CN106209384A - Use the client terminal of security mechanism and the communication authentication method of charging device - Google Patents

Use the client terminal of security mechanism and the communication authentication method of charging device Download PDF

Info

Publication number
CN106209384A
CN106209384A CN201610566212.5A CN201610566212A CN106209384A CN 106209384 A CN106209384 A CN 106209384A CN 201610566212 A CN201610566212 A CN 201610566212A CN 106209384 A CN106209384 A CN 106209384A
Authority
CN
China
Prior art keywords
client terminal
charging device
sid
server
ciphertext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610566212.5A
Other languages
Chinese (zh)
Other versions
CN106209384B (en
Inventor
辛丹
朱卓敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Mdt Infotech Ltd
Original Assignee
Shanghai Mdt Infotech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Mdt Infotech Ltd filed Critical Shanghai Mdt Infotech Ltd
Priority to CN201610566212.5A priority Critical patent/CN106209384B/en
Publication of CN106209384A publication Critical patent/CN106209384A/en
Application granted granted Critical
Publication of CN106209384B publication Critical patent/CN106209384B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Abstract

The present invention relates to a kind of client terminal using security mechanism and the communication authentication method of charging device, for: client terminal sends at least part of final ciphertext by this client terminal uniquely public key encryption of correspondence by Internet of Things mode to charging device, client terminal receives, by Internet of Things mode, the most legal information of request content that charging device forwards, thus completes communication authentication process.A kind of client terminal using security mechanism and the communication authentication method of charging device, for: after charging device receives the final ciphertext of at least part of public key encryption uniquely corresponding by this client terminal that client terminal sends by Internet of Things mode, it is transmitted to server, charging device forwards the most legal information of the request content that drawn by server by Internet of Things mode to client terminal, thus completes communication authentication process.The present invention utilizes the unique SID of client terminal, PKI, key to the communication authentication realizing between client terminal and charging device, has higher safety.

Description

Use the client terminal of security mechanism and the communication authentication method of charging device
Technical field
The present invention relates to a kind of for realizing the method for communication authentication between client terminal and charging device, especially a kind of Communication authentication method under security mechanism.
Background technology
Existing charging pile solution based on cloud platform comprises Cloud Server platform, charging device and client terminal three Major part.During normal use, first passing through client terminal and be attached with charging device, then charging device passes through net Client terminal information is sent to Cloud Server platform and mates by network;It is laggard that Cloud Server platform receives client terminal information Row authentication and coupling, if success, issue, to charging device, the information that the match is successful, thus complete communication authentication, and fill Electric installation just can carry out the subsequent operation of next step and client terminal after only receiving the information that the match is successful.But in this mistake Cheng Zhong, client terminal is often left in the basket with the safety problem of charging device communication, and network hacker utilizes various leak, to whole logical Letter link is launched a offensive, and causes the leakage of a lot of key message, user and charging device enterprise all can be caused heavy losses.
Summary of the invention
It is an object of the invention to provide and a kind of can improve the safety of communication authentication between client terminal and charging device, Avoid the client terminal of damnous use security mechanism and the communication authentication method of charging device.
For reaching above-mentioned purpose, the technical solution used in the present invention is:
A kind of client terminal using security mechanism and the communication authentication method of charging device, the method is: client terminal passes through Internet of Things mode sends the final ciphertext of at least partly uniquely corresponding by this client terminal public key encryption to charging device, described Client terminal receives, by Internet of Things mode, the most legal information of request content that described charging device forwards, thus completes to lead to Letter verification process;
Wherein, described final ciphertext comprises the unique SID of described client terminal and described request content;Described charging device is by institute Stating final ciphertext and be transmitted to its server connected, described server is deciphered described by the private key that described SID is uniquely corresponding Final ciphertext also judges that described request content is the most legal, and information the most legal for request content is sent to described charging dress Put;Described client terminal, when described server registration, is generated the SID, described of described client terminal by described server correspondence PKI, described private key, the SID of described client terminal, described PKI are sent to described client terminal, described private by described server Key is saved in described server, uses for described communication authentication process.
In such scheme, the unique SID of described client terminal uses described PKI with request time stamp, charge request content Encryption forms one-level ciphertext, and described one-level ciphertext SID unique with described client terminal again is spliced to form described final ciphertext;
Described server splits out the SID spliced in described final ciphertext and finds described private key uniquely corresponding for this SID, logical Cross described private key decipher described one-level ciphertext obtain described request time stamp, described server by the timestamp of himself with described Request time stabs comparison and judges that described request content is the most legal.
Preferably, stab what the phase difference with the timestamp of described server self allowed in threshold value δ when described request time In the range of, then judge that described request content is legal.
Preferably, described client terminal is by the described SID of plaintext character, described request time stamp, described charge request Hold after being converted to plaintext byte stream, use described public key encryption to form one-level ciphertext;
After the plaintext byte circulation deciphering the acquisition of described one-level ciphertext is changed to plaintext character by described server, it is thus achieved that described SID, Described request time stamp, described charge request content.
Described Internet of Things mode is to use the communication mode of any one communication protocol in NFC, bluetooth, zigbee, 433M.
A kind of client terminal using security mechanism and the communication authentication method of charging device, the method is: charging device The final of at least part of public key encryption uniquely corresponding by this client terminal that client terminal sends is received by Internet of Things mode After ciphertext, being transmitted to server, described charging device is forwarded by described server to described client terminal by Internet of Things mode The information that the request content that draws is the most legal, thus complete communication authentication process;
Wherein, described final ciphertext comprises the unique SID of described client terminal and described request content;Described server passes through institute State private key uniquely corresponding for SID to decipher described final ciphertext and to judge that described request content is the most legal, and by request content The most legal information is sent to described charging device;Described client terminal is when described server registration, by described server Corresponding the generation SID of described client terminal, described PKI, described private key, the SID of described client terminal, described PKI are by described Server is sent to described client terminal, and described private key is saved in described server, uses for described communication authentication process.
In such scheme, the unique SID of described client terminal uses described PKI with request time stamp, charge request content Encryption forms one-level ciphertext, and described one-level ciphertext SID unique with described client terminal again is spliced to form described final ciphertext;
Described server splits out the SID spliced in described final ciphertext and finds described private key uniquely corresponding for this SID, logical Cross described private key decipher described one-level ciphertext obtain described request time stamp, described server by the timestamp of himself with described Request time stabs comparison and judges that described request content is the most legal.
Preferably, stab what the phase difference with the timestamp of described server self allowed in threshold value δ when described request time In the range of, then judge that described request content is legal.
Preferably, described client terminal is by the described SID of plaintext character, described request time stamp, described charge request Hold after being converted to plaintext byte stream, use described public key encryption to form one-level ciphertext;
After the plaintext byte circulation deciphering the acquisition of described one-level ciphertext is changed to plaintext character by described server, it is thus achieved that described SID, Described request time stamp, described charge request content.
Described Internet of Things mode is to use the communication mode of any one communication protocol in NFC, bluetooth, zigbee, 433M.
Owing to technique scheme is used, the present invention compared with prior art has the advantage that the present invention utilizes client The unique SID of terminal, PKI, key realize the communication authentication between client terminal and charging device, solve server with And charging device is loaded down with trivial details to the problem of client terminal authentication, the safety problem of transmission and legacy protocol process, speed The problem that rate is slower, has higher safety, is more beneficial for user and obtains good experience.
Accompanying drawing explanation
Accompanying drawing 1 is the composition schematic diagram of electrically-charging equipment.
Accompanying drawing 2 is client terminal register flow path figure.
Accompanying drawing 3 is SID product process figure.
Accompanying drawing 4 is the communication authentication method flow chart of client terminal and charging device.
Accompanying drawing 5 is encryption, deciphering flow chart.
Accompanying drawing 6 is the communication structure figure of client terminal and charging device.
Detailed description of the invention
The invention will be further described for embodiment shown in below in conjunction with the accompanying drawings.
Embodiment one: as shown in Figure 1 by user terminal (usually mobile phone), charging device (charging pile) and server The electrically-charging equipment constituted, is connected with charging device by client terminal user and before being charged, needs user to pass through client Terminal is registered.As shown in Figure 2, owing to client terminal commonly uses mobile phone, therefore register flow path is register flow path:
1) user inputs telephone number in client terminal, and is sent to server;
2) server sends identifying code to Short Message Service Gateway request;
3) identifying code is sent to client terminal by Short Message Service Gateway;
4), after client terminal receives the note containing identifying code, identifying code is sent to server;
5) server completes checking according to the identifying code that client terminal is sent, and creates its unique corresponding SID for new user (Secure ID) and public private key pair (Kpub(Public Key) and Kpri(Private Key)), and by SID and PKI KpubSend To client terminal, and private key KpriThen preserve in the server.
In said process, in order to ensure the safety that Internet of Things communicates, in the stage submitting application for registration with user orientation server to, Design a unique user identification code SID for identification for different user, and be different from normal registration process it Place is, server is the RSA public private key pair that each user generates 2048 new bit, for subsequent user identity Certification and the encryption and decryption of Content of Communication.
In order to ensure the confidentiality of user profile, server can carry out SHA-1 encryption according to the cell-phone number of user, produces 20 The SID of individual byte, the convenient phone number not obtained user in message transmitting procedure by malicious attacker easily.SHA-1 adds Close process is as shown in Figure 3, it is illustrated that in illustrate loop iteration process of SHA-1: A, B, C, D and E are the blocks of 32bit;F is Non-linear variable;< < < n=5 in n(figure, 30) show the figure place of ring shift left, iterative process n is the most different each time;WtIt is this The extension information word of wheel t;KtIt it is the circulation constant of epicycle t;In figure, field, right side word frame represents 32 powers increasing mould 2.In input End input user mobile phone number, encrypts through SHA-1 after carrying out cover, piecemeal, produces the SID of 20 bytes.SHA-1 AES It is irreversible, anti-collision, and there is good avalanche effect, so the SID of the generation after being encrypted by SHA-1 is as user Information transmission between client terminal and server has good confidentiality.The present invention use SHA-1 calculate user's Summary info, both can guarantee that the SID that different user information generates was different, even if in the case of can guarantee that again SID leakage, and Yong Huxin Breath also will not be compromised, thus allows user enjoy higher safety guarantee.
RSA is the most influential current public key encryption algorithm, and it can resist up to the present known most Cryptographic attack, is recommended as public key data encryption standard by ISO.Server firstly generates a pair RSA of 2048 according to SID Key, one of them is privacy key, and also referred to as private key is preserved by server;Another is public-key cryptography, can external disclosure, Also referred to as PKI, is sent jointly to user's client terminal by server together with SID and preserves.RSA Algorithm is a kind of asymmetric Cryptographic algorithm, so-called asymmetric, it is simply that to refer to that this algorithm needs pair of secret keys, use one of them to encrypt, then need to use another Could decipher.At server end, utilize OPENSSL can generate RSA public private key pair:
L generates private key: openssl genrsa-out privatekey.key 2048
L correspondence PKI: openssl rsa-in privatekey.key-pubout-out pubkey.key
Use RSA(asymmetric encryption) rather than AES(symmetric cryptography), it is owing to symmetric cryptography decruption key is identical, obtains it The one of middle encryption key or decruption key can crack and forge all data, the most unfavorable for data transmission security. So the encryption method chosen during RSA transmits as data, and set private key and be merely stored on server, it is possible to prevent a side The identity forgery problem (being more common in man-in-the-middle attack) existed after key exposure.
After completing above-mentioned register flow path, can be communicated with charging device by client terminal, when completing therebetween Communication authentication after, concrete charging instruction can be implemented.
A kind of client terminal using security mechanism and the communication authentication method of charging device, for client terminal, The method is: client terminal sends at least partly uniquely corresponding by this client terminal public affairs by Internet of Things mode to charging device The final ciphertext of key encryption, client terminal receives, by Internet of Things mode, the most legal letter of request content that charging device forwards Breath, thus complete communication authentication process.And for charging device, the method is: a kind of client's end using security mechanism End and the communication authentication method of charging device, the method is: charging device receives what client terminal sent by Internet of Things mode At least partly after the final ciphertext by this client terminal uniquely public key encryption of correspondence, being transmitted to server, charging device passes through Internet of Things mode forwards the most legal information of the request content that drawn by server to client terminal, thus completes communication authentication Process.In said method, final ciphertext comprises the unique SID of client terminal and request content;Final ciphertext is turned by charging device Issuing its server connected, server is deciphered final ciphertext by the private key that SID is uniquely corresponding and is judged that request content is No legal, and information the most legal for request content is sent to charging device;Client terminal is when server registration, by servicing Device correspondence generates the SID of client terminal, PKI, private key, and the SID of client terminal, PKI are sent to client terminal by server, private Key preserves in the server, uses for communication authentication process.Here Internet of Things mode for use NFC, bluetooth, zigbee, The communication mode of any one communication protocol in 433M.
The idiographic flow of the method as shown in Figure 4, comprises the following steps:
1) client terminal is set up Internet of Things with charging device and is connected;
2) after connection establishment, charging device sends OK instruction, and notice client terminal can send order;
3) client terminal uses PKI, by SID, current request time stamp TS(Time Stamp) and charge request content CT (Content) splice with SID after encryption, the data obtained are passed through the connection of Internet of Things communication module, is sent to charging device;
4) charging device is connected by network and user data is transmitted to server judges (passing through HTTPS);
5) server finds respective private keys according to SID, to data deciphering, judges the effective of packet according to request time stamp TS Property/legitimacy (preventing Replay Attack);
6) if request of data is invalid/illegal, server sends the response that request is invalid;If request is effective/legal, service Device returns the effective response of request;
7) charging device performs corresponding operating, and returns result to client terminal.
In the step 3) of said process, the unique SID of client terminal adopts with request time stamp TS, charge request content CT Use PKI KpubEncryption forms one-level ciphertext Kpub(SID, TS, CT), one-level ciphertext Kpub(SID, TS, CT) is whole with client again Unique SID is held to be spliced to form final ciphertext SID | Kpub(SID, TS, CT).Wherein, client terminal is by plaintext character After SID, request time stamp TS, charge request content CT are converted to plaintext byte stream, use PKI KpubEncryption forms one-level ciphertext Kpub(SID, TS, CT), as shown in Figure 5.And in step 5), server splits out final ciphertext SID | Kpub(SID, TS, CT) SID spliced in the private key K finding this SID uniquely correspondencepri, by private key KpriDeciphering one-level ciphertext Kpub(SID, TS, CT) obtain request time stamp TS.Wherein, server will deciphering one-level ciphertext KpubThe plaintext word that (SID, TS, CT) obtains After throttling is converted to plaintext character, it is thus achieved that SID, request time stamp TS, charge request content CT, as shown in Figure 5.Server will The stamp TS comparison of the timestamp of himself and request time and judge that request content is the most legal, upon request between stamp and server The phase difference of the timestamp of self in the range of threshold value δ allows, then judges that request content is legal.
User is securely communicated with charging device by the Internet of Things communication module in client terminal, can ensure that user believes The safety of breath, it is ensured that the confidentiality and integrity of whole communication process.First, user opens the Internet of Things communication mould of client terminal Block (the Internet of Things communication module of client terminal is managed at which and worked under the control of device), searches neighbouring charging device, carries out (the Internet of Things communication module of charging device works under the control of its CPU, and its CPU can also connect Wi-Fi mould in Internet of Things connection Block, its charging device is connected by HTTPS mode with server), if successful connection, then client terminal just could obtain and fill The title of electric installation equipment and address, can communicate, as shown in Figure 6.
Above-mentioned communication authentication method essentially consists in following four aspect for the advantage of safety:
1, subscriber authentication
The SID decrypted is compared by server with the SID splitted out before, if it does, show that transmitting procedure is pacified Entirely, ciphertext is not held as a hostage, and is believable.
2, Brute Force is prevented
2048bit RSA is the one of the safest cipher mode being currently known, if using the calculation being currently known, The mode that can not use Brute Force obtains the communication key of client and server, and 2048bit RSA is also military communication In common a kind of cipher mode.
3, Replay Attack is prevented
During link transmission, comprising current time stamp TS in encrypted fields, data are transferred to by Internet of Things communication module Charging device, then issued server by charging device, after server deciphering, obtain the timestamp in field, and with its temporal Stamp contrasts, if the two difference is less than threshold values δ (δ is determined by network delay and Internet of Things transfer rate), then is judged as closing Method data;Otherwise, for invalid data (attack data).
4, man-in-the-middle attack is prevented
The core of man-in-the-middle attack is to need to set up connection respectively with client and charging device, and can decipher both sides after connecting Communication key, for this type of attack, employ RSA public key encryption, go-between cannot decipher, altered data, can not forge Identity, thus attack invalid.
This communication authentication method is that each user generates different public private key pairs at registration phase, though because pole End situation, unique user PKI leaks, does not interferes with the communication security of other user.Even if client public key leaks, go-between Private key (be saved in service end, and be not handed down to user) cannot be obtained, so the service end that also cannot disguise oneself as, steal user's letter Breath.
In general, in order to ensure the communication security in charging process, charging device be charged operation time needed for Communication authentication step be: click on client terminal and open Internet of Things communication module and be attached being connected with charging device After success, user identity and charge request data are uploaded to by client terminal initiation charge request charging device by network Server server carry out authentication success after under send instructions to charging device user and open charging operations. From above step it can be seen that when user can not pass through network and charging device communicates, Internet of Things also can be passed through Communication module communicates and follow-up operation, process not only simple, speed fast, and safety is higher, is more beneficial for user Obtain good experience.This communication authentication method can be successfully applied on electrically-charging equipment based on cloud platform, can allow new energy Source user vehicle is securely communicated by Internet of Things communication module and charging device, charge confirmation and charging operations.
Above-described embodiment, only for technology design and the feature of the explanation present invention, its object is to allow person skilled in the art Scholar will appreciate that present disclosure and implements according to this, can not limit the scope of the invention with this.All according to the present invention The equivalence that spirit is made changes or modifies, and all should contain within protection scope of the present invention.

Claims (10)

1. the client terminal using security mechanism and the communication authentication method of charging device, it is characterised in that: the method is: Client terminal sends at least partly uniquely corresponding by this client terminal public key encryption by Internet of Things mode to charging device Final ciphertext, described client terminal receives, by Internet of Things mode, the letter that request content that described charging device forwards is the most legal Breath, thus complete communication authentication process;
Wherein, described final ciphertext comprises the unique SID of described client terminal and described request content;Described charging device is by institute Stating final ciphertext and be transmitted to its server connected, described server is deciphered described by the private key that described SID is uniquely corresponding Final ciphertext also judges that described request content is the most legal, and information the most legal for request content is sent to described charging dress Put;Described client terminal, when described server registration, is generated the SID, described of described client terminal by described server correspondence PKI, described private key, the SID of described client terminal, described PKI are sent to described client terminal, described private by described server Key is saved in described server, uses for described communication authentication process.
The client terminal of use security mechanism the most according to claim 1 and the communication authentication method of charging device, it is special Levy and be: the unique SID of described client terminal uses described public key encryption to form one-level with request time stamp, charge request content Ciphertext, described one-level ciphertext SID unique with described client terminal again is spliced to form described final ciphertext;
Described server splits out the SID spliced in described final ciphertext and finds described private key uniquely corresponding for this SID, logical Cross described private key decipher described one-level ciphertext obtain described request time stamp, described server by the timestamp of himself with described Request time stabs comparison and judges that described request content is the most legal.
The client terminal of use security mechanism the most according to claim 2 and the communication authentication method of charging device, it is special Levy and be: when the phase difference of described request time stamp and the timestamp of described server self is in the range of the permission of threshold value δ, then Judge that described request content is legal.
The client terminal of use security mechanism the most according to claim 2 and the communication authentication method of charging device, it is special Levy and be: the described SID of plaintext character, described request time stamp, described charge request Content Transformation are by described client terminal After plaintext byte stream, described public key encryption is used to form one-level ciphertext;
After the plaintext byte circulation deciphering the acquisition of described one-level ciphertext is changed to plaintext character by described server, it is thus achieved that described SID, Described request time stamp, described charge request content.
5. a kind of use the client terminal of security mechanism to recognize with the communication of charging device according to what office in Claims 1-4 was stated Card method, it is characterised in that: described Internet of Things mode is for using any one communication protocol in NFC, bluetooth, zigbee, 433M Communication mode.
6. the client terminal using security mechanism and the communication authentication method of charging device, it is characterised in that: the method is: At least part of PKI uniquely corresponding by this client terminal that charging device receives client terminal transmission by Internet of Things mode adds After close final ciphertext, being transmitted to server, described charging device is forwarded by institute to described client terminal by Internet of Things mode State the information that request content that server draws is the most legal, thus complete communication authentication process;
Wherein, described final ciphertext comprises the unique SID of described client terminal and described request content;Described server passes through institute State private key uniquely corresponding for SID to decipher described final ciphertext and to judge that described request content is the most legal, and by request content The most legal information is sent to described charging device;Described client terminal is when described server registration, by described server Corresponding the generation SID of described client terminal, described PKI, described private key, the SID of described client terminal, described PKI are by described Server is sent to described client terminal, and described private key is saved in described server, uses for described communication authentication process.
The client terminal of use security mechanism the most according to claim 6 and the communication authentication method of charging device, it is special Levy and be: the unique SID of described client terminal uses described public key encryption to form one-level with request time stamp, charge request content Ciphertext, described one-level ciphertext SID unique with described client terminal again is spliced to form described final ciphertext;
Described server splits out the SID spliced in described final ciphertext and finds described private key uniquely corresponding for this SID, logical Cross described private key decipher described one-level ciphertext obtain described request time stamp, described server by the timestamp of himself with described Request time stabs comparison and judges that described request content is the most legal.
The client terminal of use security mechanism the most according to claim 7 and the communication authentication method of charging device, it is special Levy and be: when the phase difference of described request time stamp and the timestamp of described server self is in the range of the permission of threshold value δ, then Judge that described request content is legal.
The client terminal of use security mechanism the most according to claim 7 and the communication authentication method of charging device, it is special Levy and be: the described SID of plaintext character, described request time stamp, described charge request Content Transformation are by described client terminal After plaintext byte stream, described public key encryption is used to form one-level ciphertext;
After the plaintext byte circulation deciphering the acquisition of described one-level ciphertext is changed to plaintext character by described server, it is thus achieved that described SID, Described request time stamp, described charge request content.
10. a kind of use the client terminal of security mechanism to recognize with the communication of charging device according to what office in claim 6 to 9 was stated Card method, it is characterised in that: described Internet of Things mode is for using any one communication protocol in NFC, bluetooth, zigbee, 433M Communication mode.
CN201610566212.5A 2016-07-19 2016-07-19 Use the client terminal of security mechanism and the communication authentication method of charging unit Active CN106209384B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610566212.5A CN106209384B (en) 2016-07-19 2016-07-19 Use the client terminal of security mechanism and the communication authentication method of charging unit

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610566212.5A CN106209384B (en) 2016-07-19 2016-07-19 Use the client terminal of security mechanism and the communication authentication method of charging unit

Publications (2)

Publication Number Publication Date
CN106209384A true CN106209384A (en) 2016-12-07
CN106209384B CN106209384B (en) 2019-09-10

Family

ID=57493156

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610566212.5A Active CN106209384B (en) 2016-07-19 2016-07-19 Use the client terminal of security mechanism and the communication authentication method of charging unit

Country Status (1)

Country Link
CN (1) CN106209384B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108551466A (en) * 2018-03-14 2018-09-18 缤刻普锐(北京)科技有限责任公司 A kind of data processing method and charging unit, data-updating method and system
CN113497812A (en) * 2020-03-18 2021-10-12 瑞昱半导体股份有限公司 Internet of things network networking authentication system and method thereof
WO2023109447A1 (en) * 2021-12-17 2023-06-22 中兴通讯股份有限公司 Nfc wireless charging method and system, and electronic device and readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1790984A (en) * 2004-12-14 2006-06-21 中兴通讯股份有限公司 User identity secret-keeping method in communication system
US20090217027A1 (en) * 2008-02-21 2009-08-27 Zenlok Corporation Safe e-mail for everybody
CN102045340A (en) * 2010-10-15 2011-05-04 国家电网公司 Secure data exchange method and system for electric vehicle and charging and exchanging power station
CN103095704A (en) * 2013-01-15 2013-05-08 杭州华三通信技术有限公司 Trusted medium online validation method and device
CN103929744A (en) * 2014-04-03 2014-07-16 东南大学 Wireless sensor network key management method
CN104022549A (en) * 2014-06-08 2014-09-03 山东天海科技股份有限公司 Intelligent charging access system for electric automobile

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1790984A (en) * 2004-12-14 2006-06-21 中兴通讯股份有限公司 User identity secret-keeping method in communication system
US20090217027A1 (en) * 2008-02-21 2009-08-27 Zenlok Corporation Safe e-mail for everybody
CN102045340A (en) * 2010-10-15 2011-05-04 国家电网公司 Secure data exchange method and system for electric vehicle and charging and exchanging power station
CN103095704A (en) * 2013-01-15 2013-05-08 杭州华三通信技术有限公司 Trusted medium online validation method and device
CN103929744A (en) * 2014-04-03 2014-07-16 东南大学 Wireless sensor network key management method
CN104022549A (en) * 2014-06-08 2014-09-03 山东天海科技股份有限公司 Intelligent charging access system for electric automobile

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108551466A (en) * 2018-03-14 2018-09-18 缤刻普锐(北京)科技有限责任公司 A kind of data processing method and charging unit, data-updating method and system
CN113497812A (en) * 2020-03-18 2021-10-12 瑞昱半导体股份有限公司 Internet of things network networking authentication system and method thereof
WO2023109447A1 (en) * 2021-12-17 2023-06-22 中兴通讯股份有限公司 Nfc wireless charging method and system, and electronic device and readable storage medium

Also Published As

Publication number Publication date
CN106209384B (en) 2019-09-10

Similar Documents

Publication Publication Date Title
US8340288B2 (en) Cryptographic key generation
CN101409619B (en) Flash memory card and method for implementing virtual special network key exchange
FI111115B (en) Method and system for key exchange in a computer network
CN103415008A (en) Encryption communication method and encryption communication system
CN105871920A (en) Communication system and method of terminal and cloud server as well as terminal and cloud server
CN107294937A (en) Data transmission method, client and server based on network service
Mitchell The impact of quantum computing on real-world security: A 5G case study
CN101822082A (en) The technology that is used for safe laneization between UICC and the terminal
CN102315937A (en) The affaris safety trade system of data and method between radio communication device and the server
CN106850207B (en) Identity identifying method and system without CA
JP2000083018A (en) Method for transmitting information needing secrecy by first using communication that is not kept secret
CN104754581A (en) Public key password system based LTE wireless network security certification system
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
CN108599926B (en) HTTP-Digest improved AKA identity authentication system and method based on symmetric key pool
CN103118363A (en) Method, system, terminal device and platform device of secret information transmission
CN104468126A (en) Safety communication system and method
JP2016519873A (en) Establishing secure voice communication using a generic bootstrapping architecture
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
EP3000216B1 (en) Secured data channel authentication implying a shared secret
CN105407109A (en) Data secure transmission method between Bluetooth devices
CN106657085A (en) Data processing method and device and encryption device
KR102219086B1 (en) HMAC-based source authentication and secret key sharing method and system for Unnamed Aerial vehicle systems
CN106209384B (en) Use the client terminal of security mechanism and the communication authentication method of charging unit
CN105554008A (en) User terminal, authentication server, middle server, system and transmission method
CN106992866A (en) It is a kind of based on wireless network access methods of the NFC without certificate verification

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant