC;
(7) smart machine encryption submits to log-on message to identity authorization system;
(8) identity authorization system encryption forms private key, and the private key that prestores, send private key to smart machine simultaneously;
(9) smart machine checks private key and preserves private key;
(10) private key is used to generate the OTA confirming registration;
(11) confirmation registration request is sent to identity authorization system by smart machine;
(12) identity authorization system receives and understands this registration confirmation, and log-on message corresponding to unloading is in official register table, namely succeeds in registration.
Further, described smart machine is mobile phone or pad.Certainly other portable smart machines also can.
The present invention compared with prior art, has the following advantages and beneficial effect:
The present invention can be real smart machine is become trusted device.Because the information of the information that smart machine uniquely identifies and hardware becomes the part all needing the authorization message of certification at every turn.If user has changed smart machine, and does not notify manager, even if so user has installed APP, conscientiously also cannot pass through.If user lost smart machine, the people finding smart machine also because of the password not logging in APP, and can cannot open APP, thus ensure that information and the property safety of user.
The present invention by smart machine (as mobile phone, flat board etc.) used in everyday for people is become a trusted device, thus carries out authentication, and so a kind of mode is that identity has conscientiously saved cost.Following authentication does not need the new equipment of extra interpolation more just can complete.Such mode also allows user's is simple to operate, and which ID authentication device need be entangled with this uses by mistake, and a conventional smart machine just can settle all authentications.
Embodiment
Below in conjunction with embodiment, the invention will be further described, and embodiments of the present invention include but not limited to the following example.
Embodiment
When user uses the smart machine of Android version, operating procedure is as follows:
(1) APP is downloaded in the website of specifying;
(2) APP is installed;
(3) generation is installed unique identifier by smart machine;
(4) APP will read the information such as mainboard, CPU, internal memory of smart machine at random;
(5) installation identification code encryption hardware information is used to form TRC; If read less than hardware information, the installation identification code encryption set-up time is just used to form TRC;
(6) in the TRC configuration file that is kept at APP or Keystore;
(7), during each startup APP, hardware information is read;
(8) the QR code of scanning input registration, and input logs in the password of APP;
(9) smart machine reads checking QR code;
(10) installation identification code is used to unlock TRC;
(11) smart machine encryption submits to log-on message to identity authorization system;
(12) identity authorization system forms private key according to certain format encryption;
(13) identity authorization system prestores private key, sends private key to smart machine;
(14) smart machine checks private key;
(15) smart machine preserves private key;
(16) private key is used to generate the OTA confirming registration;
(17) confirmation registration request is sent to identity authorization system by smart machine;
(18) identity authorization system receives and understands this registration confirmation;
(19) log-on message that identity authorization system unloading is corresponding is to official register table;
(20) return and succeed in registration.
When user uses the smart machine of ISO version, operating procedure is as follows:
(1) APP is downloaded;
(2) APP is installed;
(3) generation is installed unique identifier and set-up time by smart machine;
(4) the installation unique identifier encryption set-up time is used to form TRC;
(5) TRC is kept in Keystore;
(6), during each startup APP, read and identification code is installed;
(7) the QR code of scanning input registration, and input logs in the password of APP;
(8) smart machine reads checking QR code;
(9) installation identification code is used to unlock TRC;
(10) smart machine encryption submits to log-on message to identity authorization system;
(11) identity authorization system forms private key according to certain format encryption;
(12) identity authorization system prestores private key, sends private key to smart machine;
(13) smart machine checks private key;
(14) smart machine preserves private key;
(15) private key is used to generate the OTA confirming registration;
(16) confirmation registration request is sent to identity authorization system by smart machine;
(17) identity authorization system receives and understands this registration confirmation;
(18) log-on message that identity authorization system unloading is corresponding is to official register table;
(19) return and succeed in registration.
After being registered by above-mentioned register method, namely the smart machine used becomes trusted smart machine, improves the fail safe of smart machine.If user has changed smart machine, and does not notify manager, even if so user has installed APP, certification also cannot have been passed through.If user lost smart machine, the people finding smart machine also because of the password not logging in APP, and can cannot open APP, thus ensure that information and the property safety of user.
According to above-described embodiment, just the present invention can be realized well.What deserves to be explained is; under prerequisite based on said structure design, for solving same technical problem, even if some making on the invention are without substantial change or polishing; the essence of the technical scheme adopted is still the same with the present invention, therefore it also should in protection scope of the present invention.

Claims (4)

1. smart machine becomes a method for trusted smart machine, it is characterized in that, comprises the following steps:
(1) download, APP is installed, and generate installation identification code and set-up time;
(2) use installation identification code to encrypt set-up time formation TRC, or the hardware information formation TRC that identification code encrypts smart machine is installed in use;
(3) in configuration file TRC being kept at APP or Keystore;
(4) when starting APP, hardware information need be read or identification code is installed;
(5) the QR code of scanning input registration, and input logs in the password of APP;
(6) smart machine reads checking QR code, and uses installation identification code to unlock TRC;
(7) smart machine encryption submits to log-on message to identity authorization system;
(8) identity authorization system encryption forms private key, and the private key that prestores, send private key to smart machine simultaneously;
(9) smart machine checks private key and preserves private key;
(10) private key is used to generate the OTA confirming registration;
(11) confirmation registration request is sent to identity authorization system by smart machine;
(12) identity authorization system receives and understands this registration confirmation, and log-on message corresponding to unloading is in official register table, namely succeeds in registration;
Wherein, TRC is the packets of information of the encryption containing facility information and hardware information; OTA includes: the authority information of facility information, user profile and correspondence.
2. a kind of smart machine according to claim 1 becomes the method for trusted smart machine, it is characterized in that, when described smart machine is Android version, adopts following steps:
(1) download, APP is installed, and generate installation unique identifier and set-up time;
(2) APP reads mainboard, CPU, the memory information of smart machine;
(3) use installation identification code encryption hardware information formation TRC, if cannot read hardware information, just practical identification code of installing encrypts set-up time formation TRC;
(4) in configuration file TRC being kept at APP or Keystore;
(5) when starting APP, all need to read hardware information;
(6) the QR code of scanning input registration, and input logs in the password of APP;
(7) smart machine reads checking QR code, and uses installation identification code to unlock TRC;
(8) smart machine encryption submits to log-on message to identity authorization system;
(9) identity authorization system encryption forms private key, and the private key that prestores, send private key to smart machine simultaneously;
(10) smart machine checks private key and preserves private key;
(11) private key is used to generate the OTA confirming registration;
(12) confirmation registration request is sent to identity authorization system by smart machine;
(13) identity authorization system receives and understands this registration confirmation, and log-on message corresponding to unloading is in official register table, namely succeeds in registration.
3. a kind of smart machine according to claim 1 becomes the method for trusted smart machine, it is characterized in that, when described smart machine is ISO version, adopts following steps:
(1) download, APP is installed, and generate installation unique identifier and set-up time;
(2) the installation identification code encryption set-up time is used to form TRC;
(3) TRC is kept in Keystore;
(4) when starting APP, all needing to read and identification code is installed;
(5) the QR code of scanning input registration, and input logs in the password of APP;
(6) smart machine reads checking QR code, and uses installation identification code to unlock TRC;
(7) smart machine encryption submits to log-on message to identity authorization system;
(8) identity authorization system encryption forms private key, and the private key that prestores, send private key to smart machine simultaneously;
(9) smart machine checks private key and preserves private key;
(10) private key is used to generate the OTA confirming registration;
(11) confirmation registration request is sent to identity authorization system by smart machine;
(12) identity authorization system receives and understands this registration confirmation, and log-on message corresponding to unloading is in official register table, namely succeeds in registration.
4. a kind of smart machine according to any one of claims 1 to 3 becomes the method for trusted smart machine, it is characterized in that, described smart machine is mobile phone or pad.
CN201510103782.6A 2015-03-10 2015-03-10 Method for changing intelligent device into credible intelligent device Pending CN104767730A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510103782.6A CN104767730A (en) 2015-03-10 2015-03-10 Method for changing intelligent device into credible intelligent device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510103782.6A CN104767730A (en) 2015-03-10 2015-03-10 Method for changing intelligent device into credible intelligent device

Publications (1)

Publication Number Publication Date
CN104767730A true CN104767730A (en) 2015-07-08

Family

ID=53649339

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510103782.6A Pending CN104767730A (en) 2015-03-10 2015-03-10 Method for changing intelligent device into credible intelligent device

Country Status (1)

Country Link
CN (1) CN104767730A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108320391A (en) * 2017-01-18 2018-07-24 芜湖美的厨卫电器制造有限公司 Unlocking method, system and its equipment of leased equipment
CN111131362A (en) * 2018-11-01 2020-05-08 昆盈企业股份有限公司 Method for sharing configuration file
CN115037451A (en) * 2021-11-19 2022-09-09 荣耀终端有限公司 Data protection method and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101661545A (en) * 2009-09-22 2010-03-03 江汉大学 Anti-pirate method and device for software capable of unloading and reinstalling
US20140112551A1 (en) * 2012-10-18 2014-04-24 Dell Products L.P. Secondary information for an information handling system matrix bar code function
CN104270338A (en) * 2014-09-01 2015-01-07 刘文印 A method and system of electronic identity registration and authentication login

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101661545A (en) * 2009-09-22 2010-03-03 江汉大学 Anti-pirate method and device for software capable of unloading and reinstalling
US20140112551A1 (en) * 2012-10-18 2014-04-24 Dell Products L.P. Secondary information for an information handling system matrix bar code function
CN104270338A (en) * 2014-09-01 2015-01-07 刘文印 A method and system of electronic identity registration and authentication login

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李琛: "《一种基于两层在线身份认证的安全框架体系设计与实现》", 《一种基于两层在线身份认证的安全框架体系设计与实现》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108320391A (en) * 2017-01-18 2018-07-24 芜湖美的厨卫电器制造有限公司 Unlocking method, system and its equipment of leased equipment
CN108320391B (en) * 2017-01-18 2021-03-09 芜湖美的厨卫电器制造有限公司 Unlocking method and system of rental equipment and equipment thereof
CN111131362A (en) * 2018-11-01 2020-05-08 昆盈企业股份有限公司 Method for sharing configuration file
CN115037451A (en) * 2021-11-19 2022-09-09 荣耀终端有限公司 Data protection method and electronic equipment

Similar Documents

Publication Publication Date Title
CN1913427B (en) System and method for encrypted smart card PIN entry
KR20200138108A (en) Apparatus and method for authenticating
CN111783068B (en) Device authentication method, system, electronic device and storage medium
US20130145166A1 (en) System and method for data authentication among processors
CN110995710B (en) Smart home authentication method based on eUICC
KR20120037380A (en) Method for registering a mobile radio in a mobile radio network
CN107733636B (en) Authentication method and authentication system
JP2012530311A5 (en)
CN101742499A (en) Account number protection system for mobile communication equipment terminal and application method thereof
CN101789068B (en) Card reader safety certification device and method
CN112396735B (en) Internet automobile digital key safety authentication method and device
CN103457922A (en) Electronic authentication client-side system, processing method, electronic authentication system and method
CN105827573A (en) System and method for strong authentication of internet of things equipment and related devices
CN109716725B (en) Data security system, method of operating the same, and computer-readable storage medium
CN105656862A (en) Authentication method and device
CN108768941B (en) Method and device for remotely unlocking safety equipment
CN104700479A (en) Door control method based on out-of-band authentication
CN104767730A (en) Method for changing intelligent device into credible intelligent device
CN104796255A (en) A safety certification method, device and system for a client end
EP3358492A1 (en) Electronic device with self-protection and anti-cloning capabilities and related method
CN109639418A (en) A kind of authentication method of configuration information, device and rent-a-car
US20220231841A1 (en) Method, first device, first server, second server and system for accessing a private key
EP2985712A1 (en) Application encryption processing method, apparatus, and terminal
US10984080B2 (en) Method for authenticating a user and a secure module, associated electronic apparatus and system
CN107493572B (en) Wireless radio frequency equipment, authentication server and authentication method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20160608

Address after: 200000, Room 305, 1501-6 Ying Ying Road, Shanghai, Zhabei District

Applicant after: Shanghai Financial Cloud Service Group Security Technology Co., Ltd.

Address before: 610000, No. 1, North 78, purple North Street, Chengdu hi tech Zone, Sichuan, 2

Applicant before: Sichuan Ningchao Technology Co., Ltd.

AD01 Patent right deemed abandoned
AD01 Patent right deemed abandoned

Effective date of abandoning: 20181019