CN107579999A - Authentication method, device and the network equipment of data source equipment - Google Patents

Authentication method, device and the network equipment of data source equipment Download PDF

Info

Publication number
CN107579999A
CN107579999A CN201710977885.4A CN201710977885A CN107579999A CN 107579999 A CN107579999 A CN 107579999A CN 201710977885 A CN201710977885 A CN 201710977885A CN 107579999 A CN107579999 A CN 107579999A
Authority
CN
China
Prior art keywords
mark
source device
packet
clear data
signature value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710977885.4A
Other languages
Chinese (zh)
Inventor
郭刚
宋志华
徐波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANDONG YUWENG INFORMATION TECHNOLOGY Co Ltd
Original Assignee
SHANDONG YUWENG INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANDONG YUWENG INFORMATION TECHNOLOGY Co Ltd filed Critical SHANDONG YUWENG INFORMATION TECHNOLOGY Co Ltd
Priority to CN201710977885.4A priority Critical patent/CN107579999A/en
Publication of CN107579999A publication Critical patent/CN107579999A/en
Pending legal-status Critical Current

Links

Abstract

The invention provides a kind of authentication method, device and the network equipment of data source equipment;Wherein, this method is applied to the network equipment, pre-saves the key matched with the network equipment in the network equipment, method includes:Receive the packet from external network;Parse packet, obtain clear data in packet, signature value and send packet source device mark;Obtain the informative abstract of clear data;Signature value is decrypted according to the mark of source device;According to the informative abstract of decrypted result and clear data, identifying whether for certification source device is legal.Signature value is decrypted by the mark of source device by the present invention, and then the legitimacy of authenticating device, makes the authentication operation of data source equipment more convenient, and cost is relatively low.

Description

Authentication method, device and the network equipment of data source equipment
Technical field
The present invention relates to device authentication technical field, more particularly, to a kind of authentication method of data source equipment, device And the network equipment.
Background technology
The existing network equipment certification based on cryptographic technique usually requires to rely on digital certificate, but under the digital certificate Hair and the operating process of keeping are relatively complicated, and also need to rely on CA (Certificate Authority, in certificate granting The heart) Verification System, the digital certificate of part business needs to continue to pay dues every year.Meanwhile the certification of the network equipment is also relied on CA systems Root certificate and certificate revocation information, cause the development difficulty of the authentication mode of the network equipment larger.
Authentication mode operation for data source equipment in above-mentioned existing network is relatively complicated, and cost is higher asks Topic, not yet proposes effective solution.
The content of the invention
In view of this, it is an object of the invention to provide a kind of authentication method, device and the network of data source equipment to set It is standby, so that the authentication operation of data source equipment is more convenient, and reduce cost.
In a first aspect, the embodiments of the invention provide a kind of authentication method of data source equipment, this method is applied to net Network equipment, the key matched with the network equipment is pre-saved in the network equipment, method includes:Receive the number from external network According to bag;Parse packet, obtain clear data in packet, signature value and send packet source device mark;Obtain Take the informative abstract of clear data;Signature value is decrypted according to the mark of source device;According to decrypted result and plaintext number According to informative abstract, identifying whether for certification source device be legal.
With reference in a first aspect, the embodiments of the invention provide the possible embodiment of the first of first aspect, wherein, on The step of stating the informative abstract for obtaining clear data, including:The information that acquisition clear data is calculated using SM3 hash algorithms is plucked Will, informative abstract includes cryptographic Hash.
With reference in a first aspect, the embodiments of the invention provide the possible embodiment of second of first aspect, wherein, on Stating key includes unsymmetrical key pair;Public key in unsymmetrical key includes the mark of the network equipment;According to the mark of source device The step of signature value is decrypted for knowledge, including:Using the mark of source device as public key, signature value is entered using SM9 algorithms Row decryption, obtains cryptographic Hash corresponding to signature value;The mark of source device includes the MAC Address of source device.
With reference to second of possible embodiment of first aspect, the embodiments of the invention provide the third of first aspect Possible embodiment, wherein, the above-mentioned informative abstract according to decrypted result and clear data, the mark of certification source device is No legal step, including:It is whether consistent with the cryptographic Hash of clear data to compare cryptographic Hash corresponding to signature value;If it is, really The source device for determining packet matches with mark, and mark is legal;If not, do not determine the source device of packet with mark not Match somebody with somebody, mark is illegal.
With reference to second of possible embodiment of first aspect, the embodiments of the invention provide the 4th of first aspect kind Possible embodiment, wherein, the generating process of above-mentioned packet is as follows:Source device obtains clear data;Source device is adopted The cryptographic Hash for obtaining clear data is calculated with SM3 hash algorithms;Private key in the unsymmetrical key that source device passes through preservation, is adopted Cryptographic Hash is signed with SM9 algorithms, obtains signature value;Clear data and signature value are packaged processing, generate data Bag.
Second aspect, the embodiments of the invention provide a kind of authentication device of data source equipment, device is arranged at network Equipment, the key matched with the network equipment is pre-saved in the network equipment, device includes:Receiving module, come from for receiving The packet of external network;Parsing module, for parsing packet, obtain clear data, signature value and the transmission in packet The mark of the source device of packet;Summary acquisition module, for obtaining the informative abstract of clear data;Deciphering module, it is used for Signature value is decrypted according to the mark of source device;Authentication module, for the information according to decrypted result and clear data Summary, identifying whether for certification source device are legal.
With reference to second aspect, the embodiments of the invention provide the possible embodiment of the first of second aspect, wherein, on Summary acquisition module is stated, is additionally operable to:The informative abstract for obtaining clear data is calculated using SM3 hash algorithms, informative abstract includes Cryptographic Hash.
With reference to second aspect, the embodiments of the invention provide the possible embodiment of second of second aspect, wherein, on Stating key includes unsymmetrical key pair;Public key in unsymmetrical key includes the mark of the network equipment;Deciphering module is additionally operable to:Will The mark of source device is decrypted to signature value using SM9 algorithms as public key, obtains cryptographic Hash corresponding to signature value;Come The mark of source device includes the MAC Address of source device.
With reference to second of possible embodiment of second aspect, the embodiments of the invention provide the third of second aspect Possible embodiment, wherein, above-mentioned authentication module, including:Compare the Hash of cryptographic Hash and clear data corresponding to signature value Whether value is consistent;If it is, determining that the source device of packet matches with mark, mark is legal;If not, determine packet Source device mismatches with mark, and mark is illegal.
The third aspect, the embodiments of the invention provide a kind of network equipment, including processor and machinable medium, Machinable medium is stored with the machine-executable instruction that can be executed by processor, and computing device machine is executable to be referred to Make to realize the authentication method of above-mentioned data source equipment.
The embodiment of the present invention brings following beneficial effect:
Authentication method, device and the network equipment of a kind of data source equipment provided in an embodiment of the present invention, pass through parsing Packet from external network, clear data, signature value and the source device for sending packet in packet can be obtained Mark;The decrypted result that signature value is decrypted according to the mark of the informative abstract of clear data and source device, can be with Identifying whether for certification source device is legal;In which, signature value is decrypted by the mark of source device, and then recognizes The legitimacy of equipment is demonstrate,proved, makes the authentication operation of data source equipment more convenient, and cost is relatively low.
Other features and advantages of the present invention will illustrate in the following description, or, Partial Feature and advantage can be with Deduce from specification or unambiguously determine, or the above-mentioned technology by implementing the present invention can be learnt.
To enable the above objects, features and advantages of the present invention to become apparent, better embodiment cited below particularly, and match somebody with somebody Accompanying drawing appended by conjunction, is described in detail below.
Brief description of the drawings
, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical scheme of the prior art The required accompanying drawing used is briefly described in embodiment or description of the prior art, it should be apparent that, in describing below Accompanying drawing is some embodiments of the present invention, for those of ordinary skill in the art, before creative work is not paid Put, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of flow chart of the authentication method of data source equipment provided in an embodiment of the present invention;
Fig. 2 is the flow chart of the authentication method of another data source equipment provided in an embodiment of the present invention;
Fig. 3 is a kind of structural representation of the authentication device of data source equipment provided in an embodiment of the present invention;
Fig. 4 is a kind of structural representation of the network equipment provided in an embodiment of the present invention.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with accompanying drawing to the present invention Technical scheme be clearly and completely described, it is clear that described embodiment is part of the embodiment of the present invention, rather than Whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not making creative work premise Lower obtained every other embodiment, belongs to the scope of protection of the invention.
Authentication mode operation in view of data source equipment in existing network is relatively complicated, and cost is higher asks Topic, a kind of authentication method, device and the network equipment of data source equipment provided in an embodiment of the present invention;The technology can be applied In network equipments such as interchanger, trunking, gateway device, terminal devices, source device certification is carried out to the data received During;The technology can use related software or hardware to realize, be described below by embodiment.
A kind of flow chart of the authentication method of data source equipment shown in Figure 1, this method are applied to the network equipment, The key matched with the network equipment is pre-saved in the network equipment;When actually realizing, a key management can be established System, the server of the key management system issue the key to match to each network equipment;
This method comprises the following steps:
Step S102, receive the packet from external network;
Step S104, packet is parsed, the source for obtaining the clear data in packet, signature value and transmission packet is set Standby mark;
The packet can be encapsulated by other network equipments, and be sent to the network equipment;For example, when the network equipment is During switch A, the switch A is connected with switch b;After switch b is packaged to data, packet is generated, and this is counted Sent according to bag to switch A;Now, switch b can be described as above-mentioned source device, and source device friendship is carried in the packet Change planes B mark, for example, the IP address of source device, MAC Address or other numbers etc. the source device can be existed with unique mark The information of identity in network.Above-mentioned source device can also be the terminal devices such as server, user terminal.
Step S106, obtain the informative abstract of clear data;
Step S108, signature value is decrypted according to the mark of source device;
Step S110, according to the informative abstract of decrypted result and clear data, identifying whether for certification source device is legal.
Specifically, when decrypted result is consistent with the informative abstract of clear data, it is above-mentioned for can confirm that above-mentioned packet Source device is sent, and packet is not changed;When the informative abstract of decrypted result and clear data is inconsistent, illustrate above-mentioned Packet is not source device, i.e., the mark of above-mentioned source device is inaccurate, or packet is changed.
The authentication method of a kind of data source equipment provided in an embodiment of the present invention, by parsing the number from external network According to bag, can obtain the clear data in packet, signature value and send packet source device mark;According to plaintext number According to informative abstract and source device mark decrypted result that signature value is decrypted, the mark of source device can be authenticated It is whether legal;In which, signature value is decrypted by the mark of source device, and then the legitimacy of authenticating device, make The authentication operation of data source equipment is more convenient, and cost is relatively low.
The flow chart of the authentication method of another data source equipment shown in Figure 2, this method are shown in Fig. 1 Realized on the basis of the authentication method of data source equipment;This method is applied to the network equipment, has been pre-saved in the network equipment The unsymmetrical key pair matched with the network equipment;Public key in unsymmetrical key includes the mark of the network equipment;From the foregoing, The mark of the network equipment can be that IP address, MAC Address or other numbers etc. can be with the unique mark source devices in a network The information of identity;In the present embodiment, by the network equipment be identified as the MAC Address of the network equipment exemplified by illustrate, i.e., it is above-mentioned Public key in unsymmetrical key is the MAC Address of the network equipment.
When actually realizing, a key management system can be established, the server of the key management system is to each net Network equipment issues the key to match;In the present embodiment, illustrated by taking SM9 key management systems as an example.In this method, by counting According to source device and the network equipment interaction realize;The source device of the data can also be a kind of network equipment;That is, network In each network equipment can as the source device of data, when receiving the packet of other network equipments transmission, The source device of the packet can also be authenticated, certification is finished and certification is by rear, then clear data is packaged into number According to bag, send to other network equipments.
This method comprises the following steps:
Step S202, source device obtain clear data;
When actually realizing, when the source device is the terminal device in network, the clear data can be that user is defeated The data entered;When the source device is the equipment such as interchanger, gateway, the clear data can be source device to receiving After packet is parsed, the data of acquisition.
Step S204, source device calculate the cryptographic Hash for obtaining clear data using SM3 hash algorithms;
The cryptographic Hash is referred to as HASH values;The cryptographic Hash is that the clear data calculates acquisition by SM3 hash algorithms Regular length binary value;Cryptographic Hash corresponds with clear data, i.e. if the clear data changes, the Kazakhstan Uncommon value can also change therewith.
Step S206, the private key in the unsymmetrical key that source device passes through preservation, cryptographic Hash is carried out using SM9 algorithms Signature, obtains signature value;SM9 algorithms are one kind in national secret algorithm;
Clear data and signature value are packaged processing by step S208, source device, generate packet.
Step S210, the network equipment receive the packet from source device;
Step S212, network equipment parsing packet, obtain the clear data in packet, signature value and send packet Source device mark;In the embodiment, the mark of the source device includes the MAC Address of source device;
Step S214, the network equipment calculate the informative abstract for obtaining clear data, the informative abstract using SM3 hash algorithms Including cryptographic Hash.SM3 algorithms are another national secret algorithms.
Step S216, the network equipment are solved using the mark of source device as public key using SM9 algorithms to signature value It is close, obtain cryptographic Hash corresponding to signature value;The mark of the source device includes the MAC Address of source device.
Step S218, whether the network equipment compares cryptographic Hash corresponding to signature value consistent with the cryptographic Hash of clear data;Such as Fruit is to perform step S220;If not, perform step S222;
Step S220, determine that the source device of packet matches with mark, mark is legal;
Step S222, the source device and mark for determining packet mismatch, and mark is illegal.
Generally, digital signature is a kind of cryptographic technique that can be verified;The digital signature of file is to be based on file and signature The information of person's private key, completed by Hash functions and private key signature function.Digital Signature Algorithm includes signature algorithm With verification algorithm two parts;Wherein, signature algorithm includes:Data are become fixed big by signer by HASH (hash) functions It is small, HASH values are generated, signature operation is just carried out to HASH values by private key, generates signature value;Verification algorithm includes:Verifier is led to Cross HASH (hash) functions and data are become fixed size, generate HASH values;Then, verifier checks the HASH values and signature value In HASH values it is whether consistent, to determine whether data were modified.
A kind of authentication method of data source equipment provided in an embodiment of the present invention, the source device of data are miscellaneous by SM3 The algorithm that gathers obtains the cryptographic Hash of clear data, and obtains signature value by private key and SM9 algorithms, and data are generated after encapsulation process Bag;After the network equipment is to resolve packet, the cryptographic Hash of clear data is obtained by SM3 hash algorithms, and passes through source device Mark and SM9 algorithms obtain cryptographic Hash corresponding to signature value;According to Hash corresponding to the cryptographic Hash of clear data and signature value Value, can authenticate source device identify whether it is legal;In which, signature value is solved by the mark of source device It is close, and then the legitimacy of authenticating device, make the authentication operation of data source equipment more convenient, and cost is relatively low.
Corresponding to above method embodiment, a kind of structure of the authentication device of data source equipment shown in Figure 3 is shown It is intended to;The device is arranged at the network equipment, and the key matched with the network equipment is pre-saved in the network equipment, the device bag Include such as lower part:
Receiving module 30, for receiving the packet from external network;
Parsing module 31, for parsing packet, obtain the clear data in packet, signature value and send packet The mark of source device;
Summary acquisition module 32, for obtaining the informative abstract of clear data;
Deciphering module 33, signature value is decrypted for the mark according to source device;
Authentication module 34, for the informative abstract according to decrypted result and clear data, the mark of certification source device is It is no legal.
The authentication device of a kind of data source equipment provided in an embodiment of the present invention, by parsing the number from external network According to bag, can obtain the clear data in packet, signature value and send packet source device mark;According to plaintext number According to informative abstract and source device mark decrypted result that signature value is decrypted, the mark of source device can be authenticated It is whether legal;In which, signature value is decrypted by the mark of source device, and then the legitimacy of authenticating device, make The authentication operation of data source equipment is more convenient, and cost is relatively low.
Further, above-mentioned summary acquisition module, is additionally operable to:The letter for obtaining clear data is calculated using SM3 hash algorithms Breath summary, informative abstract include cryptographic Hash.
Further, above-mentioned key includes unsymmetrical key pair;Public key in unsymmetrical key includes the mark of the network equipment Know;Deciphering module is additionally operable to:Using the mark of source device as public key, signature value is decrypted using SM9 algorithms, signed The cryptographic Hash that name-value pair is answered;The mark of source device includes the MAC Address of source device.
Further, above-mentioned authentication module, including:Comparing cryptographic Hash corresponding to signature value and the cryptographic Hash of clear data is It is no consistent;If it is, determining that the source device of packet matches with mark, mark is legal;If not, determine the source of packet Equipment mismatches with mark, and mark is illegal.
A kind of structural representation of network equipment shown in Figure 4;The equipment includes memory 100 and processor 101; Wherein, memory 100 is used to store one or more computer instruction, and one or more computer instruction is executed by processor, To realize the authentication method of above-mentioned data source equipment, the authentication method of the data source equipment can include in above method It is one or more.
Further, the network equipment shown in Fig. 4 also includes bus 102 and communication interface 103, processor 101, communication interface 103 and memory 100 connected by bus 102.
Wherein, memory 100 may include high-speed random access memory (RAM, Random Access Memory), Non-labile memory (non-volatile memory), for example, at least a magnetic disk storage may also be included.By extremely A few communication interface 103 (can be wired or wireless) is realized logical between the system network element and at least one other network element Letter connection, can use internet, wide area network, LAN, Metropolitan Area Network (MAN) etc..Bus 102 can be isa bus, pci bus or Eisa bus etc..The bus can be divided into address bus, data/address bus, controlling bus etc..For ease of representing, only used in Fig. 4 One four-headed arrow represents, it is not intended that an only bus or a type of bus.
Processor 101 is probably a kind of IC chip, has the disposal ability of signal.It is above-mentioned in implementation process Each step of method can be completed by the integrated logic circuit of the hardware in processor 101 or the instruction of software form.On The processor 101 stated can be general processor, including central processing unit (Central Processing Unit, referred to as CPU), network processing unit (Network Processor, abbreviation NP) etc.;It can also be digital signal processor (Digital Signal Processing, abbreviation DSP), application specific integrated circuit (Application Specific Integrated Circuit, abbreviation ASIC), ready-made programmable gate array (Field-Programmable Gate Array, abbreviation FPGA) or Person other PLDs, discrete gate or transistor logic, discrete hardware components.It can realize or perform sheet Disclosed each method, step and logic diagram in invention embodiment.General processor can be microprocessor or this at It can also be any conventional processor etc. to manage device.The step of method with reference to disclosed in embodiment of the present invention, can direct body Completion now is performed for hardware decoding processor, or completion is performed with the hardware in decoding processor and software module combination.It is soft Part module can be located at random access memory, and flash memory, read-only storage, programmable read only memory or electrically erasable programmable are deposited In the ripe storage medium in this areas such as reservoir, register.The storage medium is located at memory 100, and processor 101 reads storage Information in device 100, with reference to its hardware complete aforementioned embodiments method the step of.
The computer of the authentication method of data source equipment that the embodiment of the present invention is provided a kind of, device and the network equipment Program product, including the computer-readable recording medium of program code is stored, the instruction that described program code includes can be used for The method described in previous methods embodiment is performed, specific implementation can be found in embodiment of the method, will not be repeated here.
If the function is realized in the form of SFU software functional unit and is used as independent production marketing or in use, can be with It is stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words The part to be contributed to prior art or the part of the technical scheme can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, including some instructions are causing a computer equipment (can be People's computer, server, or network equipment etc.) perform all or part of step of each embodiment methods described of the present invention. And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with the medium of store program codes.
Finally it should be noted that:Embodiment described above, it is only the embodiment of the present invention, to illustrate the present invention Technical scheme, rather than its limitations, protection scope of the present invention is not limited thereto, although with reference to the foregoing embodiments to this hair It is bright to be described in detail, it will be understood by those within the art that:Any one skilled in the art The invention discloses technical scope in, it can still modify to the technical scheme described in previous embodiment or can be light Change is readily conceivable that, or equivalent substitution is carried out to which part technical characteristic;And these modifications, change or replacement, do not make The essence of appropriate technical solution departs from the spirit and scope of technical scheme of the embodiment of the present invention, should all cover the protection in the present invention Within the scope of.Therefore, protection scope of the present invention described should be defined by scope of the claims.

Claims (10)

1. a kind of authentication method of data source equipment, it is characterised in that methods described is applied to the network equipment, and the network is set The key matched with the network equipment is pre-saved in standby, methods described includes:
Receive the packet from external network;
The packet is parsed, obtains the clear data in the packet, signature value and send the source of the packet setting Standby mark;
Obtain the informative abstract of the clear data;
The signature value is decrypted according to the mark of the source device;
According to the informative abstract of decrypted result and the clear data, identifying whether for source device described in certification is legal.
2. according to the method for claim 1, it is characterised in that the step of the informative abstract for obtaining the clear data Suddenly, including:
The informative abstract for obtaining the clear data is calculated using SM3 hash algorithms, described information summary includes cryptographic Hash.
3. according to the method for claim 1, it is characterised in that the key includes unsymmetrical key pair;It is described asymmetric Public key in key includes the mark of the network equipment;
The step of signature value is decrypted the mark according to the source device, including:By the source device Mark as public key, the signature value is decrypted using SM9 algorithms, obtains cryptographic Hash corresponding to the signature value;Institute Stating the mark of source device includes the MAC Address of the source device.
4. according to the method for claim 3, it is characterised in that the information according to decrypted result and the clear data Summary, source device described in certification identify whether legal step, including:
It is whether consistent with the cryptographic Hash of the clear data to compare cryptographic Hash corresponding to the signature value;
If it is, determining that the source device of the packet matches with the mark, the mark is legal;
If not, determining that the source device of the packet and the mark mismatch, the mark is illegal.
5. according to the method for claim 3, it is characterised in that the generating process of the packet is as follows:
The source device obtains clear data;
The source device calculates the cryptographic Hash for obtaining the clear data using SM3 hash algorithms;
Private key in the unsymmetrical key that the source device passes through preservation, the cryptographic Hash is signed using SM9 algorithms, Obtain signature value;
The clear data and the signature value are packaged processing, generate packet.
6. a kind of authentication device of data source equipment, it is characterised in that described device is arranged at the network equipment, and the network is set The key matched with the network equipment is pre-saved in standby, described device includes:
Receiving module, for receiving the packet from external network;
Parsing module, for parsing the packet, obtain the clear data in the packet, signature value and send the number According to the mark of the source device of bag;
Summary acquisition module, for obtaining the informative abstract of the clear data;
Deciphering module, the signature value is decrypted for the mark according to the source device;
Authentication module, for the informative abstract according to decrypted result and the clear data, the mark of source device described in certification It is whether legal.
7. device according to claim 6, it is characterised in that the summary acquisition module, be additionally operable to:
The informative abstract for obtaining the clear data is calculated using SM3 hash algorithms, described information summary includes cryptographic Hash.
8. device according to claim 6, it is characterised in that the key includes unsymmetrical key pair;It is described asymmetric Public key in key includes the mark of the network equipment;
The deciphering module is additionally operable to:Using the mark of the source device as public key, the signature value is entered using SM9 algorithms Row decryption, obtains cryptographic Hash corresponding to the signature value;The mark of the source device is with including the MAC of the source device Location.
9. device according to claim 8, it is characterised in that the authentication module, including:
It is whether consistent with the cryptographic Hash of the clear data to compare cryptographic Hash corresponding to the signature value;
If it is, determining that the source device of the packet matches with the mark, the mark is legal;
If not, determining that the source device of the packet and the mark mismatch, the mark is illegal.
A kind of 10. network equipment, it is characterised in that including processor and machinable medium, the machine readable storage Media storage has can be by the machine-executable instruction of the computing device, and machine described in the computing device is executable to be referred to Make to realize the method described in any one of claim 1 to 5.
CN201710977885.4A 2017-10-17 2017-10-17 Authentication method, device and the network equipment of data source equipment Pending CN107579999A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710977885.4A CN107579999A (en) 2017-10-17 2017-10-17 Authentication method, device and the network equipment of data source equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710977885.4A CN107579999A (en) 2017-10-17 2017-10-17 Authentication method, device and the network equipment of data source equipment

Publications (1)

Publication Number Publication Date
CN107579999A true CN107579999A (en) 2018-01-12

Family

ID=61037913

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710977885.4A Pending CN107579999A (en) 2017-10-17 2017-10-17 Authentication method, device and the network equipment of data source equipment

Country Status (1)

Country Link
CN (1) CN107579999A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109064599A (en) * 2018-07-27 2018-12-21 新华三技术有限公司 Purview certification method and device
CN111680334A (en) * 2020-06-11 2020-09-18 深圳市网心科技有限公司 Disk security access method, device, equipment and medium
CN113055397A (en) * 2021-03-29 2021-06-29 郑州中科集成电路与信息系统产业创新研究院 Configuration method and device of security access control policy
WO2022227739A1 (en) * 2021-04-28 2022-11-03 Oppo广东移动通信有限公司 Data encryption method and apparatus, data decryption method and apparatus, and device and storage medium
WO2023051510A1 (en) * 2021-09-28 2023-04-06 华为技术有限公司 Communication method and apparatus

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101588245A (en) * 2009-06-24 2009-11-25 成都市华为赛门铁克科技有限公司 A kind of method of authentication, system and memory device
CN101626294A (en) * 2008-07-07 2010-01-13 华为技术有限公司 Certifying method based on identity, method, equipment and system for secure communication
WO2012108869A1 (en) * 2011-02-10 2012-08-16 Hewlett-Packard Development Company, L.P. Systems, methods, and apparatus to authenticate communications modules
CN103313237A (en) * 2013-04-19 2013-09-18 无锡成电科大科技发展有限公司 Method and system for interaction between mobile cloud terminal and cloud server
CN104202170A (en) * 2014-09-22 2014-12-10 上海众人科技有限公司 Identity authentication system and method based on identifiers
CN105553951A (en) * 2015-12-08 2016-05-04 腾讯科技(深圳)有限公司 Data transmission method and data transmission device
KR101714742B1 (en) * 2015-10-22 2017-03-10 고려대학교 산학협력단 Authentication method and server for remote control

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101626294A (en) * 2008-07-07 2010-01-13 华为技术有限公司 Certifying method based on identity, method, equipment and system for secure communication
CN101588245A (en) * 2009-06-24 2009-11-25 成都市华为赛门铁克科技有限公司 A kind of method of authentication, system and memory device
WO2012108869A1 (en) * 2011-02-10 2012-08-16 Hewlett-Packard Development Company, L.P. Systems, methods, and apparatus to authenticate communications modules
CN103313237A (en) * 2013-04-19 2013-09-18 无锡成电科大科技发展有限公司 Method and system for interaction between mobile cloud terminal and cloud server
CN104202170A (en) * 2014-09-22 2014-12-10 上海众人科技有限公司 Identity authentication system and method based on identifiers
KR101714742B1 (en) * 2015-10-22 2017-03-10 고려대학교 산학협력단 Authentication method and server for remote control
CN105553951A (en) * 2015-12-08 2016-05-04 腾讯科技(深圳)有限公司 Data transmission method and data transmission device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
贾铁军: "《网络安全技术及应用实践教程》", 31 January 2016 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109064599A (en) * 2018-07-27 2018-12-21 新华三技术有限公司 Purview certification method and device
CN111680334A (en) * 2020-06-11 2020-09-18 深圳市网心科技有限公司 Disk security access method, device, equipment and medium
CN111680334B (en) * 2020-06-11 2023-05-09 深圳市网心科技有限公司 Disk security access method, device, equipment and medium
CN113055397A (en) * 2021-03-29 2021-06-29 郑州中科集成电路与信息系统产业创新研究院 Configuration method and device of security access control policy
WO2022227739A1 (en) * 2021-04-28 2022-11-03 Oppo广东移动通信有限公司 Data encryption method and apparatus, data decryption method and apparatus, and device and storage medium
WO2023051510A1 (en) * 2021-09-28 2023-04-06 华为技术有限公司 Communication method and apparatus

Similar Documents

Publication Publication Date Title
CN107579999A (en) Authentication method, device and the network equipment of data source equipment
CN104184713B (en) Terminal identification method, machine identifier register method and corresponding system, equipment
US11070542B2 (en) Systems and methods for certificate chain validation of secure elements
CN107770159B (en) Vehicle accident data recording method and related device and readable storage medium
CN110401615B (en) Identity authentication method, device, equipment, system and readable storage medium
US20100169650A1 (en) Storage minimization technique for direct anonymous attestation keys
CN107493273A (en) Identity identifying method, system and computer-readable recording medium
CN105391695B (en) A kind of terminal registration method and method of calibration
US10009343B2 (en) Method, apparatus, and system for authenticating fully homomorphic message
CN109818730B (en) Blind signature acquisition method and device and server
CN108173659B (en) Certificate management method and system based on UKEY equipment and terminal equipment
CN110149209B (en) Internet of things equipment and method and device for improving data transmission safety of Internet of things equipment
CN108551392A (en) A kind of Proxy Signature generation method and system based on SM9 digital signature
CN108494783A (en) The guard method of high in the clouds data
WO2015003503A1 (en) Network device, terminal device and information security improving method
CN109858255A (en) Data encryption storage method, device and realization device
US10833849B2 (en) Unified secure device provisioning
CN111131416A (en) Business service providing method and device, storage medium and electronic device
CN112380584B (en) Block chain data updating method and device, electronic equipment and storage medium
CN115580396B (en) Tight trace query system and method
KR101004829B1 (en) An apparatus and method for direct anonymous attestation from bilinear maps
WO2020102974A1 (en) Data access method, data access apparatus, and mobile terminal
US9509665B2 (en) Protecting against malicious modification in cryptographic operations
KR101253683B1 (en) Digital Signing System and Method Using Chained Hash
JP2019154055A5 (en)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180112

RJ01 Rejection of invention patent application after publication