CN106209384A - Use the client terminal of security mechanism and the communication authentication method of charging device - Google Patents
Use the client terminal of security mechanism and the communication authentication method of charging device Download PDFInfo
- Publication number
- CN106209384A CN106209384A CN201610566212.5A CN201610566212A CN106209384A CN 106209384 A CN106209384 A CN 106209384A CN 201610566212 A CN201610566212 A CN 201610566212A CN 106209384 A CN106209384 A CN 106209384A
- Authority
- CN
- China
- Prior art keywords
- client terminal
- charging device
- sid
- server
- ciphertext
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Abstract
The present invention relates to a kind of client terminal using security mechanism and the communication authentication method of charging device, for: client terminal sends at least part of final ciphertext by this client terminal uniquely public key encryption of correspondence by Internet of Things mode to charging device, client terminal receives, by Internet of Things mode, the most legal information of request content that charging device forwards, thus completes communication authentication process.A kind of client terminal using security mechanism and the communication authentication method of charging device, for: after charging device receives the final ciphertext of at least part of public key encryption uniquely corresponding by this client terminal that client terminal sends by Internet of Things mode, it is transmitted to server, charging device forwards the most legal information of the request content that drawn by server by Internet of Things mode to client terminal, thus completes communication authentication process.The present invention utilizes the unique SID of client terminal, PKI, key to the communication authentication realizing between client terminal and charging device, has higher safety.
Description
Technical field
The present invention relates to a kind of for realizing the method for communication authentication between client terminal and charging device, especially a kind of
Communication authentication method under security mechanism.
Background technology
Existing charging pile solution based on cloud platform comprises Cloud Server platform, charging device and client terminal three
Major part.During normal use, first passing through client terminal and be attached with charging device, then charging device passes through net
Client terminal information is sent to Cloud Server platform and mates by network;It is laggard that Cloud Server platform receives client terminal information
Row authentication and coupling, if success, issue, to charging device, the information that the match is successful, thus complete communication authentication, and fill
Electric installation just can carry out the subsequent operation of next step and client terminal after only receiving the information that the match is successful.But in this mistake
Cheng Zhong, client terminal is often left in the basket with the safety problem of charging device communication, and network hacker utilizes various leak, to whole logical
Letter link is launched a offensive, and causes the leakage of a lot of key message, user and charging device enterprise all can be caused heavy losses.
Summary of the invention
It is an object of the invention to provide and a kind of can improve the safety of communication authentication between client terminal and charging device,
Avoid the client terminal of damnous use security mechanism and the communication authentication method of charging device.
For reaching above-mentioned purpose, the technical solution used in the present invention is:
A kind of client terminal using security mechanism and the communication authentication method of charging device, the method is: client terminal passes through
Internet of Things mode sends the final ciphertext of at least partly uniquely corresponding by this client terminal public key encryption to charging device, described
Client terminal receives, by Internet of Things mode, the most legal information of request content that described charging device forwards, thus completes to lead to
Letter verification process;
Wherein, described final ciphertext comprises the unique SID of described client terminal and described request content;Described charging device is by institute
Stating final ciphertext and be transmitted to its server connected, described server is deciphered described by the private key that described SID is uniquely corresponding
Final ciphertext also judges that described request content is the most legal, and information the most legal for request content is sent to described charging dress
Put;Described client terminal, when described server registration, is generated the SID, described of described client terminal by described server correspondence
PKI, described private key, the SID of described client terminal, described PKI are sent to described client terminal, described private by described server
Key is saved in described server, uses for described communication authentication process.
In such scheme, the unique SID of described client terminal uses described PKI with request time stamp, charge request content
Encryption forms one-level ciphertext, and described one-level ciphertext SID unique with described client terminal again is spliced to form described final ciphertext;
Described server splits out the SID spliced in described final ciphertext and finds described private key uniquely corresponding for this SID, logical
Cross described private key decipher described one-level ciphertext obtain described request time stamp, described server by the timestamp of himself with described
Request time stabs comparison and judges that described request content is the most legal.
Preferably, stab what the phase difference with the timestamp of described server self allowed in threshold value δ when described request time
In the range of, then judge that described request content is legal.
Preferably, described client terminal is by the described SID of plaintext character, described request time stamp, described charge request
Hold after being converted to plaintext byte stream, use described public key encryption to form one-level ciphertext;
After the plaintext byte circulation deciphering the acquisition of described one-level ciphertext is changed to plaintext character by described server, it is thus achieved that described SID,
Described request time stamp, described charge request content.
Described Internet of Things mode is to use the communication mode of any one communication protocol in NFC, bluetooth, zigbee, 433M.
A kind of client terminal using security mechanism and the communication authentication method of charging device, the method is: charging device
The final of at least part of public key encryption uniquely corresponding by this client terminal that client terminal sends is received by Internet of Things mode
After ciphertext, being transmitted to server, described charging device is forwarded by described server to described client terminal by Internet of Things mode
The information that the request content that draws is the most legal, thus complete communication authentication process;
Wherein, described final ciphertext comprises the unique SID of described client terminal and described request content;Described server passes through institute
State private key uniquely corresponding for SID to decipher described final ciphertext and to judge that described request content is the most legal, and by request content
The most legal information is sent to described charging device;Described client terminal is when described server registration, by described server
Corresponding the generation SID of described client terminal, described PKI, described private key, the SID of described client terminal, described PKI are by described
Server is sent to described client terminal, and described private key is saved in described server, uses for described communication authentication process.
In such scheme, the unique SID of described client terminal uses described PKI with request time stamp, charge request content
Encryption forms one-level ciphertext, and described one-level ciphertext SID unique with described client terminal again is spliced to form described final ciphertext;
Described server splits out the SID spliced in described final ciphertext and finds described private key uniquely corresponding for this SID, logical
Cross described private key decipher described one-level ciphertext obtain described request time stamp, described server by the timestamp of himself with described
Request time stabs comparison and judges that described request content is the most legal.
Preferably, stab what the phase difference with the timestamp of described server self allowed in threshold value δ when described request time
In the range of, then judge that described request content is legal.
Preferably, described client terminal is by the described SID of plaintext character, described request time stamp, described charge request
Hold after being converted to plaintext byte stream, use described public key encryption to form one-level ciphertext;
After the plaintext byte circulation deciphering the acquisition of described one-level ciphertext is changed to plaintext character by described server, it is thus achieved that described SID,
Described request time stamp, described charge request content.
Described Internet of Things mode is to use the communication mode of any one communication protocol in NFC, bluetooth, zigbee, 433M.
Owing to technique scheme is used, the present invention compared with prior art has the advantage that the present invention utilizes client
The unique SID of terminal, PKI, key realize the communication authentication between client terminal and charging device, solve server with
And charging device is loaded down with trivial details to the problem of client terminal authentication, the safety problem of transmission and legacy protocol process, speed
The problem that rate is slower, has higher safety, is more beneficial for user and obtains good experience.
Accompanying drawing explanation
Accompanying drawing 1 is the composition schematic diagram of electrically-charging equipment.
Accompanying drawing 2 is client terminal register flow path figure.
Accompanying drawing 3 is SID product process figure.
Accompanying drawing 4 is the communication authentication method flow chart of client terminal and charging device.
Accompanying drawing 5 is encryption, deciphering flow chart.
Accompanying drawing 6 is the communication structure figure of client terminal and charging device.
Detailed description of the invention
The invention will be further described for embodiment shown in below in conjunction with the accompanying drawings.
Embodiment one: as shown in Figure 1 by user terminal (usually mobile phone), charging device (charging pile) and server
The electrically-charging equipment constituted, is connected with charging device by client terminal user and before being charged, needs user to pass through client
Terminal is registered.As shown in Figure 2, owing to client terminal commonly uses mobile phone, therefore register flow path is register flow path:
1) user inputs telephone number in client terminal, and is sent to server;
2) server sends identifying code to Short Message Service Gateway request;
3) identifying code is sent to client terminal by Short Message Service Gateway;
4), after client terminal receives the note containing identifying code, identifying code is sent to server;
5) server completes checking according to the identifying code that client terminal is sent, and creates its unique corresponding SID for new user
(Secure ID) and public private key pair (Kpub(Public Key) and Kpri(Private Key)), and by SID and PKI KpubSend
To client terminal, and private key KpriThen preserve in the server.
In said process, in order to ensure the safety that Internet of Things communicates, in the stage submitting application for registration with user orientation server to,
Design a unique user identification code SID for identification for different user, and be different from normal registration process it
Place is, server is the RSA public private key pair that each user generates 2048 new bit, for subsequent user identity
Certification and the encryption and decryption of Content of Communication.
In order to ensure the confidentiality of user profile, server can carry out SHA-1 encryption according to the cell-phone number of user, produces 20
The SID of individual byte, the convenient phone number not obtained user in message transmitting procedure by malicious attacker easily.SHA-1 adds
Close process is as shown in Figure 3, it is illustrated that in illustrate loop iteration process of SHA-1: A, B, C, D and E are the blocks of 32bit;F is
Non-linear variable;< < < n=5 in n(figure, 30) show the figure place of ring shift left, iterative process n is the most different each time;WtIt is this
The extension information word of wheel t;KtIt it is the circulation constant of epicycle t;In figure, field, right side word frame represents 32 powers increasing mould 2.In input
End input user mobile phone number, encrypts through SHA-1 after carrying out cover, piecemeal, produces the SID of 20 bytes.SHA-1 AES
It is irreversible, anti-collision, and there is good avalanche effect, so the SID of the generation after being encrypted by SHA-1 is as user
Information transmission between client terminal and server has good confidentiality.The present invention use SHA-1 calculate user's
Summary info, both can guarantee that the SID that different user information generates was different, even if in the case of can guarantee that again SID leakage, and Yong Huxin
Breath also will not be compromised, thus allows user enjoy higher safety guarantee.
RSA is the most influential current public key encryption algorithm, and it can resist up to the present known most
Cryptographic attack, is recommended as public key data encryption standard by ISO.Server firstly generates a pair RSA of 2048 according to SID
Key, one of them is privacy key, and also referred to as private key is preserved by server;Another is public-key cryptography, can external disclosure,
Also referred to as PKI, is sent jointly to user's client terminal by server together with SID and preserves.RSA Algorithm is a kind of asymmetric
Cryptographic algorithm, so-called asymmetric, it is simply that to refer to that this algorithm needs pair of secret keys, use one of them to encrypt, then need to use another
Could decipher.At server end, utilize OPENSSL can generate RSA public private key pair:
L generates private key: openssl genrsa-out privatekey.key 2048
L correspondence PKI: openssl rsa-in privatekey.key-pubout-out pubkey.key
Use RSA(asymmetric encryption) rather than AES(symmetric cryptography), it is owing to symmetric cryptography decruption key is identical, obtains it
The one of middle encryption key or decruption key can crack and forge all data, the most unfavorable for data transmission security.
So the encryption method chosen during RSA transmits as data, and set private key and be merely stored on server, it is possible to prevent a side
The identity forgery problem (being more common in man-in-the-middle attack) existed after key exposure.
After completing above-mentioned register flow path, can be communicated with charging device by client terminal, when completing therebetween
Communication authentication after, concrete charging instruction can be implemented.
A kind of client terminal using security mechanism and the communication authentication method of charging device, for client terminal,
The method is: client terminal sends at least partly uniquely corresponding by this client terminal public affairs by Internet of Things mode to charging device
The final ciphertext of key encryption, client terminal receives, by Internet of Things mode, the most legal letter of request content that charging device forwards
Breath, thus complete communication authentication process.And for charging device, the method is: a kind of client's end using security mechanism
End and the communication authentication method of charging device, the method is: charging device receives what client terminal sent by Internet of Things mode
At least partly after the final ciphertext by this client terminal uniquely public key encryption of correspondence, being transmitted to server, charging device passes through
Internet of Things mode forwards the most legal information of the request content that drawn by server to client terminal, thus completes communication authentication
Process.In said method, final ciphertext comprises the unique SID of client terminal and request content;Final ciphertext is turned by charging device
Issuing its server connected, server is deciphered final ciphertext by the private key that SID is uniquely corresponding and is judged that request content is
No legal, and information the most legal for request content is sent to charging device;Client terminal is when server registration, by servicing
Device correspondence generates the SID of client terminal, PKI, private key, and the SID of client terminal, PKI are sent to client terminal by server, private
Key preserves in the server, uses for communication authentication process.Here Internet of Things mode for use NFC, bluetooth, zigbee,
The communication mode of any one communication protocol in 433M.
The idiographic flow of the method as shown in Figure 4, comprises the following steps:
1) client terminal is set up Internet of Things with charging device and is connected;
2) after connection establishment, charging device sends OK instruction, and notice client terminal can send order;
3) client terminal uses PKI, by SID, current request time stamp TS(Time Stamp) and charge request content CT
(Content) splice with SID after encryption, the data obtained are passed through the connection of Internet of Things communication module, is sent to charging device;
4) charging device is connected by network and user data is transmitted to server judges (passing through HTTPS);
5) server finds respective private keys according to SID, to data deciphering, judges the effective of packet according to request time stamp TS
Property/legitimacy (preventing Replay Attack);
6) if request of data is invalid/illegal, server sends the response that request is invalid;If request is effective/legal, service
Device returns the effective response of request;
7) charging device performs corresponding operating, and returns result to client terminal.
In the step 3) of said process, the unique SID of client terminal adopts with request time stamp TS, charge request content CT
Use PKI KpubEncryption forms one-level ciphertext Kpub(SID, TS, CT), one-level ciphertext Kpub(SID, TS, CT) is whole with client again
Unique SID is held to be spliced to form final ciphertext SID | Kpub(SID, TS, CT).Wherein, client terminal is by plaintext character
After SID, request time stamp TS, charge request content CT are converted to plaintext byte stream, use PKI KpubEncryption forms one-level ciphertext
Kpub(SID, TS, CT), as shown in Figure 5.And in step 5), server splits out final ciphertext SID | Kpub(SID, TS,
CT) SID spliced in the private key K finding this SID uniquely correspondencepri, by private key KpriDeciphering one-level ciphertext Kpub(SID,
TS, CT) obtain request time stamp TS.Wherein, server will deciphering one-level ciphertext KpubThe plaintext word that (SID, TS, CT) obtains
After throttling is converted to plaintext character, it is thus achieved that SID, request time stamp TS, charge request content CT, as shown in Figure 5.Server will
The stamp TS comparison of the timestamp of himself and request time and judge that request content is the most legal, upon request between stamp and server
The phase difference of the timestamp of self in the range of threshold value δ allows, then judges that request content is legal.
User is securely communicated with charging device by the Internet of Things communication module in client terminal, can ensure that user believes
The safety of breath, it is ensured that the confidentiality and integrity of whole communication process.First, user opens the Internet of Things communication mould of client terminal
Block (the Internet of Things communication module of client terminal is managed at which and worked under the control of device), searches neighbouring charging device, carries out
(the Internet of Things communication module of charging device works under the control of its CPU, and its CPU can also connect Wi-Fi mould in Internet of Things connection
Block, its charging device is connected by HTTPS mode with server), if successful connection, then client terminal just could obtain and fill
The title of electric installation equipment and address, can communicate, as shown in Figure 6.
Above-mentioned communication authentication method essentially consists in following four aspect for the advantage of safety:
1, subscriber authentication
The SID decrypted is compared by server with the SID splitted out before, if it does, show that transmitting procedure is pacified
Entirely, ciphertext is not held as a hostage, and is believable.
2, Brute Force is prevented
2048bit RSA is the one of the safest cipher mode being currently known, if using the calculation being currently known,
The mode that can not use Brute Force obtains the communication key of client and server, and 2048bit RSA is also military communication
In common a kind of cipher mode.
3, Replay Attack is prevented
During link transmission, comprising current time stamp TS in encrypted fields, data are transferred to by Internet of Things communication module
Charging device, then issued server by charging device, after server deciphering, obtain the timestamp in field, and with its temporal
Stamp contrasts, if the two difference is less than threshold values δ (δ is determined by network delay and Internet of Things transfer rate), then is judged as closing
Method data;Otherwise, for invalid data (attack data).
4, man-in-the-middle attack is prevented
The core of man-in-the-middle attack is to need to set up connection respectively with client and charging device, and can decipher both sides after connecting
Communication key, for this type of attack, employ RSA public key encryption, go-between cannot decipher, altered data, can not forge
Identity, thus attack invalid.
This communication authentication method is that each user generates different public private key pairs at registration phase, though because pole
End situation, unique user PKI leaks, does not interferes with the communication security of other user.Even if client public key leaks, go-between
Private key (be saved in service end, and be not handed down to user) cannot be obtained, so the service end that also cannot disguise oneself as, steal user's letter
Breath.
In general, in order to ensure the communication security in charging process, charging device be charged operation time needed for
Communication authentication step be: click on client terminal and open Internet of Things communication module and be attached being connected with charging device
After success, user identity and charge request data are uploaded to by client terminal initiation charge request charging device by network
Server server carry out authentication success after under send instructions to charging device user and open charging operations.
From above step it can be seen that when user can not pass through network and charging device communicates, Internet of Things also can be passed through
Communication module communicates and follow-up operation, process not only simple, speed fast, and safety is higher, is more beneficial for user
Obtain good experience.This communication authentication method can be successfully applied on electrically-charging equipment based on cloud platform, can allow new energy
Source user vehicle is securely communicated by Internet of Things communication module and charging device, charge confirmation and charging operations.
Above-described embodiment, only for technology design and the feature of the explanation present invention, its object is to allow person skilled in the art
Scholar will appreciate that present disclosure and implements according to this, can not limit the scope of the invention with this.All according to the present invention
The equivalence that spirit is made changes or modifies, and all should contain within protection scope of the present invention.
Claims (10)
1. the client terminal using security mechanism and the communication authentication method of charging device, it is characterised in that: the method is:
Client terminal sends at least partly uniquely corresponding by this client terminal public key encryption by Internet of Things mode to charging device
Final ciphertext, described client terminal receives, by Internet of Things mode, the letter that request content that described charging device forwards is the most legal
Breath, thus complete communication authentication process;
Wherein, described final ciphertext comprises the unique SID of described client terminal and described request content;Described charging device is by institute
Stating final ciphertext and be transmitted to its server connected, described server is deciphered described by the private key that described SID is uniquely corresponding
Final ciphertext also judges that described request content is the most legal, and information the most legal for request content is sent to described charging dress
Put;Described client terminal, when described server registration, is generated the SID, described of described client terminal by described server correspondence
PKI, described private key, the SID of described client terminal, described PKI are sent to described client terminal, described private by described server
Key is saved in described server, uses for described communication authentication process.
The client terminal of use security mechanism the most according to claim 1 and the communication authentication method of charging device, it is special
Levy and be: the unique SID of described client terminal uses described public key encryption to form one-level with request time stamp, charge request content
Ciphertext, described one-level ciphertext SID unique with described client terminal again is spliced to form described final ciphertext;
Described server splits out the SID spliced in described final ciphertext and finds described private key uniquely corresponding for this SID, logical
Cross described private key decipher described one-level ciphertext obtain described request time stamp, described server by the timestamp of himself with described
Request time stabs comparison and judges that described request content is the most legal.
The client terminal of use security mechanism the most according to claim 2 and the communication authentication method of charging device, it is special
Levy and be: when the phase difference of described request time stamp and the timestamp of described server self is in the range of the permission of threshold value δ, then
Judge that described request content is legal.
The client terminal of use security mechanism the most according to claim 2 and the communication authentication method of charging device, it is special
Levy and be: the described SID of plaintext character, described request time stamp, described charge request Content Transformation are by described client terminal
After plaintext byte stream, described public key encryption is used to form one-level ciphertext;
After the plaintext byte circulation deciphering the acquisition of described one-level ciphertext is changed to plaintext character by described server, it is thus achieved that described SID,
Described request time stamp, described charge request content.
5. a kind of use the client terminal of security mechanism to recognize with the communication of charging device according to what office in Claims 1-4 was stated
Card method, it is characterised in that: described Internet of Things mode is for using any one communication protocol in NFC, bluetooth, zigbee, 433M
Communication mode.
6. the client terminal using security mechanism and the communication authentication method of charging device, it is characterised in that: the method is:
At least part of PKI uniquely corresponding by this client terminal that charging device receives client terminal transmission by Internet of Things mode adds
After close final ciphertext, being transmitted to server, described charging device is forwarded by institute to described client terminal by Internet of Things mode
State the information that request content that server draws is the most legal, thus complete communication authentication process;
Wherein, described final ciphertext comprises the unique SID of described client terminal and described request content;Described server passes through institute
State private key uniquely corresponding for SID to decipher described final ciphertext and to judge that described request content is the most legal, and by request content
The most legal information is sent to described charging device;Described client terminal is when described server registration, by described server
Corresponding the generation SID of described client terminal, described PKI, described private key, the SID of described client terminal, described PKI are by described
Server is sent to described client terminal, and described private key is saved in described server, uses for described communication authentication process.
The client terminal of use security mechanism the most according to claim 6 and the communication authentication method of charging device, it is special
Levy and be: the unique SID of described client terminal uses described public key encryption to form one-level with request time stamp, charge request content
Ciphertext, described one-level ciphertext SID unique with described client terminal again is spliced to form described final ciphertext;
Described server splits out the SID spliced in described final ciphertext and finds described private key uniquely corresponding for this SID, logical
Cross described private key decipher described one-level ciphertext obtain described request time stamp, described server by the timestamp of himself with described
Request time stabs comparison and judges that described request content is the most legal.
The client terminal of use security mechanism the most according to claim 7 and the communication authentication method of charging device, it is special
Levy and be: when the phase difference of described request time stamp and the timestamp of described server self is in the range of the permission of threshold value δ, then
Judge that described request content is legal.
The client terminal of use security mechanism the most according to claim 7 and the communication authentication method of charging device, it is special
Levy and be: the described SID of plaintext character, described request time stamp, described charge request Content Transformation are by described client terminal
After plaintext byte stream, described public key encryption is used to form one-level ciphertext;
After the plaintext byte circulation deciphering the acquisition of described one-level ciphertext is changed to plaintext character by described server, it is thus achieved that described SID,
Described request time stamp, described charge request content.
10. a kind of use the client terminal of security mechanism to recognize with the communication of charging device according to what office in claim 6 to 9 was stated
Card method, it is characterised in that: described Internet of Things mode is for using any one communication protocol in NFC, bluetooth, zigbee, 433M
Communication mode.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610566212.5A CN106209384B (en) | 2016-07-19 | 2016-07-19 | Use the client terminal of security mechanism and the communication authentication method of charging unit |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610566212.5A CN106209384B (en) | 2016-07-19 | 2016-07-19 | Use the client terminal of security mechanism and the communication authentication method of charging unit |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106209384A true CN106209384A (en) | 2016-12-07 |
CN106209384B CN106209384B (en) | 2019-09-10 |
Family
ID=57493156
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610566212.5A Active CN106209384B (en) | 2016-07-19 | 2016-07-19 | Use the client terminal of security mechanism and the communication authentication method of charging unit |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106209384B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108551466A (en) * | 2018-03-14 | 2018-09-18 | 缤刻普锐(北京)科技有限责任公司 | A kind of data processing method and charging unit, data-updating method and system |
CN113497812A (en) * | 2020-03-18 | 2021-10-12 | 瑞昱半导体股份有限公司 | Internet of things network networking authentication system and method thereof |
WO2023109447A1 (en) * | 2021-12-17 | 2023-06-22 | 中兴通讯股份有限公司 | Nfc wireless charging method and system, and electronic device and readable storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1790984A (en) * | 2004-12-14 | 2006-06-21 | 中兴通讯股份有限公司 | User identity secret-keeping method in communication system |
US20090217027A1 (en) * | 2008-02-21 | 2009-08-27 | Zenlok Corporation | Safe e-mail for everybody |
CN102045340A (en) * | 2010-10-15 | 2011-05-04 | 国家电网公司 | Secure data exchange method and system for electric vehicle and charging and exchanging power station |
CN103095704A (en) * | 2013-01-15 | 2013-05-08 | 杭州华三通信技术有限公司 | Trusted medium online validation method and device |
CN103929744A (en) * | 2014-04-03 | 2014-07-16 | 东南大学 | Wireless sensor network key management method |
CN104022549A (en) * | 2014-06-08 | 2014-09-03 | 山东天海科技股份有限公司 | Intelligent charging access system for electric automobile |
-
2016
- 2016-07-19 CN CN201610566212.5A patent/CN106209384B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1790984A (en) * | 2004-12-14 | 2006-06-21 | 中兴通讯股份有限公司 | User identity secret-keeping method in communication system |
US20090217027A1 (en) * | 2008-02-21 | 2009-08-27 | Zenlok Corporation | Safe e-mail for everybody |
CN102045340A (en) * | 2010-10-15 | 2011-05-04 | 国家电网公司 | Secure data exchange method and system for electric vehicle and charging and exchanging power station |
CN103095704A (en) * | 2013-01-15 | 2013-05-08 | 杭州华三通信技术有限公司 | Trusted medium online validation method and device |
CN103929744A (en) * | 2014-04-03 | 2014-07-16 | 东南大学 | Wireless sensor network key management method |
CN104022549A (en) * | 2014-06-08 | 2014-09-03 | 山东天海科技股份有限公司 | Intelligent charging access system for electric automobile |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108551466A (en) * | 2018-03-14 | 2018-09-18 | 缤刻普锐(北京)科技有限责任公司 | A kind of data processing method and charging unit, data-updating method and system |
CN113497812A (en) * | 2020-03-18 | 2021-10-12 | 瑞昱半导体股份有限公司 | Internet of things network networking authentication system and method thereof |
WO2023109447A1 (en) * | 2021-12-17 | 2023-06-22 | 中兴通讯股份有限公司 | Nfc wireless charging method and system, and electronic device and readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN106209384B (en) | 2019-09-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8340288B2 (en) | Cryptographic key generation | |
CN101409619B (en) | Flash memory card and method for implementing virtual special network key exchange | |
FI111115B (en) | Method and system for key exchange in a computer network | |
CN103415008A (en) | Encryption communication method and encryption communication system | |
CN105871920A (en) | Communication system and method of terminal and cloud server as well as terminal and cloud server | |
CN107294937A (en) | Data transmission method, client and server based on network service | |
Mitchell | The impact of quantum computing on real-world security: A 5G case study | |
CN101822082A (en) | The technology that is used for safe laneization between UICC and the terminal | |
CN102315937A (en) | The affaris safety trade system of data and method between radio communication device and the server | |
CN106850207B (en) | Identity identifying method and system without CA | |
JP2000083018A (en) | Method for transmitting information needing secrecy by first using communication that is not kept secret | |
CN104754581A (en) | Public key password system based LTE wireless network security certification system | |
CN104901935A (en) | Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem) | |
CN108599926B (en) | HTTP-Digest improved AKA identity authentication system and method based on symmetric key pool | |
CN103118363A (en) | Method, system, terminal device and platform device of secret information transmission | |
CN104468126A (en) | Safety communication system and method | |
JP2016519873A (en) | Establishing secure voice communication using a generic bootstrapping architecture | |
CN104901803A (en) | Data interaction safety protection method based on CPK identity authentication technology | |
EP3000216B1 (en) | Secured data channel authentication implying a shared secret | |
CN105407109A (en) | Data secure transmission method between Bluetooth devices | |
CN106657085A (en) | Data processing method and device and encryption device | |
KR102219086B1 (en) | HMAC-based source authentication and secret key sharing method and system for Unnamed Aerial vehicle systems | |
CN106209384B (en) | Use the client terminal of security mechanism and the communication authentication method of charging unit | |
CN105554008A (en) | User terminal, authentication server, middle server, system and transmission method | |
CN106992866A (en) | It is a kind of based on wireless network access methods of the NFC without certificate verification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |